Qualcomm Qpopper Remote Overflows

critical Nessus Network Monitor Plugin ID 1793

Synopsis

The remote host is running a vulnerable version of the Qualcomm popper daemon.

Description

There are buffer overflow vulnerabilities present in 3.x versions of the Qualcomm popper daemon. These vulnerabilities are remotely executable and since the daemons run as root, the host running qpopper can be completely compromised anonymously.

Solution

Upgrade to the newest version.

See Also

http://online.securityfocus.com/archive/1/27197

Plugin Details

Severity: Critical

ID: 1793

Family: POP Server

Published: 8/20/2004

Updated: 3/6/2019

Nessus ID: 10184

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:qualcomm:qpopper

Reference Information

CVE: CVE-1999-0822, CVE-2000-0060, CVE-2000-0091, CVE-2001-0776, CVE-2001-1046, CVE-2002-0454, CVE-2002-0799, CVE-2002-0889, CVE-2002-1781

BID: 2781, 2811, 4055, 4295, 4614, 4789, 790, 894, 942, 830