sSMTP 2.62 – ‘standardize()’ Buffer Overflow

  • 作者: Brendan Boerner
    日期: 2010-07-26
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/34375/
  • source: https://www.securityfocus.com/bid/41965/info
    
    sSMTP is prone to a remote buffer-overflow vulnerability.
    
    An attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition.
    
    sSMTP 2.6.2 is vulnerable; other versions may also be affected. 
    
    echo -n . ; for i in {1..2050} ; do echo -n $i ; done