CVE-2009-3837
Eureka-email Eureka Email - Memory Corruption
Title source: ruleDescription
Stack-based buffer overflow in Eureka Email 2.2q allows remote POP3 servers to execute arbitrary code via a long error message.
Exploits (4)
metasploit
WORKING POC
NORMAL
by Francis Provencher (Protek Research Labs), Dr_IDE, dookie, jduck · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/misc/eureka_mail_err.rb
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotewindows
https://www.exploit-db.com/exploits/16443
exploitdb
WORKING POC
VERIFIED
by Dr_IDE & dookie · pythonremotewindows
https://www.exploit-db.com/exploits/10235
exploitdb
WORKING POC
VERIFIED
by Francis Provencher · textdoswindows
https://www.exploit-db.com/exploits/9881
References (7)
Scores
EPSS
0.7517
EPSS Percentile
98.9%
Classification
CWE
CWE-119
Status
draft
Affected Products (1)
eureka-email/eureka_email
Timeline
Published
Nov 02, 2009
Tracked Since
Feb 18, 2026