CVE-2009-3837

Eureka-email Eureka Email - Memory Corruption

Title source: rule

Description

Stack-based buffer overflow in Eureka Email 2.2q allows remote POP3 servers to execute arbitrary code via a long error message.

Exploits (4)

metasploit WORKING POC NORMAL
by Francis Provencher (Protek Research Labs), Dr_IDE, dookie, jduck · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/misc/eureka_mail_err.rb
exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotewindows
https://www.exploit-db.com/exploits/16443
exploitdb WORKING POC VERIFIED
by Dr_IDE & dookie · pythonremotewindows
https://www.exploit-db.com/exploits/10235
exploitdb WORKING POC VERIFIED
by Francis Provencher · textdoswindows
https://www.exploit-db.com/exploits/9881

Scores

EPSS 0.7517
EPSS Percentile 98.9%

Classification

CWE
CWE-119
Status draft

Affected Products (1)

eureka-email/eureka_email

Timeline

Published Nov 02, 2009
Tracked Since Feb 18, 2026