cve/2003/CVE-2003-0264.md

32 lines
1.4 KiB
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2003-0264](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0264)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
Multiple buffer overflows in SLMail 5.1.0.4420 allows remote attackers to execute arbitrary code via (1) a long EHLO argument to slmail.exe, (2) a long XTRN argument to slmail.exe, (3) a long string to POPPASSWD, or (4) a long password to the POP3 server.
### POC
#### Reference
- http://packetstormsecurity.com/files/161526/SLMail-5.1.0.4420-Remote-Code-Execution.html
#### Github
- https://github.com/0x4D5352/rekall-penetration-test
- https://github.com/ARPSyndicate/cvemon
- https://github.com/CVEDB/PoC-List
2024-06-10 07:22:43 +00:00
- https://github.com/CVEDB/awesome-cve-repo
2024-05-26 14:27:05 +02:00
- https://github.com/SxNade/CVE-2003-0264_EXPLOIT
- https://github.com/adenkiewicz/CVE-2003-0264
- https://github.com/cytopia/fuzza
- https://github.com/fyoderxx/slmail-exploit
- https://github.com/mednic/slmail-exploit
- https://github.com/mussar0x4D5352/rekall-penetration-test
- https://github.com/nobodyatall648/CVE-2003-0264
- https://github.com/pwncone/CVE-2003-0264-SLmail-5.5
- https://github.com/rosonsec/Exploits
- https://github.com/vrikodar/CVE-2003-0264_EXPLOIT
- https://github.com/war4uthor/CVE-2003-0264