Lucene search

K
exploitdbBrendan BoernerEDB-ID:34375
HistoryJul 26, 2010 - 12:00 a.m.

sSMTP 2.62 - 'standardize()' Buffer Overflow

2010-07-2600:00:00
Brendan Boerner
www.exploit-db.com
10

AI Score

7.4

Confidence

Low

EPSS

0

Percentile

10.3%

source: https://www.securityfocus.com/bid/41965/info

sSMTP is prone to a remote buffer-overflow vulnerability.

An attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition.

sSMTP 2.6.2 is vulnerable; other versions may also be affected. 

echo -n . ; for i in {1..2050} ; do echo -n $i ; done 

AI Score

7.4

Confidence

Low

EPSS

0

Percentile

10.3%