Qpopper .qpopper-options Username Handling Overflow

This script is Copyright (C) 2002-2011 Thomas Reinke


Synopsis :

The remote mail server is affected by a remote buffer overflow
vulnerability.

Description :

The remote Qpopper server, according to its banner, is running version
4.0.3 or version 4.0.4. These versions are vulnerable to a buffer
overflow if they are configured to allow the processing of a user's
~/.qpopper-options file. A local user can cause a buffer overflow by
setting the 'bulldir' variable to something longer than 256 characters.

*** This test could not confirm the existence of the
*** problem - it relied on the banner being returned.

See also :

http://archives.neohapsis.com/archives/linux/caldera/2001-q3/0006.html

Solution :

There is no known solution at this time.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.4
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: Misc.

Nessus Plugin ID: 10948 ()

Bugtraq ID: 2811

CVE ID: CVE-2001-1046