Summary
This host is installed with Eureka Email and is prone to stack-based buffer overflow vulnerability.
Impact
Successful exploitation allows remote attackers to crash an affected client or execute arbitrary code by tricking a user into connecting to a malicious POP3 server.
Impact level: Application.
Solution
No solution or patch was made available for at least one year since disclosure of this vulnerability. Likely none will be provided anymore.
General solution options are to upgrade to a newer release, disable respective features, remove the product or replace the product by another one.
Insight
The flaw is due to a boundary error in the processing POP3 responses.
This can be exploited to cause a stack-based buffer overflow via an overly long error response.
Affected
Eureka Email version 2.2q and prior.
References
Severity
Classification
-
CVE CVE-2009-3837 -
CVSS Base Score: 9.3
AV:N/AC:M/Au:N/C:C/I:C/A:C
Related Vulnerabilities