Korean
<< Back
VID 18050
Severity 30
Port 110
Protocol TCP
Class POP3
Detailed Description The Qpopper server, according to its banner, may have a buffer overflow vulnerability via a long bulldir argument in a local user's .qpopper-options configuration file.
QPopper used as a POP3 mail server for Unix systems is a freely available, open source software package distributed by Qualcomm. Qpopper versions 4.0.3 and 4.0.4 with the option set to process user's configuration files are vulnerable to a buffer overflow. By setting the bulldir parameter in their configuration file to a long string (greater than 256 bytes), a local attacker can overflow the bullName (bulletin name) buffer and execute arbitrary code on the system or cause the mail server to crash.

* Note: This check solely relied on the banner of the remote Qpopper server to assess this vulnerability, so this might be a false positive.

* References:
http://archives.neohapsis.com/archives/bugtraq/2002-04/0388.html
http://www.freeweb.hu/mantra/04_2002/popper.htm
http://www.eudora.com/qpopper/
http://online.securityfocus.com/archive/1/269969
http://marc.theaimsgroup.com/?l=vuln-dev&m=102003707432457&w=2

* Platforms Affected:
Caldera OpenServer 5.0.5
Caldera OpenServer 5.0.6
Qpopper 4.0.3
Qpopper 4.0.4
Unix Any version
Linux Any version
Recommendation Upgrade to the latest version of Qpopper (4.0.5 or later), available from the Qualcomm Qpopper ftp site, ftp://ftp.qualcomm.com/eudora/servers/unix/popper/beta/

For Caldera OpenServer 5.0.5 and 5.0.6:
Upgrade to the latest version for your system, as listed in Caldera International, Inc. Security Advisory CSSA-2002-SCO.20, ftp://stage.caldera.com/pub/security/openserver/CSSA-2002-SCO.20/CSSA-2002-SCO.20.txt

For other distributions:
Contact your vendor for upgrade or patch information.
Related URL CVE-2002-0889 (CVE)
Related URL 4614 (SecurityFocus)
Related URL 8949 (ISS)