Family: Debian Local Security Checks --> Category: infos
[DSA259] DSA-259-1 qpopper Vulnerability Scan
Vulnerability Scan Summary
Detailed Explanation for this Vulnerability Test
Florian Heinz email@example.com posted to the Bugtraq mailing list an
exploit for qpopper based on a bug in the included vsnprintf implementation.
The sample exploit requires a valid user account and password, and overflows a
string in the pop_msg() function to give the user "mail" group rights and a
shell on the system. Since the Qvsnprintf function is used elsewhere in
qpopper, additional exploits may be possible.
The qpopper package in Debian 2.2 (potato) does not include the vulnerable
snprintf implementation. For Debian 3.0 (woody) an updated package is available
in version 4.0.4-2.woody.3. Users running an unreleased version of Debian
should upgrade to 4.0.4-9 or newer. We recommend you upgrade your qpopper
Solution : http://www.debian.org/security/2003/dsa-259
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.