/// File Name: |
eureka_mail_err.rb.txt |
Description:
|
This Metasploit module exploits a buffer overflow in the Eureka Email 2.2q client that is triggered through an excessively long ERR message. NOTE: this exploit isn't very reliable. Unfortunately reaching the vulnerable code can only be done when manually checking mail (Ctrl-M). Checking at startup will not reach the code targeted here.
| Author: | Dr_IDE,Francis Provencher,dookie,jduck | Homepage: | http://www.metasploit.com | File Size: | 2853 | Related OSVDB(s): | 59262 | Related CVE(s): | CVE-2009-3837 | Last Modified: | Dec 30 22:23:29 2009 |
MD5 Checksum: | 6cf9e60c1d3f8e4b11891d6b756b3249 |
|