Описание
Stack-based buffer overflow in the trace message functionality in Pegasus Mail 4.21a through 4.21c and 4.30PB1 allow remote attackers to execute arbitrary code via a long POP3 reply.
Ссылки
- PatchVendor Advisory
- Vendor Advisory
- PatchVendor Advisory
- Vendor Advisory
- PatchVendor Advisory
- Vendor Advisory
- PatchVendor Advisory
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:david_harris:pegasus_mail:4.21a:*:*:*:*:*:*:*
cpe:2.3:a:david_harris:pegasus_mail:4.21b:*:*:*:*:*:*:*
cpe:2.3:a:david_harris:pegasus_mail:4.21c:*:*:*:*:*:*:*
cpe:2.3:a:david_harris:pegasus_mail:4.30pb1:*:*:*:*:*:*:*
EPSS
Процентиль: 91%
0.06287
Низкий
5.1 Medium
CVSS2
Дефекты
CWE-119
Связанные уязвимости
github
почти 4 года назад
Stack-based buffer overflow in the trace message functionality in Pegasus Mail 4.21a through 4.21c and 4.30PB1 allow remote attackers to execute arbitrary code via a long POP3 reply.
EPSS
Процентиль: 91%
0.06287
Низкий
5.1 Medium
CVSS2
Дефекты
CWE-119