Qualcomm Qpopper Remote Overflows

Critical Nessus Network Monitor Plugin ID 1793


The remote host is running a vulnerable version of the Qualcomm popper daemon.


There are buffer overflow vulnerabilities present in 3.x versions of the Qualcomm popper daemon. These vulnerabilities are remotely executable and since the daemons run as root, the host running qpopper can be completely compromised anonymously.


Upgrade to the newest version.

See Also


Plugin Details

Severity: Critical

ID: 1793

Family: POP Server

Published: 2004/08/20

Updated: 2019/03/06

Dependencies: 3035

Nessus ID: 10184

Risk Information

Risk Factor: Critical

CVSS v2.0

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

CVSS v3.0

Base Score: 9.8

Temporal Score: 8.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:qualcomm:qpopper

Reference Information

CVE: CVE-2002-0799, CVE-1999-0822, CVE-2000-0060, CVE-2000-0091, CVE-2001-0776, CVE-2001-1046, CVE-2002-0454, CVE-2002-0889, CVE-2002-1781

BID: 2781, 2811, 4055, 4295, 4614, 4789, 790, 894, 942, 830