CVE-2005-4267

Qualcomm Worldmail - Memory Corruption

Title source: rule

Description

Stack-based buffer overflow in Qualcomm WorldMail 3.0 allows remote attackers to execute arbitrary code via a long IMAP command that ends with a "}" character, as demonstrated using long (1) LIST, (2) LSUB, (3) SEARCH TEXT, (4) STATUS INBOX, (5) AUTHENTICATE, (6) FETCH, (7) SELECT, and (8) COPY commands.

Exploits (3)

exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotewindows
https://www.exploit-db.com/exploits/16474
metasploit WORKING POC GREAT
by MC, jduck · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/imap/eudora_list.rb
exploitdb WORKING POC
pythonremotewindows
https://www.exploit-db.com/exploits/1380

Scores

EPSS 0.7579
EPSS Percentile 98.9%

Classification

CWE
CWE-119
Status draft

Affected Products (1)

qualcomm/worldmail

Timeline

Published Dec 21, 2005
Tracked Since Feb 18, 2026