Nessus Plugin #15096
Plugin Index
Note: This file has been created from a
downloaded version of the Nessus Plugins
from
http://www.nessus.org/.
Therefore, the information here can be outdated.
[DSA259] DSA-259-1 qpopper
- Family:
- Debian Local Security Checks
- Category:
- infos
- Copyright:
- This script is (C) 2004 Michel Arboi
- Summary:
- DSA-259-1 qpopper
- Version:
- $Revision: 1.4 $
- Cve_id:
- CVE-2003-0143
- Bugtraq_id:
- -
- Xrefs:
- DSA:259
- Description:
Florian Heinz heinz@cronon-ag.de posted to the Bugtraq mailing list an
exploit for qpopper based on a bug in the included vsnprintf implementation.
The sample exploit requires a valid user account and password, and overflows a
string in the pop_msg() function to give the user "mail" group privileges and a
shell on the system. Since the Qvsnprintf function is used elsewhere in
qpopper, additional exploits may be possible.
The qpopper package in Debian 2.2 (potato) does not include the vulnerable
snprintf implementation. For Debian 3.0 (woody) an updated package is available
in version 4.0.4-2.woody.3. Users running an unreleased version of Debian
should upgrade to 4.0.4-9 or newer. We recommend you upgrade your qpopper
package immediately.
Solution : http://www.debian.org/security/2003/dsa-259
Risk factor : High
Generiert am 27.04.2005 um 18:49:54 Uhr.