Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.800970
Kategorie:Buffer overflow
Titel:Pegasus Mail POP3 Response Buffer Overflow Vulnerability
Zusammenfassung:Pegasus Mail is prone to stack-based Buffer Overflow vulnerability.
Beschreibung:Summary:
Pegasus Mail is prone to stack-based Buffer Overflow vulnerability.

Vulnerability Insight:
A stack based buffer overflow error occus due to improper bounds
checking when processing POP3 responses.

Vulnerability Impact:
Successful exploitation will allow attackers to execute arbitrary
code or cause the application to crash by sending overly long error responses
from a remote POP3 server to the affected mail client.

Affected Software/OS:
Pegasus Mail 4.51 and prior.

Solution:
Upgrade to version 4.51 or higher.

CVSS Score:
9.3

CVSS Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2009-3838
BugTraq ID: 36797
http://www.securityfocus.com/bid/36797
Bugtraq: 20091022 {PRL} Pegasus Mail client BoF (Google Search)
http://www.securityfocus.com/archive/1/507377/100/0/threaded
http://www.packetstormsecurity.org/0910-exploits/pegasusmc-dos.txt
http://www.vupen.com/exploits/Pegasus_Mail_POP3_Message_Handling_Remote_Buffer_Overflow_Exploit_3026233.php
http://osvdb.org/59261
http://www.securitytracker.com/id?1023075
http://secunia.com/advisories/37134
http://www.vupen.com/english/advisories/2009/3026
XForce ISS Database: pegasus-pop3-bo(53933)
https://exchange.xforce.ibmcloud.com/vulnerabilities/53933
CopyrightCopyright (C) 2009 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.