Metamail 2.7 - Multiple Buffer Overflow / Format String Handling Vulnerabilities

Author: Ulf Harnhammar
type: remote
platform: linux
port: 
date_added: 2004-02-18  
date_updated: 2012-12-31  
verified: 1  
codes: CVE-2004-0104;OSVDB-3987  
tags:   
aliases:   
screenshot_url:   
application_url:   

raw file: 23728.txt  
source: https://www.securityfocus.com/bid/9692/info

Metamail has been reported prone to multiple vulnerabilities that may provide for arbitrary code execution. Two buffer overflow vulnerabilities have been reported to affect Metamail. Additionally, two format string-handling vulnerabilities have been reported. These issues may also be exploited by a remote attacker to execute arbitrary code.

https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23728-1.splitmail

https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23728-2.tgz

https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23728-3

https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23728-4

https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23728-5