Step 1: Payload Delivery: The attacker crafts a malicious email containing a MIME-formatted message. This email is designed to exploit the buffer overflow vulnerability.
Step 2: MIME Parsing: The victim's email client receives and attempts to parse the malicious email, specifically focusing on the MIME headers and associated data.
Step 3: Buffer Overflow: During the parsing process, the email client's MIME handling routines encounter an excessively long header or data field. Due to insufficient bounds checking, the data overflows a designated buffer.
Step 4: Memory Corruption: The overflow overwrites adjacent memory locations, potentially corrupting critical data structures, including function pointers or control flow data.
Step 5: Code Execution: When the email client attempts to use the corrupted data (e.g., a function pointer), it is redirected to the attacker-controlled code (payload).
Step 6: System Compromise: The attacker's payload executes, granting them control over the victim's system. This could involve installing malware, stealing data, or further exploitation.