[prev in list] [next in list] [prev in thread] [next in thread]
List: bugtraq
Subject: See-security Advisory: Format string vulnerability in MailEnable 1.8
From: a a <tal () see-security ! com>
Date: 2005-03-17 15:53:42
Message-ID: 38a002672188.4239c426 () default ! domain
[Download RAW message or body]
##################################################################
# \
# # See-security Technologies ltd. \
# # \
# # http://www.see-security.com \
# # \
# ##################################################################
[-] Product Information
MailEnable Standard Edition provides robust SMTP and POP3 services for Windows \
NT/2000/XP/2003 systems.
[-] Vulnerability Description
MailEnable contains a format string vulnerability in the it handles SMTP mailto: \
requests
[-] Exploit
Proof of concept exploit code is available at \
http://www.hackingdefined.com/exploits/mailenable.tar.gz
[-] Credits
The vulnerability was discovered by Mati Aharoni
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic