This script is Copyright (C) 2003-2011 Tenable Network Security, Inc.
Arbitrary code may be run on the remote host.
The remote Qpopper server, according to its banner, is vulnerable to a
one-byte overflow ih its pop_msg function after a call to Qvsnprintf().
An attacker may use this flaw to execute code with the privileges of the
Qpopper service (usually non-root), provided that he has a valid POP
account to log in with.
*** This test could not confirm the existence of the
*** problem - it relied on the banner being returned.
Upgrade to version 4.0.5cf2 or newer
Risk factor :
Medium / CVSS Base Score : 6.5
CVSS Temporal Score : 5.4
Public Exploit Available : true