SysGauge SMTP Validation Buffer Overflow
Posted by deepcore on March 23, 2017 – 1:41 am
This Metasploit module will setup an SMTP server expecting a connection from SysGauge 1.5.18 via its SMTP server validation. The module sends a malicious response along in the 220 service ready response and exploits the client, resulting in an unprivileged shell.
Post a reply
You must be logged in to post a comment.