Pegasus Mail POP3 Response Buffer Overflow Vulnerability

Summary
This host is running Pegasus Mail which is prone to stack-based Buffer Overflow vulnerability.
Impact
Successful exploitation will allow attackers to execute arbitrary code or cause the application to crash by sending overly long error responses from a remote POP3 server to the affected mail client. Impact Level: Application
Solution
Upgrade to version 4.51 or higher, For updates refer to http://www.pmail.com/downloads_s3_t.htm
Insight
A stack based buffer overflow error occus due to improper bounds checking when processing POP3 responses.
Affected
Pegasus Mail 4.51 and prior.
References