|
Hi All,
Sorry I am running V8.12 and not 8.15 as previously
reported.
I have compiled the exploit, and ran it against my
server. With version 8.12, I am not getting any of the injections as
described (share, new user, port 4444 bind) . However, after running the
exploit all smtp will not respond to any connection request. You will have
to manually stop/start SMTP to regain full function once
again.
Here is the catch22. You will need to enable
Monitor Services if you wish to have SMTP auto restart should it hang.
This service in the past has created a bunch of networking issues for a few
users..
Also, I am not seeing the same info as http://www.mail-archive.com/imail_forum%40list.ipswitch.com/msg108489.html .
My log looks like
10:29 02:43 SMTPD(a1dc000b002a1d33) [xxx.xxx.xxx.xxx]
EHLO
10:29 02:43 SMTPD(a1dc000b002a1d33) [xxx.xxx.xxx.xxx] MAIL FROM <[EMAIL PROTECTED]> 10:29 02:43 SMTPD(a1dc000b002a1d33) [xxx.xxx.xxx.xxx] RCPT TO: <@qo: 10:29 02:44 SMTPD(0000000000000000) server starting on port 25 of student.chaminade.edu <<< AUTO RESTART OF SMTP via Monitor after SMTP fails to respond.. Display
of Options from executable.
=================================================
IMail 2006 and 8.x SMTP 'RCPT TO:' Stack Overflow
Exploit
Coded by Greg Linares < glinares.code [at] GMAIL [dot] com > Usage: imailexploit [hostname] [port] <Payload> <JMP> Default port is 25 ==============================
Payload Options: 1 = Default ============================== 1 = Share C:\ as 'Export' Share 2 = Add User 'Error' with Password 'Error' 3 = Win32 Bind CMD to Port 4444 4 = Change Administrator Password to '[EMAIL PROTECTED]' ============================== JMP Options: 1 = Default ============================== 1 = IMAIL 8.x SMTPDLL.DLL [pop ebp, ret] 0x10036f71 2 = Win2003 SP1 English NTDLL.DLL [pop ebp, ret] 0x7c87d8af 3 = Win2003 SP0 English USER32.DLL [pop ebp, ret] 0x77d02289 4 = WinXP SP2 English NTDLL.DLL [pop ebp, ret] 0x7c967e23 5 = WinXP SP1 - SP0 English USER32.DLL [pop ebp, ret] 0x71ab389c 6 = Win2000 Universal English USER32.DLL [pop ebp, ret] 0x75021397 7 = Win2000 Universal French USER32.DLL [pop ebp, ret] 0x74fa1397 8 = Windows XP SP1 - SP2 German USER32.DLL [pop ebp, ret] 0x77d18c14 Hope
this provides some info, atleast to users of Version 8.12.
Eddie
:)
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Eddie Pang Sent: Saturday, October 28, 2006 4:51 PM To: [email protected] Subject: RE: [IMail Forum] SMTP Exploit Scanning Going on NOW For those of us who are not programmers, can someone
provide a simple what we need to do to compile this so we can test our systems
for this exploit.
I have a
HIPS running on our Imail 8.15 server, and I want to see if it will terminate
the buffer overflow process.
Thanks,
Eddie.
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Troy D. Hilton Sent: Thursday, October 26, 2006 7:04 AM To: [email protected] Subject: RE: [IMail Forum] SMTP Exploit Scanning Going on NOW From what I understand
both 8.2x and 2006 are vulnerable. Check here: http://www.securiteam.com/exploits/6G00L0KH5E.html |
- RE: [IMail Forum] SMTP Exploit Scanning Going... Eddie Pang
- Re: [IMail Forum] SMTP Exploit Scanning ... Mike N
- RE: [IMail Forum] SMTP Exploit Scann... Beach Computers
- Re: [IMail Forum] SMTP Exploit S... Mike N
- RE: [IMail Forum] SMTP Explo... Beach Computers
- [IMail Forum] SMTP Expl... Servei Tècnic [ MICROTECH ]
- RE: [IMail Forum] SMTP Exploit Scanning ... David Waller
- RE: [IMail Forum] SMTP Exploit Scann... Beach Computers
- Re: [IMail Forum] SMTP Exploit S... Doug Traylor
- RE: [IMail Forum] SMTP Exploit Scanning ... Andy Schmidt
- RE: [IMail Forum] SMTP Exploit Scann... Matrosity Hosting
