Vulnerability Description
Multiple buffer overflows in SLMail 5.1.0.4420 allows remote attackers to execute arbitrary code via (1) a long EHLO argument to slmail.exe, (2) a long XTRN argument to slmail.exe, (3) a long string to POPPASSWD, or (4) a long password to the POP3 server.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Seattle Lab Software | Slmail | 5.1.0.4420 |
References
- http://marc.info/?l=bugtraq&m=105232506011335&w=2
- http://marc.info/?l=ntbugtraq&m=105233360321895&w=2
- http://packetstormsecurity.com/files/161526/SLMail-5.1.0.4420-Remote-Code-Execut
- http://www.nextgenss.com/advisories/slmail-vulns.txtPatchVendor Advisory
- http://marc.info/?l=bugtraq&m=105232506011335&w=2
- http://marc.info/?l=ntbugtraq&m=105233360321895&w=2
- http://packetstormsecurity.com/files/161526/SLMail-5.1.0.4420-Remote-Code-Execut
- http://www.nextgenss.com/advisories/slmail-vulns.txtPatchVendor Advisory
FAQ
What is CVE-2003-0264?
CVE-2003-0264 is a vulnerability with a CVSS score of 7.5 (HIGH). Multiple buffer overflows in SLMail 5.1.0.4420 allows remote attackers to execute arbitrary code via (1) a long EHLO argument to slmail.exe, (2) a long XTRN argument to slmail.exe, (3) a long string t...
How severe is CVE-2003-0264?
CVE-2003-0264 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2003-0264?
Check the references section above for vendor advisories and patch information. Affected products include: Seattle Lab Software Slmail.