Heap-Based Buffer Overflow in MDaemon POP3 Server by Alt-N Technologies
CVE-2006-4364

Currently unrated

Key Information:

Vendor

Alt-n

Status
Vendor
CVE Published:
27 August 2006

Badges

๐Ÿ‘พ Exploit Exists๐ŸŸก Public PoC๐ŸŸฃ EPSS 69%

What is CVE-2006-4364?

The MDaemon POP3 server, prior to version 9.0.6, contains multiple heap-based buffer overflow vulnerabilities. These security flaws allow remote attackers to potentially crash the server (resulting in a denial of service) and may enable execution of arbitrary code. Exploitation occurs through the transmission of excessively long strings, particularly those containing '@' characters, in the USER and APOP commands, leading to severe security risks.

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

EPSS Score

69% chance of being exploited in the next 30 days.

Timeline

  • ๐ŸŸก

    Public PoC available

  • ๐Ÿ‘พ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.