Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1110 CNY

100%

CVE-2011-1720 PoC — Postfix SMTP Server Cyrus SASL认证方法缓冲区溢出漏洞

Source
Associated Vulnerability
Title:Postfix SMTP Server Cyrus SASL认证方法缓冲区溢出漏洞 (CVE-2011-1720)
Description:The SMTP server in Postfix before 2.5.13, 2.6.x before 2.6.10, 2.7.x before 2.7.4, and 2.8.x before 2.8.3, when certain Cyrus SASL authentication methods are enabled, does not create a new server handle after client authentication fails, which allows remote attackers to cause a denial of service (heap memory corruption and daemon crash) or possibly execute arbitrary code via an invalid AUTH command with one method followed by an AUTH command with a different method.
Description
Exploit of CVE-2011-1720.
Readme
# postfix_exploit
File Snapshot

[4.0K] /data/pocs/49c6a3c836a877a0dd4d1b71b6d19944e7a713d1 ├── [ 56] postfix_gdb_attach.sh ├── [ 355] postfix_launcher.sh └── [ 18] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →