Description
Buffer overflow in the POP3 server in 1st Class Mail Server 4.0 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an APOP USER command with a long second parameter (digest).
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by JeFFOsZ · textdosmultiple
https://www.exploit-db.com/exploits/23787
References (7)
Core 7
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://www.osvdb.org/4129
Third Party Advisory, VDB Entry vdb-entry
x_refsource_sectrack
http://securitytracker.com/id?1009279
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/15314
Exploit, Vendor Advisory x_refsource_misc
http://www.digiti.be/jeffosz/advisories/1stclasspop3.txt
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/9794
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/11029
Exploit, Vendor Advisory x_refsource_misc
http://www.zone-h.org/advisories/read/id=4047
Scores
EPSS
0.2039
EPSS Percentile
95.6%
Details
Status
published
Products (1)
1st_class_internet_solutions/1st_class_mail_server
4.0
Published
Dec 31, 2004
Tracked Since
Feb 18, 2026