Korean
<< Back
VID 18029
Severity 40
Port 110
Protocol TCP
Class Pop3
Detailed Description The Qpopper version is vulnerable to a buffer overflow in the LIST command. Qpopper is POP3 mail server distributed by Qualcomm for Unix systems.
There is a remotely exploitable buffer overflow in Qaulcomm's Qpopper 3.0 beta versions which allows users already in possession of a username and password for a POP account to compromise the server running the qpopper daemon.
The problem lies in the code to handles the 'LIST' command available to logged in users. By providing an overly long user supplied argument a buffer may be overflowed resulting in the attacker gaining access with the user ID (UID) of the user whose account is being used for the attack and the group ID (GID) mail. This can be used to execute commands on the server, and possibly access other users' mailboxes.

* References:
http://www.iss.net/security_center/static/4573.php
http://www.securityfocus.com/bid/948
Recommendation Upgrade to latest version of Qpopper (version 3.0.2 or later), available from the Qualcomm FTP site, "Qpopper Download Area" at ftp://ftp.qualcomm.com/eudora/servers/unix/popper/
Related URL CVE-2000-0096 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)