This exploit demonstrates a denial-of-service (DoS) vulnerability in Inetserv 3.23's POP3 service by sending a malformed RETR or DELE command with an excessive number of format specifiers, causing the service to crash. The exploit establishes a connection, authenticates, and sends the crafted payload to trigger the vulnerability.
Classification
Working Poc 95%
Target:
Inetserv 3.23
Auth required
Prerequisites:
Network access to the target POP3 service (port 110) · Valid credentials for authentication