9.3
CVSSv2

CVE-2009-3837

Published: 02/11/2009 Updated: 10/10/2018
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
VMScore: 945
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Stack-based buffer overflow in Eureka Email 2.2q allows remote POP3 servers to execute arbitrary code via a long error message.

Vulnerable Product Search on Vulmon Subscribe to Product

eureka-email eureka email 2.2q

Exploits

#!/usr/bin/env python # Found By: Francis Provencher {PRL} # Tested On: Windows XPSP3 English # Note: This script sets up a fake SMTP server # Note: Set the client to this address and check your mail ########################################################## import sys, socket # egghunter (32 bytes) egghunter = ("\x66\x81\xCA\xFF\x0F\x42\x52\x6A\ ...
## # $Id: eureka_mail_errrb 10150 2010-08-25 20:55:37Z jduck $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## class Metasploit3 < Ms ...
##################################################################################### Application: Eureka Mail client Platforms: Windows XP Professional SP2 Exploitation: remote BoF Date: 2009-10-06 Author: Francis Provencher (Protek Research Lab's) Special Thanks to: M Jeremy Brown ########### ...