Vulnerability Description
Tabs Mail Carrier 2.5.1 contains a buffer overflow vulnerability in the MAIL FROM SMTP command that allows remote attackers to execute arbitrary code by sending a crafted MAIL FROM parameter. Attackers can connect to the SMTP service on port 25 and send a malicious MAIL FROM command with an oversized buffer to overwrite the EIP register and execute a bind shell payload.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tabslab | Mailcarrier | 2.5.1 |
Related Weaknesses (CWE)
References
- https://www.exploit-db.com/exploits/46547ExploitThird Party AdvisoryVDB Entry
- https://www.vulncheck.com/advisories/tabs-mail-carrier-buffer-overflow-via-mail-Third Party Advisory
FAQ
What is CVE-2019-25646?
CVE-2019-25646 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Tabs Mail Carrier 2.5.1 contains a buffer overflow vulnerability in the MAIL FROM SMTP command that allows remote attackers to execute arbitrary code by sending a crafted MAIL FROM parameter. Attacker...
How severe is CVE-2019-25646?
CVE-2019-25646 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2019-25646?
Check the references section above for vendor advisories and patch information. Affected products include: Tabslab Mailcarrier.