| VID |
18050 |
| Severity |
30 |
| Port |
110 |
| Protocol |
TCP |
| Class |
POP3 |
| Detailed Description |
The Qpopper server, according to its banner, may have a buffer overflow vulnerability via a long bulldir argument in a local user's .qpopper-options configuration file. QPopper used as a POP3 mail server for Unix systems is a freely available, open source software package distributed by Qualcomm. Qpopper versions 4.0.3 and 4.0.4 with the option set to process user's configuration files are vulnerable to a buffer overflow. By setting the bulldir parameter in their configuration file to a long string (greater than 256 bytes), a local attacker can overflow the bullName (bulletin name) buffer and execute arbitrary code on the system or cause the mail server to crash.
* Note: This check solely relied on the banner of the remote Qpopper server to assess this vulnerability, so this might be a false positive.
* References: http://archives.neohapsis.com/archives/bugtraq/2002-04/0388.html http://www.freeweb.hu/mantra/04_2002/popper.htm http://www.eudora.com/qpopper/ http://online.securityfocus.com/archive/1/269969 http://marc.theaimsgroup.com/?l=vuln-dev&m=102003707432457&w=2
* Platforms Affected: Caldera OpenServer 5.0.5 Caldera OpenServer 5.0.6 Qpopper 4.0.3 Qpopper 4.0.4 Unix Any version Linux Any version |
| Recommendation |
Upgrade to the latest version of Qpopper (4.0.5 or later), available from the Qualcomm Qpopper ftp site, ftp://ftp.qualcomm.com/eudora/servers/unix/popper/beta/
For Caldera OpenServer 5.0.5 and 5.0.6: Upgrade to the latest version for your system, as listed in Caldera International, Inc. Security Advisory CSSA-2002-SCO.20, ftp://stage.caldera.com/pub/security/openserver/CSSA-2002-SCO.20/CSSA-2002-SCO.20.txt
For other distributions: Contact your vendor for upgrade or patch information. |
| Related URL |
CVE-2002-0889 (CVE) |
| Related URL |
4614 (SecurityFocus) |
| Related URL |
8949 (ISS) |
|