| /// File Name: |
eureka_mail_err.rb.txt |
Description:
|
This Metasploit module exploits a buffer overflow in the Eureka Email 2.2q client that is triggered through an excessively long ERR message. NOTE: this exploit isn't very reliable. Unfortunately reaching the vulnerable code can only be done when manually checking mail (Ctrl-M). Checking at startup will not reach the code targeted here.
| | Author: | Dr_IDE,Francis Provencher,dookie,jduck | | Homepage: | http://www.metasploit.com | | File Size: | 2853 | | Related OSVDB(s): | 59262 | | Related CVE(s): | CVE-2009-3837 | | Last Modified: | Dec 30 22:23:29 2009 |
| MD5 Checksum: | 6cf9e60c1d3f8e4b11891d6b756b3249 |
|