// For flags

CVE-2003-0264

Seattle Lab Mail (SLmail) 5.5 - POP3 'PASS' Remote Buffer Overflow

Severity Score

7.5
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

9
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Multiple buffer overflows in SLMail 5.1.0.4420 allows remote attackers to execute arbitrary code via (1) a long EHLO argument to slmail.exe, (2) a long XTRN argument to slmail.exe, (3) a long string to POPPASSWD, or (4) a long password to the POP3 server.

Múltiples desbordamientos de búfer en SLMail 5.1.0.4420 permite que atacantes remotos ejecuten código arbitrario mediante (1) un argumento EHLO largo a slmail.exe, (2) un argumento XTRN largo a slmail.exe, (3) una cadena larga para POPPASSWD, o (4) un password largo para el servidor POP3.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2003-05-07 CVE Reserved
  • 2003-05-08 CVE Published
  • 2004-11-18 First Exploit
  • 2023-05-23 EPSS Updated
  • 2024-08-08 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Seattle Lab Software
Search vendor "Seattle Lab Software"
Slmail
Search vendor "Seattle Lab Software" for product "Slmail"
5.1.0.4420
Search vendor "Seattle Lab Software" for product "Slmail" and version "5.1.0.4420"
-
Affected