Family: Gentoo Local Security Checks --> Category: infos
[GLSA-200611-15] qmailAdmin: Buffer overflow Vulnerability Scan
Vulnerability Scan Summary
qmailAdmin: Buffer overflow
Detailed Explanation for this Vulnerability Test
The remote host is affected by the vulnerability described in GLSA-200611-15
(qmailAdmin: Buffer overflow)
qmailAdmin fails to properly handle the "PATH_INFO" variable in
qmailadmin.c. The PATH_INFO is a standard CGI environment variable
filled with user supplied data.
A remote attacker could exploit this vulnerability by sending
qmailAdmin a maliciously crafted URL that could lead to the execution
of arbitrary code with the permissions of the user running qmailAdmin.
There is no known workaround at this time.
All qmailAdmin users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-mail/qmailadmin-1.2.10"
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.