exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

IronMail-5.0.1.txt

IronMail-5.0.1.txt
Posted Feb 6, 2006
Authored by Mark Ludwik

If IronMail-5.0.1 is configured with "Denial of Service Protection" enabled, then a remote user can generate a TCP SYN flood, sending malformed packets via multiple connections to cause the server to become busy resulting in DOS.

tags | advisory, remote, denial of service, tcp
SHA-256 | 120c146955918d7fdcd88bc8f6b3764dbffad44a4160ac82040a3a38c7940369

IronMail-5.0.1.txt

Change Mirror Download

IronMail 5.0.1 Denial of Service Protection Lets Remote Users Deny Service



Date
====
November 29, 2005 – Research and Testing
Junary 10, 2006 – Update Release

Vulnerability
=============
SYN attack Denial of Service (Flood Connections)

Severity
========
High

Affect Products
===============
IronMail <= 5.0.1

Local/ Remote
=============
Remote

Vendor Status
=============
Not response yet

Reference about the product
===========================
https://www.ciphertrust.com/products/cclass/

Credit
======
Alex Hernandez, (Bug Hunter)
Mark Ludwik, (Researcher)

Contact
=======
Mark Ludwick [at] d-fender.com


Description
===========
The IronMail C-class is designed to handle the email traffic of the most demanding email environments in the world,
including ISPs and multinational corporations with several geographically dispersed gateways.

Vulnerability Description
=========================
A vulnerability was reported in IronMail. A remote user can cause denial of service conditions.
If the target IronMail service is configured with "Denial of Service Protection" enabled, then a remote user can
generate a TCP SYN flood, sending malformed packets via multiple connections to cause the server to become busy.


Proof of Concept
================
You can use hping or perl scripts to created malformed packets and multiple connections. The service remains busy
and not blocks the DoS DDoS attacks.


Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    69 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close