This is a functional proof-of-concept exploit for a buffer overflow vulnerability in YPOPS! v0.9.7.3. It targets the PASS command in the POP3 service, overwriting the SEH handler to demonstrate control over execution flow.
Classification
Working Poc 95%
Attack Type
Rce
Complexity
Trivial
Reliability
Reliable
Target:YPOPS! v0.9.7.3
No auth needed
Prerequisites:Network access to the target POP3 service (port 110) · YPOPS! v0.9.7.3 running on Windows XP SP3