Korean
<< Back
VID 18034
Severity 40
Port 109
Protocol TCP
Class POP2
Detailed Description The pop2 server, according to its version number, may be vulnerable to a buffer overflow in the FOLD command. The POP2 server distributed with IMAP-4.4 and below from the University of Washington is vulnerable. Once logged on, issuing a FOLD command with an argument of about 1000 bytes will cause a stack based buffer overflow. This vulnerability allows an attacker to gain a shell as user 'nobody', but requires the attacker to have a valid pop2 account.

* References:
http://www.iss.net/security_center/static/3114.php
http://www.securityfocus.com/bid/283
Recommendation Upgrade to the latest version of IMAP (4.5 or later) to correct this problem.

For Debian Linux:
Upgrade to the latest version of ipopd (4.5-0slink3 or later) from: http://www.debian.org/security/1999/19990607a

For Red Hat Linux:
Upgrade to the latest version of imap (4.5-0 or later), appropriate for your version of Red Hat from:
http://www.redhat.com/support/errata/rh52-errata-general.html#imap
Related URL CVE-1999-0920 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)