Eudora WorldMail Mail Manager Server MAILMA.exe Remote Heap-Based Buffer Overflow Vulnerability
BID:21897
Info
Eudora WorldMail Mail Manager Server MAILMA.exe Remote Heap-Based Buffer Overflow Vulnerability
| Bugtraq ID: | 21897 |
| Class: | Boundary Condition Error |
| CVE: |
CVE-2006-6336 |
| Remote: | Yes |
| Local: | No |
| Published: | Jan 05 2007 12:00AM |
| Updated: | Jan 08 2007 05:06PM |
| Credit: | Leon Juranic is credited with the discovery of this vulnerability. |
| Vulnerable: |
Eudora WorldMail Management Server 3.1 |
| Not Vulnerable: | |
Discussion
Eudora WorldMail Mail Manager Server MAILMA.exe Remote Heap-Based Buffer Overflow Vulnerability
Eudora WorldMail Mail Manager Server is prone to a remote heap-based buffer-overflow vulnerability.
An attacker could exploit this issue to execute arbitrary code on vulnerable installations of Eudora WorldMail. This may facilitate the compromise of the application and underlying system.
Eudora WorldMail Mail Manager Server is prone to a remote heap-based buffer-overflow vulnerability.
An attacker could exploit this issue to execute arbitrary code on vulnerable installations of Eudora WorldMail. This may facilitate the compromise of the application and underlying system.
Exploit / POC
Eudora WorldMail Mail Manager Server MAILMA.exe Remote Heap-Based Buffer Overflow Vulnerability
An attacker can exploit this issue by using standard network utilities.
An attacker can exploit this issue by using standard network utilities.
Solution / Fix
Eudora WorldMail Mail Manager Server MAILMA.exe Remote Heap-Based Buffer Overflow Vulnerability
Solution:
The vendor has stated that they will not be releasing any updates to address this issue. The vendor recommends using the above mitigating strategies to resolve this issue.
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected]:[email protected].
Solution:
The vendor has stated that they will not be releasing any updates to address this issue. The vendor recommends using the above mitigating strategies to resolve this issue.
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected]:[email protected].
References
Eudora WorldMail Mail Manager Server MAILMA.exe Remote Heap-Based Buffer Overflow Vulnerability
References:
References:
- QUALCOMM Eudora WorldMail Remote Management Heap Overflow Vulnerability (Zero Day Initiative )
- WorldMail Homepage (Eudora)