Qualcomm Qpopper Username Remote Overflow

Critical Nessus Network Monitor Plugin ID 1794

Synopsis

The remote host is vulnerable to a buffer overflow.

Description

In version 4, a buffer overflow was introduced into the qpopper source tree. This buffer overflow is related to the handling of the client-supplied username and is present when a POP3 session is being initiated. It is believed that the overflow occurs before authentication, so it may not be required that users have valid POP accounts. This vulnerability can lead to a compromise of root privileges to remote attackers.

Solution

Upgrade to the latest version.

See Also

http://online.securityfocus.com/archive/1/27197

Plugin Details

Severity: Critical

ID: 1794

File Name: 1794.prm

Family: POP Server

Published: 2004/08/20

Modified: 2016/01/19

Dependencies: 3035

Nessus ID: 10184

Risk Information

Risk Factor: Critical

CVSSv2

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

CVSSv3

Base Score: 9.8

Temporal Score: 8.5

Vector: CVSS3#AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS3#E:U/RL:O/RC:C

Reference Information

CVE: CVE-1999-0822, CVE-2000-0060, CVE-2000-0091, CVE-2001-0776, CVE-2002-0454, CVE-2002-0889, CVE-2002-1781, CVE-2002-0799, CVE-2001-1046

BID: 2781, 4055, 4295, 4614, 4789, 790, 830, 894, 942, 2811

OSVDB: 1176, 1204, 12076, 13970, 5058, 5290, 57175, 59759, 6992, 776