vendor:
Pop Peeper
by:
His0k4
9.3
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: Pop Peeper
Affected Version From: 3.4.0.0
Affected Version To: 3.4.0.0
Patch Exists: YES
Related CWE: CVE-2009-0478
CPE: a:popepe:pop_peeper
Other Scripts:
https://www.infosecmatter.com/nessus-plugin-library/?id=37418, https://www.infosecmatter.com/nessus-plugin-library/?id=40310, https://www.infosecmatter.com/nessus-plugin-library/?id=36013, https://www.infosecmatter.com/nessus-plugin-library/?id=36702, https://www.infosecmatter.com/nessus-plugin-library/?id=35626, https://www.infosecmatter.com/nessus-plugin-library/?id=35763, https://www.infosecmatter.com/nessus-plugin-library/?id=35620, https://www.infosecmatter.com/nessus-plugin-library/?id=63402, https://www.infosecmatter.com/nessus-plugin-library/?id=59675, https://www.infosecmatter.com/nessus-plugin-library/?id=58897
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows
2009
POP Peeper 3.4.0.0 (From) Remote Buffer Overflow Exploit (SEH)
A buffer overflow vulnerability exists in POP Peeper 3.4.0.0, which allows a remote attacker to execute arbitrary code on the vulnerable system. The vulnerability is due to a boundary error when handling a specially crafted LOGIN command. An attacker can exploit this vulnerability to execute arbitrary code on the vulnerable system with the privileges of the user running the application.
Mitigation:
Upgrade to the latest version of POP Peeper 3.4.0.1 or later.