To get around the SMTP auto start problem consider using a 3rd party app.
such as Service+ or similar.

David 

-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Eddie Pang
Sent: 29 October 2006 13:12
To: [email protected]
Subject: RE: [IMail Forum] SMTP Exploit Scanning Going on NOW

Hi All,
 
Sorry I am running V8.12 and not 8.15 as previously reported.  
 
I have compiled the exploit, and ran it against my server.  With version
8.12, I am not getting any of the injections as described (share, new user,
port 4444 bind) .  However, after running the exploit all smtp will not
respond to any connection request. You will have to manually stop/start SMTP
to regain full function once again.
 
Here is the catch22.  You will need to enable Monitor Services if you wish
to have SMTP auto restart should it hang.  This service in the past has
created a bunch of networking issues for a few users..
 
Also, I am not seeing the same info as
http://www.mail-archive.com/imail_forum%40list.ipswitch.com/msg108489.html .
 
My log looks like
10:29 02:43 SMTPD(a1dc000b002a1d33) [xxx.xxx.xxx.xxx] EHLO
10:29 02:43 SMTPD(a1dc000b002a1d33) [xxx.xxx.xxx.xxx] MAIL FROM <[EMAIL 
PROTECTED]>
10:29 02:43 SMTPD(a1dc000b002a1d33) [xxx.xxx.xxx.xxx] RCPT TO:
<@qo:
10:29 02:44 SMTPD(0000000000000000) server starting on port 25 of
student.chaminade.edu <<< AUTO RESTART OF SMTP via Monitor after SMTP fails
to respond..
 
Display of Options from executable.
=================================================
IMail 2006 and 8.x SMTP 'RCPT TO:' Stack Overflow Exploit Coded by Greg
Linares < glinares.code  [at] GMAIL [dot] com >
Usage: imailexploit [hostname] [port] <Payload> <JMP> Default port is 25 
 
==============================
Payload Options: 1 = Default
==============================
1 = Share C:\ as 'Export' Share
2 = Add User 'Error' with Password 'Error'
3 = Win32 Bind CMD to Port 4444
4 = Change Administrator Password to '[EMAIL PROTECTED]'
==============================
JMP Options: 1 = Default
==============================
1 = IMAIL 8.x SMTPDLL.DLL    [pop ebp, ret] 0x10036f71 
2 = Win2003 SP1 English NTDLL.DLL [pop ebp, ret] 0x7c87d8af
3 = Win2003 SP0 English USER32.DLL [pop ebp, ret] 0x77d02289
4 = WinXP SP2 English NTDLL.DLL [pop ebp, ret] 0x7c967e23
5 = WinXP SP1 - SP0 English USER32.DLL [pop ebp, ret] 0x71ab389c
6 = Win2000 Universal English USER32.DLL [pop ebp, ret] 0x75021397
7 = Win2000 Universal French USER32.DLL [pop ebp, ret] 0x74fa1397
8 = Windows XP SP1 - SP2 German USER32.DLL [pop ebp, ret] 0x77d18c14 
 
 
Hope this provides some info, atleast to users of Version 8.12.
 
Eddie :)
 

________________________________

From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Eddie Pang
Sent: Saturday, October 28, 2006 4:51 PM
To: [email protected]
Subject: RE: [IMail Forum] SMTP Exploit Scanning Going on NOW


For those of us who are not programmers, can someone provide a simple what
we need to do to compile this so we can test our systems for this exploit.

 
 I have a HIPS running on our Imail 8.15 server, and I want to see if it
will terminate the buffer overflow process.
 
Thanks,
Eddie.
 

________________________________

From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Troy D. Hilton
Sent: Thursday, October 26, 2006 7:04 AM
To: [email protected]
Subject: RE: [IMail Forum] SMTP Exploit Scanning Going on NOW



>From what I understand both 8.2x and 2006 are vulnerable. Check here:
http://www.securiteam.com/exploits/6G00L0KH5E.html

 

Troy D. Hilton

Serveon, Inc.

302-529-8640

[EMAIL PROTECTED]


To Unsubscribe: http://www.ipswitch.com/support/mailing-lists.html
List Archive: http://www.mail-archive.com/imail_forum%40list.ipswitch.com/
Knowledge Base/FAQ: http://www.ipswitch.com/support/IMail/

Reply via email to