Description
POP3 protocol in Gattaca Server 2003 1.1.10.0 allows remote authenticated users to cause a denial of service (application crash) via a large numeric value in the (1) LIST, (2) RETR, or (3) UIDL commands.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by dr_insane · textdosmultiple
https://www.exploit-db.com/exploits/24283
References (7)
Core 7
Core References
Exploit x_refsource_misc
http://members.lycos.co.uk/r34ct/main/Gattaca%20Server%202003.txt
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/16703
Exploit, Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/12071
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/10728
Various Sources x_refsource_confirm
http://www.gattaca-server.com/cgi-bin/yabb/YaBB.pl?board=gattaca_discussion%3Baction=display%3Bnum=1091194176%3Bstart=0#0
Exploit vdb-entry
x_refsource_sectrack
http://securitytracker.com/id?1010703
Exploit vdb-entry
x_refsource_osvdb
http://www.osvdb.org/7925
Scores
EPSS
0.0583
EPSS Percentile
90.6%
Details
Status
published
Published
Dec 31, 2004
Tracked Since
Feb 18, 2026