Qualcomm Qpopper Remote Overflows

Critical Nessus Network Monitor Plugin ID 1793

Synopsis

The remote host is running a vulnerable version of the Qualcomm popper daemon.

Description

There are buffer overflow vulnerabilities present in 3.x versions of the Qualcomm popper daemon. These vulnerabilities are remotely executable and since the daemons run as root, the host running qpopper can be completely compromised anonymously.

Solution

Upgrade to the newest version.

See Also

http://online.securityfocus.com/archive/1/27197

Plugin Details

Severity: Critical

ID: 1793

Family: POP Server

Published: 2004/08/20

Updated: 2019/03/06

Dependencies: 3035

Nessus ID: 10184

Risk Information

Risk Factor: Critical

CVSS v2.0

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

CVSS v3.0

Base Score: 9.8

Temporal Score: 8.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:qualcomm:qpopper

Reference Information

CVE: CVE-2002-0799, CVE-1999-0822, CVE-2000-0060, CVE-2000-0091, CVE-2001-0776, CVE-2001-1046, CVE-2002-0454, CVE-2002-0889, CVE-2002-1781

BID: 2781, 2811, 4055, 4295, 4614, 4789, 790, 894, 942, 830