Stack-based buffer overflow in Qualcomm WorldMail 3.0 allows remote attackers to execute arbitrary code via a long IMAP command ending with a "}" character
Reporter | Title | Published | Views | Family All 21 |
---|---|---|---|---|
![]() | eudora_imap.pm.txt | 14 Feb 200600:00 | – | packetstorm |
![]() | Qualcomm WorldMail 3.0 IMAPD LIST Buffer Overflow | 26 Nov 200900:00 | – | packetstorm |
![]() | Eudora WorldMail IMAP LIST command buffer overflow | 30 Dec 200500:00 | – | saint |
![]() | Eudora WorldMail IMAP LIST command buffer overflow | 30 Dec 200500:00 | – | saint |
![]() | Eudora WorldMail IMAP LIST command buffer overflow | 30 Dec 200500:00 | – | saint |
![]() | Eudora WorldMail IMAP LIST command buffer overflow | 30 Dec 200500:00 | – | saint |
![]() | Eudora Qualcomm WorldMail 3.0 - IMAPd 'LIST' Remote Buffer Overflow (Metasploit) | 1 Jul 201000:00 | – | exploitdb |
![]() | Eudora WorldMail IMAP Server Buffer Overflow Vulnerability | 18 Jan 201200:00 | – | openvas |
![]() | Eudora WorldMail IMAP Server Buffer Overflow Vulnerability | 18 Jan 201200:00 | – | openvas |
![]() | [Full-disclosure] iDefense Security Advisory 12.20.05: Qualcomm WorldMail IMAP Server String Literal Processing Overflow Vulnerability | 20 Dec 200500:00 | – | securityvulns |
Source | Link |
---|---|
securityfocus | www.securityfocus.com/bid/15980 |
seclists | www.seclists.org/lists/fulldisclosure/2005/Dec/1037.html |
secunia | www.secunia.com/advisories/17640 |
securityreason | www.securityreason.com/securityalert/277 |
vupen | www.vupen.com/english/advisories/2005/3005 |
idefense | www.idefense.com/intelligence/vulnerabilities/display.php |
securitytracker | www.securitytracker.com/id |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo