Multiple Vendor POP3 Remote Overflows

critical Nessus Plugin ID 10184

Synopsis

Arbitrary code may be run on the remote server.

Description

The remote POP3 server might be vulnerable to a buffer overflow bug when it is issued at least one of these commands, with a too long argument :

AUTH USER PASS

If confirmed, this problem might allow an attacker to execute arbitrary code on the remote system.

Solution

If you do not use POP3, disable this service. Otherwise, upgrade to a newer version.

See Also

http://web.archive.org/web/20030217185907/http://online.securityfocus.com:80/archive/1/27197

Plugin Details

Severity: Critical

ID: 10184

File Name: pop3_overflow.nasl

Version: 1.56

Type: remote

Published: 6/22/1999

Updated: 11/15/2018

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

Required KB Items: Settings/ParanoidReport

Excluded KB Items: global_settings/supplied_logins_only

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 11/30/1999

Reference Information

CVE: CVE-1999-0822, CVE-2000-0091, CVE-2001-0776, CVE-2001-1046, CVE-2002-0454, CVE-2002-0799, CVE-2002-1781

BID: 2781, 2811, 4055, 4295, 4789, 790, 830, 942