Vulnerability Description
Buffer overflow in the POP3 server in Kinesphere Corporation eXchange before 5.0.060125 allows remote attackers to execute arbitrary code via a long RCPT TO argument.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Kinesphere Corporation | Exchange Pop3 | 5.0_build_050203 |
References
- http://archives.neohapsis.com/archives/bugtraq/2006-02/0040.html
- http://downloads.securityfocus.com/vulnerabilities/exploits/exchangepop3.plExploit
- http://secunia.com/advisories/18687Vendor Advisory
- http://securityreason.com/securityalert/408
- http://securitytracker.com/id?1015580
- http://www.osvdb.org/22907
- http://www.securityfocus.com/bid/16485Exploit
- http://www.vupen.com/english/advisories/2006/0437
- https://exchange.xforce.ibmcloud.com/vulnerabilities/24477
- https://www.exploit-db.com/exploits/1466
- http://archives.neohapsis.com/archives/bugtraq/2006-02/0040.html
- http://downloads.securityfocus.com/vulnerabilities/exploits/exchangepop3.plExploit
- http://secunia.com/advisories/18687Vendor Advisory
- http://securityreason.com/securityalert/408
- http://securitytracker.com/id?1015580
FAQ
What is CVE-2006-0537?
CVE-2006-0537 is a vulnerability with a CVSS score of 7.5 (HIGH). Buffer overflow in the POP3 server in Kinesphere Corporation eXchange before 5.0.060125 allows remote attackers to execute arbitrary code via a long RCPT TO argument.
How severe is CVE-2006-0537?
CVE-2006-0537 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-0537?
Check the references section above for vendor advisories and patch information. Affected products include: Kinesphere Corporation Exchange Pop3.