漏洞信息详情
Taps Lab MailCarrier 缓冲区错误漏洞
漏洞简介
Taps Lab MailCarrier是韩国Taps Lab公司的一款基于Windows Server平台的邮件服务器。该产品支持SMTP、POP3和IMAP等协议。
Taps Lab MailCarrier 2.51版本中存在缓冲区溢出漏洞。该漏洞源于网络系统或产品在内存上执行操作时,未正确验证数据边界,导致向关联的其他内存位置上执行了错误的读写操作。攻击者可利用该漏洞导致缓冲区溢出或堆溢出等。
漏洞公告
目前厂商暂未发布修复措施解决此安全问题,建议使用此软件的用户随时关注厂商主页或参考网址以获取解决办法:
https://www.tabslab.com/
参考网址
来源:MISC
链接:http://packetstormsecurity.com/files/152530/MailCarrier-2.51-RETR-Buffer-Overflow.html
来源:MISC
链接:https://packetstormsecurity.com/files/152506/MailCarrier-2.51-TOP-Buffer-Overflow.html
来源:MISC
链接:http://packetstormsecurity.com/files/152504/MailCarrier-2.51-USER-Buffer-Overflow.html
来源:MISC
链接:http://packetstormsecurity.com/files/152502/MailCarrier-2.51-RCPT-TO-Buffer-Overflow.html
来源:MISC
链接:http://packetstormsecurity.com/files/152506/MailCarrier-2.51-TOP-Buffer-Overflow.html
来源:MISC
链接:https://packetstormsecurity.com/files/152504/MailCarrier-2.51-USER-Buffer-Overflow.html
来源:MISC
链接:https://packetstormsecurity.com/files/152505/MailCarrier-2.51-LIST-Buffer-Overflow.html
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/152530/MailCarrier-2.51-RETR-Buffer-Overflow.html
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/152502/MailCarrier-2.51-RCPT-TO-Buffer-Overflow.html
来源:MISC
链接:http://packetstormsecurity.com/files/152505/MailCarrier-2.51-LIST-Buffer-Overflow.html
来源:nvd.nist.gov
链接:https://nvd.nist.gov/vuln/detail/CVE-2019-11395
受影响实体
暂无
补丁
暂无
还没有评论,来说两句吧...