Path: blob/master/documentation/modules/exploit/windows/imap/mercury_login.md
27931 views
Mercury/32 <= 4.01b contains an stack based buffer overflow in IMAPD LOGIN verb. Sending an specially crafted IMAP login command allows remote code execution.
Vulnerable Application
This module exploits a stack buffer overflow in Mercury/32 <= 4.01b IMAPD LOGIN verb. By sending a specially crafted login command, a buffer is corrupted, and code execution is possible. This vulnerability was discovered by (mu-b at digit-labs.org).
This module has been tested successfully on:
Mercury/32 v4.01a on Windows XP SP3 (x86)
Mercury/32 v4.01a on Windows 7 SP1 (x86)
Mercury/32 v4.01a on Windows Server 2003 Standard Edition SP1 (x86)
Mercury/32 v4.01b on Windows 7 SP1 (x86)
Verification steps
Install the vulnerable Mercury/32 application
Start msfconsole
Do:
use exploit/windows/imap/mercury_loginDo:
set RHOST IPDo:
exploitYou should get a shell.