Qpopper .qpopper-options Username Handling Overflow

This script is Copyright (C) 2002-2016 Thomas Reinke

Synopsis :

The remote mail server is affected by a remote buffer overflow

Description :

The remote Qpopper server, according to its banner, is running version
4.0.3 or version 4.0.4. These versions are vulnerable to a buffer
overflow if they are configured to allow the processing of a user's
~/.qpopper-options file. A local user can cause a buffer overflow by
setting the 'bulldir' variable to something longer than 256 characters.

*** This test could not confirm the existence of the
*** problem - it relied on the banner being returned.

See also :


Solution :

There is no known solution at this time.

Risk factor :

Critical / CVSS Base Score : 10.0
CVSS Temporal Score : 7.4
Public Exploit Available : false

Family: Misc.

Nessus Plugin ID: 10948 ()

Bugtraq ID: 2811

CVE ID: CVE-2001-1046

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now