Nessus Plugin #15096

Plugin Index

Note: This file has been created from a downloaded version of the Nessus Plugins from http://www.nessus.org/. Therefore, the information here can be outdated.

[DSA259] DSA-259-1 qpopper

Family:
Debian Local Security Checks
Category:
infos
Copyright:
This script is (C) 2004 Michel Arboi
Summary:
DSA-259-1 qpopper
Version:
$Revision: 1.4 $
Cve_id:
CVE-2003-0143
Bugtraq_id:
-
Xrefs:
DSA:259
Description:

Florian Heinz heinz@cronon-ag.de posted to the Bugtraq mailing list an
exploit for qpopper based on a bug in the included vsnprintf implementation.
The sample exploit requires a valid user account and password, and overflows a
string in the pop_msg() function to give the user "mail" group privileges and a
shell on the system. Since the Qvsnprintf function is used elsewhere in
qpopper, additional exploits may be possible.
The qpopper package in Debian 2.2 (potato) does not include the vulnerable
snprintf implementation. For Debian 3.0 (woody) an updated package is available
in version 4.0.4-2.woody.3. Users running an unreleased version of Debian
should upgrade to 4.0.4-9 or newer. We recommend you upgrade your qpopper
package immediately.


Solution : http://www.debian.org/security/2003/dsa-259
Risk factor : High
Generiert am 27.04.2005 um 18:49:54 Uhr.