Full Disclosure mailing list archives
Re: Two goodies. uw-imapd < 2004b remote exploit && spamass-milter vuln verifier
From: Kingcope <kcope2 () googlemail com>
Date: Mon, 15 Mar 2010 21:51:27 +0100
Bwaaha! You could modify the uw-imapd exploit to take over up to date uw-imapdz so they give you a shell (needs a username + password combination then and requires an MTA to run aside uw-imapd). Just a thought. Cheerio, Kingcope On Mo, 2010-03-15 at 21:36 +0100, Kingcope wrote:
I just saw an error in the uw-imapd exploit. It's slightly broken. replace the line telling print $sock2 "RCPT TO kcope\@$remhost[1]\r\n"; with print $sock2 "RCPT TO $ARGV[1]"."\@$remhost[1]\r\n"; then it should be fine. On Mo, 2010-03-15 at 21:27 +0100, Kingcope wrote:(See Attached) Cheers, Kingcope
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- Two goodies. uw-imapd < 2004b remote exploit && spamass-milter vuln verifier Kingcope (Mar 15)
- Re: Two goodies. uw-imapd < 2004b remote exploit && spamass-milter vuln verifier Kingcope (Mar 15)
- Re: Two goodies. uw-imapd < 2004b remote exploit && spamass-milter vuln verifier Kingcope (Mar 15)
- Re: Two goodies. uw-imapd < 2004b remote exploit && spamass-milter vuln verifier Kingcope (Mar 15)