Korean
<< Back
VID 18064
Severity 20
Port 110
Protocol TCP
Class POP3
Detailed Description The Qpopper mail server, according to its version number, is vulnerable to a Valid Username Disclosure Vulnerability.
Qualcomm Qpopper is a free available POP3 mail server for Unix systems, is distributed by Qualcomm. The version 4.0.5 and earlier than 4.0.5 of Qpopper allow a remote attacker to enumerate valid usernames due to the difference of responses from the remote server during the authentication process. If a user attempts to connect to the mail server with a valid username and an invalid password, the mail server waits approximately 10 seconds before disconnecting. However, if a user attempts to connect with an invalid username and password, the mail server would disconnect immediately after the authentication credentials are supplied. This could allow a remote attacker to use brute force techniques to determine a valid username.

* References:
http://archives.neohapsis.com/archives/bugtraq/2003-06/0141.html

* Platforms Affected:
OpenPKG Project: OpenPKG 1.1, 1.2, CURRENT
Qualcomm qpopper 3.0.2, 3.1, 4.0.4, 4.0.5 fc2, 4.0.5
Linux, Unix Any version
Recommendation Upgrade to the latest Qpopper version by referring to Qualcomm Qpopper FTP site at ftp://ftp.qualcomm.com/eudora/servers/unix/popper/beta/

For OpenPKG:
Upgrade to the latest qpopper package, as listed OpenPKG Security Advisory OpenPKG-SA-2003.018 at http://www.openpkg.org/security/OpenPKG-SA-2003.018-qpopper.html

For other distributions:
Contact your vendor for patch or upgrade information.
Related URL (CVE)
Related URL 7110 (SecurityFocus)
Related URL 11543 (ISS)