Qpopper pop_msg() Macroname Remote Overflow

This script is Copyright (C) 2003-2011 Tenable Network Security, Inc.

Synopsis :

Arbitrary code may be run on the remote host.

Description :

The remote Qpopper server, according to its banner, is vulnerable to a
one-byte overflow ih its pop_msg function after a call to Qvsnprintf().

An attacker may use this flaw to execute code with the privileges of the
Qpopper service (usually non-root), provided that he has a valid POP
account to log in with.

*** This test could not confirm the existence of the
*** problem - it relied on the banner being returned.

Solution :

Upgrade to version 4.0.5cf2 or newer

Risk factor :

Medium / CVSS Base Score : 6.5
CVSS Temporal Score : 5.4
Public Exploit Available : true

Family: Misc.

Nessus Plugin ID: 11376 ()

Bugtraq ID: 7058

CVE ID: CVE-2003-0143

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now