POP3Lite Input Validation Vulnerability

An attacker need only compose an email with a '.'. Maliciously crafted fake server responses may follow in the body of the email message.


 

Privacy Statement
Copyright 2010, SecurityFocus