Metasploit mailing list archives
Re: [Full-disclosure] MailEnable Imapd remote BoF + Exploit [x0n3-h4ck]
From: milw0rm at gmail.com (milw0rm Inc.)
Date: Wed, 6 Apr 2005 15:37:14 -0500
-=[+] Version: (Enterprise <= 1.04)-(Professional <= 1.54) /str0ke On Apr 6, 2005 2:41 PM, Sebastian Danninger <checker2100 at gmx.de> wrote:
which versions are affected? ----- Original Message ----- From: "Filbert" <filbert at pandora.be> To: <framework at metasploit.com> Sent: Wednesday, April 06, 2005 7:00 PM Subject: [framework] Re: [Full-disclosure] MailEnable Imapd remote BoF + Exploit [x0n3-h4ck]On Wednesday 06 April 2005 18:50, H D Moore wrote:If you care at all about security, run, don't walk, away from this software. Another simple overflow via the "LOGIN" IMAP command: A001 LOGIN (>1024 bytes)\r\n -HDIt would be lovely to see an exploit for msf. :) -- .Filb
Current thread:
- Re: [Full-disclosure] MailEnable Imapd remote BoF + Exploit [x0n3-h4ck] Filbert (Apr 06)
- Re: [Full-disclosure] MailEnable Imapd remote BoF + Exploit [x0n3-h4ck] Sebastian Danninger (Apr 06)
- Re: [Full-disclosure] MailEnable Imapd remote BoF + Exploit [x0n3-h4ck] milw0rm Inc. (Apr 06)
- Re: [Full-disclosure] MailEnable Imapd remote BoF + Exploit [x0n3-h4ck] Sebastian Danninger (Apr 06)