CVE-2009-3837

Eureka-email Eureka Email - Memory Corruption

Title source: rule

Description

Stack-based buffer overflow in Eureka Email 2.2q allows remote POP3 servers to execute arbitrary code via a long error message.

Exploits (4)

exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotewindows
https://www.exploit-db.com/exploits/16443
exploitdb WORKING POC VERIFIED
by Dr_IDE & dookie · pythonremotewindows
https://www.exploit-db.com/exploits/10235
exploitdb WORKING POC VERIFIED
by Francis Provencher · textdoswindows
https://www.exploit-db.com/exploits/9881
metasploit WORKING POC NORMAL
by Francis Provencher (Protek Research Labs), Dr_IDE, dookie, jduck · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/misc/eureka_mail_err.rb

Scores

EPSS 0.7517
EPSS Percentile 98.9%

Details

CWE
CWE-119
Status published
Products (1)
eureka-email/eureka_email 2.2q
Published Nov 02, 2009
Tracked Since Feb 18, 2026