Qpopper pop_msg() Macroname Remote Overflow

medium Nessus Plugin ID 11376

Synopsis

Arbitrary code may be run on the remote host.

Description

The remote Qpopper server, according to its banner, is vulnerable to a one-byte overflow ih its pop_msg function after a call to Qvsnprintf().

An attacker may use this flaw to execute code with the privileges of the Qpopper service (usually non-root), provided that he has a valid POP account to log in with.

*** This test could not confirm the existence of the
*** problem - it relied on the banner being returned.

Solution

Upgrade to version 4.0.5cf2 or newer

Plugin Details

Severity: Medium

ID: 11376

File Name: qpopper_qvsnprinf_overflow.nasl

Version: 1.15

Type: remote

Family: Misc.

Published: 3/13/2003

Updated: 7/25/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 6.5

Temporal Score: 5.1

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Information

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 3/10/2003

Reference Information

CVE: CVE-2003-0143

BID: 7058

SuSE: SUSE-SA:2003:018