NetCPlus SmartServer3 POP 3.51.1 EXPLOIT Problem: The POP server that is part of the NetcPlus SmartServer3 email server has an unchecked buffer that could allow an attacker to execute code on the server. If the USER command is followed by an argument of over 800 characters, the input buffer will be overflowed, and data from the argument will be passed to the system to be executed at the privelege level of the SmartServ program. reference advisory: BV-006: SmartServer3 Remote Buffer Overflow Technical Advisory (Bindview) Exploit: The exploit will spawn a command prompt on port 666, and Re-Load the Service of SmartServer3 POP 3.51.1, cuz we dont want stop the service. :) Published by: Bindview Credit: Released November 11, 1999 in a Bindview security advisory. To get binary for 3.51.1 Remote exploit go to http://www.ussrback.com/ss351exp/SS351EXP.EXE To get source code for 3.51.1 Remote exploit go to http://www.ussrback.com/ss351exp/SS351EXP.ZIP This has been tested on the NT version with a default installation u n d e r g r o u n d s e c u r i t y s y s t e m s r e s e a r c h http://www.USSRBACK.COM
This archive was generated by hypermail 2b30 : Fri Apr 13 2001 - 15:12:32 PDT