module
YPOPS 0.6 Buffer Overflow
Disclosed | Created |
---|---|
09/27/2004 | 05/30/2018 |
Disclosed
09/27/2004
Created
05/30/2018
Description
This module exploits a stack buffer overflow in the YPOPS POP3
service.
This is a classic stack buffer overflow for YPOPS version 0.6.
Possibly Affected version 0.5, 0.4.5.1, 0.4.5. Eip point to
jmp ebx opcode in ws_32.dll
service.
This is a classic stack buffer overflow for YPOPS version 0.6.
Possibly Affected version 0.5, 0.4.5.1, 0.4.5. Eip point to
jmp ebx opcode in ws_32.dll
Author
acaro
Platform
Windows
References
Module Options
To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:
msf > use exploit/windows/smtp/ypops_overflow1 msf /(1) > show actions ...actions... msf /(1) > set ACTION < action-name > msf /(1) > show options ...show and set options... msf /(1) > run

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.