Ipswitch IMail 5.0/6.0 - Web Service Buffer Overflow (Denial of Service) (PoC)
Author: Marc of eEye type: dos platform: multiple port: date_added: 1999-03-01 date_updated: 2012-06-23 verified: 1 codes: CVE-1999-1551;OSVDB-10843 tags: aliases: screenshot_url: application_url: raw file: 19380.txt
source: https://www.securityfocus.com/bid/505/info The IMail web server can be crashed by requesting an abnormally long URL. Telnet to target machine, port 8383 Send: GET /glob1/ Where glob1 is 3000 characters. Marc Maiffret <marc@eeye.com> has released the following exploit: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19380.zip