There is a known buffer overflow vulnerability in the SLMail 5.5.0 Mail Server software. Let's download the application (from the following URL: https://slmail.software.informer.com/5.5/) and install it in Windows by double-clicking the exe installer. Once installed, run it inside a Windows 7 VM, as shown here:
Let's now attach our running program to an immunity debugger and use a simple Python fuzzer to crash the program, as shown here:
The following screenshot depicts the loaded code once we have clicked on Attach:
Let's use a simple fuzzer written in Python to try to break this code:
Now, let's run the code to see where it breaks the email application and what the buffer values at the time of the crash are:
It can be seen that somewhere between byte number 2700 and 2900 the access violation exception occurs...