Qpopper pop_msg() Macroname Remote Overflow

This script is Copyright (C) 2003-2011 Tenable Network Security, Inc.


Synopsis :

Arbitrary code may be run on the remote host.

Description :

The remote Qpopper server, according to its banner, is vulnerable to a
one-byte overflow ih its pop_msg function after a call to Qvsnprintf().

An attacker may use this flaw to execute code with the privileges of the
Qpopper service (usually non-root), provided that he has a valid POP
account to log in with.

*** This test could not confirm the existence of the
*** problem - it relied on the banner being returned.

Solution :

Upgrade to version 4.0.5cf2 or newer

Risk factor :

Medium / CVSS Base Score : 6.5
(CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P)
CVSS Temporal Score : 5.4
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: Misc.

Nessus Plugin ID: 11376 ()

Bugtraq ID: 7058

CVE ID: CVE-2003-0143