Tabs Mail Carrier 2.5.1 contains a buffer overflow vulnerability in the MAIL FROM SMTP command that allows remote attackers to execute arbitrary code by sending a crafted MAIL FROM parameter. Attackers can connect to the SMTP service on port 25 and send a malicious MAIL FROM command with an oversized buffer to overwrite the EIP register and execute a bind shell payload.
References
| Link | Resource |
|---|---|
| https://www.exploit-db.com/exploits/46547 | Exploit Third Party Advisory VDB Entry |
| https://www.vulncheck.com/advisories/tabs-mail-carrier-buffer-overflow-via-mail-from | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2026-03-24 12:16
Updated : 2026-03-25 21:44
NVD link : CVE-2019-25646
Mitre link : CVE-2019-25646
CVE.ORG link : CVE-2019-25646
JSON object : View
Products Affected
tabslab
- mailcarrier
CWE
CWE-787
Out-of-bounds Write
