Published on May 2nd, 2019 📆 | 8409 Views ⚑
0MailCarrier 2.51 SMTP Response Service memory corruption
CVSS Meta Temp Score | Current Exploit Price (≈) |
---|---|
5.5 | $0-$5k |
A vulnerability classified as critical has been found in MailCarrier 2.51. Affected is an unknown function of the component SMTP Response Service. The manipulation with an unknown input leads to a memory corruption vulnerability. CWE is classifying the issue as CWE-119. This is going to have an impact on confidentiality, integrity, and availability. CVE summarizes:
A buffer overflow in the SMTP response service in MailCarrier 2.51 allows the attacker to execute arbitrary code remotely via a long HELP command, a related issue to CVE-2019-11395.
The weakness was released 05/02/2019. This vulnerability is traded as CVE-2019-11682 since 05/02/2019. There are neither technical details nor an exploit publicly available. The current price for an exploit might be approx. USD $0-$5k (estimation calculated on 05/02/2019).
There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.
Name
VulDB Meta Base Score: 5.5
VulDB Meta Temp Score: 5.5
VulDB Base Score: ≈5.5
VulDB Temp Score: ≈5.5
VulDB Vector: ?
VulDB Reliability: ?
VulDB Base Score: ?
VulDB Temp Score: ?
VulDB Reliability: ?
Class: Memory corruption (CWE-119)
Local: Yes
Remote: No
Availability: ?
Status: Not defined
Price Prediction: ?
Current Price Estimation: ?
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Threat Intelligence
Threat: ?
Adversaries: ?
Geopolitics: ?
Economy: ?
Predictions: ?
Remediation: ?Recommended: no mitigation known
0-Day Time: ?05/02/2019 Advisory disclosed
05/02/2019 VulDB entry created
05/02/2019 CVE assigned
05/02/2019 VulDB last updateCVE: CVE-2019-11682 (?)Created: 05/02/2019 09:42 PM
Complete: ?
Check our Alexa App!
https://vuldb.com/?id.134316
Gloss