CVE-2003-0264
SLMail 5.1.0.4420 - Buffer Overflow
Title source: llmDescription
Multiple buffer overflows in SLMail 5.1.0.4420 allows remote attackers to execute arbitrary code via (1) a long EHLO argument to slmail.exe, (2) a long XTRN argument to slmail.exe, (3) a long string to POPPASSWD, or (4) a long password to the POP3 server.
Exploits (11)
exploitdb
WORKING POC
VERIFIED
by Haroon Rashid Astwat · cremotewindows
https://www.exploit-db.com/exploits/643
exploitdb
WORKING POC
VERIFIED
by Ivan Ivanovic · cremotewindows
https://www.exploit-db.com/exploits/646
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotewindows
https://www.exploit-db.com/exploits/16399
metasploit
WORKING POC
GREAT
rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/pop3/seattlelab_pass.rb
exploitdb
WORKING POC
VERIFIED
by muts · pythonremotewindows
https://www.exploit-db.com/exploits/638
References (4)
Scores
EPSS
0.5521
EPSS Percentile
98.0%
Classification
Status
draft
Affected Products (1)
seattle_lab_software/slmail
Timeline
Published
May 27, 2003
Tracked Since
Feb 18, 2026