source: https://www.securityfocus.com/bid/2140/info Infinite Interchange is a multi function email server which supports most common internet protocols. An example of various functions include an http server and webmail interface. Unfortunately Interchange is subject to a denial of service. By requesting a malformed POST command to the HTTP server port comprised of approx 963 bytes, Interchange will crash. A restart of the service is required in order to gain normal functionality. This vulnerability may be the result of a buffer overflow, although not verified this could lead to the execution of arbitrary code on the target host. telnet victim 80 POST (963+ bytes) HTTP/1.0