Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Hexamail < POP3 Service USER Command Overflow



The remote host is vulnerable to a buffer overflow.


The remote host is running Hexamail, an SMTP server. This version of Hexamail is vulnerable to a buffer overflow in its POP3 service when passed a large string to the 'USER' directive. An attacker exploiting this flaw would only need to be able to connect to the POP3 port (default TCP/110) on the remote server. Successful exploitation would result in the attacker executing arbitrary code.


Upgrade to version or higher.