Metamail 2.7 - Multiple Buffer Overflow / Format String Handling Vulnerabilities
Author: Ulf Harnhammar
type: remote
platform: linux
port:
date_added: 2004-02-18
date_updated: 2012-12-31
verified: 1
codes: CVE-2004-0104;OSVDB-3987
tags:
aliases:
screenshot_url:
application_url:
source: https://www.securityfocus.com/bid/9692/info
Metamail has been reported prone to multiple vulnerabilities that may provide for arbitrary code execution. Two buffer overflow vulnerabilities have been reported to affect Metamail. Additionally, two format string-handling vulnerabilities have been reported. These issues may also be exploited by a remote attacker to execute arbitrary code.
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23728-1.splitmail
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23728-2.tgz
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23728-3
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23728-4
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23728-5