CVE-2019-25364

MailCarrier 2.51 contains a buffer overflow vulnerability in the POP3 USER command that allows remote attackers to execute arbitrary code. Attackers can send a crafted oversized buffer to the POP3 service, overwriting memory and potentially gaining remote system access.
Configurations

Configuration 1 (hide)

cpe:2.3:a:tabslab:mailcarrier:2.51:*:*:*:*:*:*:*

History

24 Feb 2026, 20:41

Type Values Removed Values Added
First Time Tabslab
Tabslab mailcarrier
CPE cpe:2.3:a:tabslab:mailcarrier:2.51:*:*:*:*:*:*:*
Summary
  • (es) MailCarrier 2.51 contiene una vulnerabilidad de desbordamiento de búfer en el comando POP3 USER que permite a atacantes remotos ejecutar código arbitrario. Los atacantes pueden enviar un búfer sobredimensionado y manipulado al servicio POP3, sobrescribiendo la memoria y potencialmente obteniendo acceso remoto al sistema.
References () https://www.exploit-db.com/exploits/47554 - () https://www.exploit-db.com/exploits/47554 - Exploit, Third Party Advisory
References () https://www.tabslab.com/ - () https://www.tabslab.com/ - Product
References () https://www.vulncheck.com/advisories/win-mailcarrier-pop-user-remote-buffer-overflow - () https://www.vulncheck.com/advisories/win-mailcarrier-pop-user-remote-buffer-overflow - Broken Link

18 Feb 2026, 22:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-18 22:16

Updated : 2026-02-24 20:41


NVD link : CVE-2019-25364

Mitre link : CVE-2019-25364

CVE.ORG link : CVE-2019-25364


JSON object : View

Products Affected

tabslab

  • mailcarrier
CWE
CWE-121

Stack-based Buffer Overflow