vendor:
Crashmail
by:
Juan Sacco
7.5
CVSS
HIGH
Stack-Based Buffer Overflow
119
CWE
Product Name: Crashmail
Affected Version From: 1.6
Affected Version To: 1.6
Patch Exists: YES
Related CWE: N/A
CPE: a:ftnapps:crashmail
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: N/A
2020
Crashmail Stack-Based Buffer Overflow
Crashmail is prone to a stack-based buffer overflow because the application fails to perform adequate boundary checks on user supplied input. An attacker could exploit this vulnerability to execute arbitrary code in the context of the application. Failed exploit attempts may result in a denial-of-service condition.
Mitigation:
Upgrade to the latest version of Crashmail.