| VID |
18029 |
| Severity |
40 |
| Port |
110 |
| Protocol |
TCP |
| Class |
Pop3 |
| Detailed Description |
The Qpopper version is vulnerable to a buffer overflow in the LIST command. Qpopper is POP3 mail server distributed by Qualcomm for Unix systems. There is a remotely exploitable buffer overflow in Qaulcomm's Qpopper 3.0 beta versions which allows users already in possession of a username and password for a POP account to compromise the server running the qpopper daemon. The problem lies in the code to handles the 'LIST' command available to logged in users. By providing an overly long user supplied argument a buffer may be overflowed resulting in the attacker gaining access with the user ID (UID) of the user whose account is being used for the attack and the group ID (GID) mail. This can be used to execute commands on the server, and possibly access other users' mailboxes.
* References: http://www.iss.net/security_center/static/4573.php http://www.securityfocus.com/bid/948 |
| Recommendation |
Upgrade to latest version of Qpopper (version 3.0.2 or later), available from the Qualcomm FTP site, "Qpopper Download Area" at ftp://ftp.qualcomm.com/eudora/servers/unix/popper/ |
| Related URL |
CVE-2000-0096 (CVE) |
| Related URL |
(SecurityFocus) |
| Related URL |
(ISS) |
|