Vulnerability Description
Stack-based buffer overflow in Eureka Email 2.2q allows remote POP3 servers to execute arbitrary code via a long error message.
CVSS Score
9.3
HIGH
AV:N/AC:M/Au:N/C:C/I:C/A:C
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Eureka-Email | Eureka Email | 2.2q |
Related Weaknesses (CWE)
References
- http://osvdb.org/59262
- http://secunia.com/advisories/37132Vendor Advisory
- http://www.packetstormsecurity.org/0910-exploits/eurekamc-dos.txtExploit
- http://www.securityfocus.com/archive/1/507376/100/0/threaded
- http://www.securityfocus.com/archive/1/508126/100/0/threaded
- http://www.vupen.com/english/advisories/2009/3025Vendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/53940
- http://osvdb.org/59262
- http://secunia.com/advisories/37132Vendor Advisory
- http://www.packetstormsecurity.org/0910-exploits/eurekamc-dos.txtExploit
- http://www.securityfocus.com/archive/1/507376/100/0/threaded
- http://www.securityfocus.com/archive/1/508126/100/0/threaded
- http://www.vupen.com/english/advisories/2009/3025Vendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/53940
FAQ
What is CVE-2009-3837?
CVE-2009-3837 is a vulnerability with a CVSS score of 9.3 (HIGH). Stack-based buffer overflow in Eureka Email 2.2q allows remote POP3 servers to execute arbitrary code via a long error message.
How severe is CVE-2009-3837?
CVE-2009-3837 has been rated HIGH with a CVSS base score of 9.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2009-3837?
Check the references section above for vendor advisories and patch information. Affected products include: Eureka-Email Eureka Email.