I am trying to exploit an SEH bof on "Eudora Qualcomm WorldMail 3.0 (IMAPd)". the shellcode is bind_tcp on port 4444. Everything works fine, I removed all bad characters, verified that the code is placed in the right offset, and the code executes and I verify this by running "netstat -noa" on the victim machine which shows that its listening to port 4444 as expected.
The problem arise when I am trying to connect to this port using netcat. once I connect to the victim, the program crashes in the debugger although it was "Running" without problems just before I connect to it.
I even tried connecting to it from the victim machine itself to keep off any network problem, however, the same problem happen !
Thanks in advance !