NetCPlus SmartServer3 POP 3.51.1 EXPLOIT

From: Ussr Labs (labsat_private)
Date: Sun Nov 14 1999 - 20:12:59 PST

  • Next message: Elias Levy: "Re: BIND bugs of the month (spoofing secure Web sites?)"

    NetCPlus SmartServer3 POP 3.51.1 EXPLOIT
    
    Problem:
    
    The POP server that is part of the NetcPlus SmartServer3 email server has an
    unchecked buffer that could allow an attacker to execute code on the server.
    If the USER command is followed by an argument of over 800 characters, the
    input buffer will be overflowed, and data from the argument will be passed
    to the system to be executed at the privelege level of the SmartServ
    program.
    
    reference
    advisory: BV-006: SmartServer3 Remote Buffer Overflow Technical Advisory
    (Bindview)
    
    Exploit:
    
    The exploit will spawn a command prompt on port 666, and Re-Load the Service
    of SmartServer3 POP 3.51.1, cuz we dont want stop the service. :)
    
    
    Published by: Bindview
    
    Credit:
    Released November 11, 1999 in a Bindview security advisory.
    
    To get binary for 3.51.1 Remote exploit go to
    http://www.ussrback.com/ss351exp/SS351EXP.EXE
    To get source code for 3.51.1 Remote exploit go to
    http://www.ussrback.com/ss351exp/SS351EXP.ZIP
    
    This has been tested on the NT version with a default installation
    
    u n d e r g r o u n d  s e c u r i t y  s y s t e m s  r e s e a r c h
    http://www.USSRBACK.COM
    



    This archive was generated by hypermail 2b30 : Fri Apr 13 2001 - 15:12:32 PDT