Metasploit mailing list archives

Re: [Full-disclosure] MailEnable Imapd remote BoF + Exploit [x0n3-h4ck]


From: milw0rm at gmail.com (milw0rm Inc.)
Date: Wed, 6 Apr 2005 15:37:14 -0500

-=[+] Version:        (Enterprise <= 1.04)-(Professional <= 1.54)

/str0ke

On Apr 6, 2005 2:41 PM, Sebastian Danninger <checker2100 at gmx.de> wrote:
which versions are affected?

----- Original Message -----
From: "Filbert" <filbert at pandora.be>
To: <framework at metasploit.com>
Sent: Wednesday, April 06, 2005 7:00 PM
Subject: [framework] Re: [Full-disclosure] MailEnable Imapd remote BoF +
Exploit [x0n3-h4ck]

On Wednesday 06 April 2005 18:50, H D Moore wrote:
If you care at all about security, run, don't walk, away from this
software. Another simple overflow via the "LOGIN" IMAP command:

A001 LOGIN (>1024 bytes)\r\n

-HD


It would be lovely to see an exploit for msf.  :)


--

.Filb






Current thread: