CVE-2003-0264

SLMail 5.1.0.4420 - Buffer Overflow

Title source: llm

Description

Multiple buffer overflows in SLMail 5.1.0.4420 allows remote attackers to execute arbitrary code via (1) a long EHLO argument to slmail.exe, (2) a long XTRN argument to slmail.exe, (3) a long string to POPPASSWD, or (4) a long password to the POP3 server.

Exploits (11)

nomisec WORKING POC
by nobodyatall648 · poc
https://github.com/nobodyatall648/CVE-2003-0264
nomisec WORKING POC
by fyoderxx · poc
https://github.com/fyoderxx/slmail-exploit
nomisec WORKING POC
by vrikodar · poc
https://github.com/vrikodar/CVE-2003-0264_EXPLOIT
nomisec WORKING POC
by adenkiewicz · poc
https://github.com/adenkiewicz/CVE-2003-0264
nomisec WORKING POC
by war4uthor · poc
https://github.com/war4uthor/CVE-2003-0264
nomisec WORKING POC
by pwncone · poc
https://github.com/pwncone/CVE-2003-0264-SLmail-5.5
exploitdb WORKING POC VERIFIED
by Haroon Rashid Astwat · cremotewindows
https://www.exploit-db.com/exploits/643
exploitdb WORKING POC VERIFIED
by Ivan Ivanovic · cremotewindows
https://www.exploit-db.com/exploits/646
exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotewindows
https://www.exploit-db.com/exploits/16399
metasploit WORKING POC GREAT
rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/pop3/seattlelab_pass.rb
exploitdb WORKING POC VERIFIED
by muts · pythonremotewindows
https://www.exploit-db.com/exploits/638

Scores

EPSS 0.5521
EPSS Percentile 98.0%

Classification

Status draft

Affected Products (1)

seattle_lab_software/slmail

Timeline

Published May 27, 2003
Tracked Since Feb 18, 2026