| VID |
18034 |
| Severity |
40 |
| Port |
109 |
| Protocol |
TCP |
| Class |
POP2 |
| Detailed Description |
The pop2 server, according to its version number, may be vulnerable to a buffer overflow in the FOLD command. The POP2 server distributed with IMAP-4.4 and below from the University of Washington is vulnerable. Once logged on, issuing a FOLD command with an argument of about 1000 bytes will cause a stack based buffer overflow. This vulnerability allows an attacker to gain a shell as user 'nobody', but requires the attacker to have a valid pop2 account.
* References: http://www.iss.net/security_center/static/3114.php http://www.securityfocus.com/bid/283 |
| Recommendation |
Upgrade to the latest version of IMAP (4.5 or later) to correct this problem.
For Debian Linux: Upgrade to the latest version of ipopd (4.5-0slink3 or later) from: http://www.debian.org/security/1999/19990607a
For Red Hat Linux: Upgrade to the latest version of imap (4.5-0 or later), appropriate for your version of Red Hat from: http://www.redhat.com/support/errata/rh52-errata-general.html#imap |
| Related URL |
CVE-1999-0920 (CVE) |
| Related URL |
(SecurityFocus) |
| Related URL |
(ISS) |
|