This module exploits a vulnerability on smtpsvc.dll ( "Simple Mail Transfer Protocol" service ) via a malformed MX response packet sent by the spoofed DNS Server. This module exploits a vulnerability on smtpsvc.dll ("Simple Mail Transfer Protocol" service) via a malformed MX response packet sent by the spoofed DNS Server. When the SMTP Client ( this module ) sends an email to "[email protected]" ( "XXXXX" is a random number between 0 and 65536 ), the SMTP Server tries to resolve the IP of "dominioXXXXX.com" domain. In that moment, the SMTP Server sends a DNS request to the configurated DNS Server. This module tries to send a response to the SMTP Server before the configurated DNS Server does.
This module sends a "SMB Browser Election" UDP packet to the "Active Directory" service running in the target. When the Windows kernel processes this crafted packet, the "bowser.sys" kernel module finishes calling to "memcpy" function with the length parameter of 4.294.967.295 bytes. After that, the "memcpy" function corrupts all the kernel heap and finish crashing the target kernel.