POP.Peeper.UIDL.Response.Buffer.Overflow
Description
This indicates an attack attempt against a stack based Buffer Overflow vulnerability in POP Peeper.
The vulnerability is caused by a boundary error in the processing of POP3 UIDL responses. Remote attackers can exploit it to execute arbitrary code.
Affected Products
POP Peeper 3.4.0 and earlier versions.
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Currently we are not aware of any vendor supplied patch for this.
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |