Vulnerability Description
Stack-based buffer overflow in POP Peeper 3.4.0.0 and earlier allows remote POP3 servers to execute arbitrary code via a long Date header, related to Imap.dll.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Poppeeper | Pop Peeper | <= 3.4.0.0 |
Related Weaknesses (CWE)
References
- http://secunia.com/advisories/34077Vendor Advisory
- http://www.krakowlabs.com/res/adv/KL0309ADV-poppeeper_date-bof.txt
- http://www.securityfocus.com/archive/1/501701/100/0/threaded
- http://www.securityfocus.com/bid/34093
- https://exchange.xforce.ibmcloud.com/vulnerabilities/49215
- https://www.exploit-db.com/exploits/8203
- http://secunia.com/advisories/34077Vendor Advisory
- http://www.krakowlabs.com/res/adv/KL0309ADV-poppeeper_date-bof.txt
- http://www.securityfocus.com/archive/1/501701/100/0/threaded
- http://www.securityfocus.com/bid/34093
- https://exchange.xforce.ibmcloud.com/vulnerabilities/49215
- https://www.exploit-db.com/exploits/8203
FAQ
What is CVE-2009-1029?
CVE-2009-1029 is a vulnerability with a CVSS score of 9.3 (HIGH). Stack-based buffer overflow in POP Peeper 3.4.0.0 and earlier allows remote POP3 servers to execute arbitrary code via a long Date header, related to Imap.dll.
How severe is CVE-2009-1029?
CVE-2009-1029 has been rated HIGH with a CVSS base score of 9.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2009-1029?
Check the references section above for vendor advisories and patch information. Affected products include: Poppeeper Pop Peeper.