Try this
http://secunia.com/advisories/22559/

There are two mentions of it. This one for SMTP, the other for the POP3.

The software I developed was a mailserver. It has client components and 
server components to handle both sides... One to receive SMTP, the other to 
send SMTP, one to receive POP3, the other to send POP3.

It is the server side that is being exploited.

This one has more information, including code to exploit it.
http://www.securityfocus.com/bid/20709

I am just about to upload a probable fix to my initial server.

Best regards,
Dave Colliver.
http://www.AshfieldFOCUS.com
~~
http://www.FOCUSPortals.com - Local franchises available
----- Original Message ----- 
From: "Arno Garrels" <[EMAIL PROTECTED]>
To: "ICS support mailing" <twsocket@elists.org>
Sent: Friday, March 16, 2007 8:16 PM
Subject: Re: [twsocket] Buffer overflow in SMTP


> David Colliver wrote:
>> Hi Piotr,
>>
>> I just happened to come across the vulnerability as someone has
>> reported it on many security websites.
>
> Any links?
>
> BTW: You talked  about client components ( SMTP or POP3 ? ), targets
> of buffer overflow-attacks usually are servers, otherwise the  server was
> the attacker.
>
> --
> Arno Garrels [TeamICS]
> http://www.overbyte.be/eng/overbyte/teamics.html
>
>
>
>
>
> -- 
> To unsubscribe or change your settings for TWSocket mailing list
> please goto http://www.elists.org/mailman/listinfo/twsocket
> Visit our website at http://www.overbyte.be 

-- 
To unsubscribe or change your settings for TWSocket mailing list
please goto http://www.elists.org/mailman/listinfo/twsocket
Visit our website at http://www.overbyte.be

Reply via email to