Korean
<< Back
VID 18030
Severity 40
Port 110
Protocol TCP
Class POP3
Detailed Description The POP3 server seems to be subject to a buffer overflow when it is issued at least one of some pop3 commands such as 'AUTH', 'USER', 'PASS' with a too long argument. This problem may allow remote attackers to execute arbitrary code, or enable them to perform a denial-of-service attack on the vulnerable system. The attack is possible due to improper bounds checking, and various pop3 implementations are suffered from the problem.

Vulnerable systems:
IPSwitch IMAIL POP3 - http://www.securiteam.com/exploits/3X5PRSAQ0G.html
Mercur POP3 - http://www.securiteam.com/exploits/5ZP0F000HQ.html
Rover POP3 - http://www.securiteam.com/exploits/3J5QCS0QAS.html
ZetaMail POP3 - http://www.securiteam.com/exploits/3R5Q1SAQ0Q.html
SmartServer3 POP3 - http://www.securiteam.com/windowsntfocus/3V5Q7QAQ0I.html
WinSMTPD POP3 - http://www.securiteam.com/exploits/5MP0C0U2KM.html
AnalogX POP3 - http://www.securiteam.com/exploits/5VP0X0020O.html
Internet Anywhere POP3 - http://www.securiteam.com/windowsntfocus/3G5Q3QKPPG.html
DynFX POPd - http://www.securiteam.com/windowsntfocus/5JP080A4KM.html
XMail POP3 - http://www.securiteam.com/securitynews/5EP050A2KK.html
WinProxy POP3 - http://www.securiteam.com/windowsntfocus/5NR070A1QG.html
Artisoft XtraMail POP3 - http://www.securiteam.com/exploits/3A5Q3Q0Q0U.html
Vpopmail POP3 - http://www.securiteam.com/exploits/5ZP0J000DQ.html

* References:
http://www.iss.net/security_center/static/6007.php
http://www.iss.net/security_center/static/6615.php
Recommendation Disable the POP3 server if you don't use it, or Contact the pop3 vendor for upgrading it to a more secure version.
Related URL (CVE)
Related URL (SecurityFocus)
Related URL (ISS)