EServ 2.92 Is Vulnerable To A DoS Attack

EServ 2.92 Build 2982 has been found vulnerable to a DoS attack. The attack is easily carried out by simply telneting to port 25 and sending a specially crafted email.

Steve Manzuik

September 24, 2000

1 Min Read
ITPro Today logo in a gray background | ITPro Today

Reported September 25, 2000 by Delphis Consulting

VERSIONS AFFECTED

DESCRIPTIONA denial of service attack has been discovered in Eserv 2.92 when running under Windows 2000 (SP1) and Windows NT 4.0 (SP5).  It is possible for a remote attacker to cause Eserv to consume 99% of CPU resources then eventually crash.

DEMONSTRATION

A malicious attacker could Telnet to port 25, the listening port for Eserv SMTP server and send 8.4K of data after the HELO and MAIL FROM: SMTP commands.  For example;

HELO (A x 8.4K)MAIL FROM: test@ (A x 8.4K).comRCPT TO:  DATA .

This will cause CPU utilization to reach 99% and the EServ service will eventually crash.

VENDOR RESPONSE

According to Delphis Consulting, there has been no vendor response or solution provided to this problem.  Windows IT Security has also attempted to contact the vendor and will post the response here.

CREDITDiscovered by Delphis Consulting

Sign up for the ITPro Today newsletter
Stay on top of the IT universe with commentary, news analysis, how-to's, and tips delivered to your inbox daily.

You May Also Like