Qualcomm Qpopper Remote Overflows

Critical Nessus Network Monitor Plugin ID 1793

Synopsis

The remote host is running a vulnerable version of the Qualcomm popper daemon.

Description

There are buffer overflow vulnerabilities present in 3.x versions of the Qualcomm popper daemon. These vulnerabilities are remotely executable and since the daemons run as root, the host running qpopper can be completely compromised anonymously.

Solution

Upgrade to the newest version.

See Also

http://online.securityfocus.com/archive/1/27197

Plugin Details

Severity: Critical

ID: 1793

File Name: 1793.prm

Family: POP Server

Published: 2004/08/20

Modified: 2016/01/19

Dependencies: 3035

Nessus ID: 10184

Risk Information

Risk Factor: Critical

CVSSv2

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

CVSSv3

Base Score: 9.8

Temporal Score: 8.5

Vector: CVSS3#AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS3#E:U/RL:O/RC:C

Reference Information

CVE: CVE-2002-0799, CVE-1999-0822, CVE-2000-0060, CVE-2000-0091, CVE-2001-0776, CVE-2001-1046, CVE-2002-0454, CVE-2002-0889, CVE-2002-1781

BID: 2781, 2811, 4055, 4295, 4614, 4789, 790, 894, 942, 830