Qpopper .qpopper-options Username Handling Overflow

critical Nessus Plugin ID 10948

Synopsis

The remote mail server is affected by a remote buffer overflow vulnerability.

Description

The remote Qpopper server, according to its banner, is running version 4.0.3 or version 4.0.4. These versions are vulnerable to a buffer overflow if they are configured to allow the processing of a user's ~/.qpopper-options file. A local user can cause a buffer overflow by setting the 'bulldir' variable to something longer than 256 characters.

*** This test could not confirm the existence of the
*** problem - it relied on the banner being returned.

Solution

There is no known solution at this time.

See Also

http://www.nessus.org/u?e8c930d6

Plugin Details

Severity: Critical

ID: 10948

File Name: qpopper2.nasl

Version: 1.18

Type: remote

Family: Misc.

Published: 5/2/2002

Updated: 8/22/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 4/20/2001

Reference Information

CVE: CVE-2001-1046

BID: 2811