|
Family: Gain root remotely --> Category: destructive_attack
Various pop3 overflows Vulnerability Scan
Vulnerability Scan Summary Attempts to overflow the in.pop3d buffers
Detailed Explanation for this Vulnerability Test
The remote POP3 server might be vulnerable to a buffer overflow
bug when it is issued at least one of these commands, with a too long
argument :
auth
user
pass
If confirmed, this problem might allow a possible hacker to execute
arbitrary code on the remote system, thus giving him an interactive
session on this host.
Solution : If you do not use POP3, disable this service in /etc/inetd.conf
and restart the inetd process. Otherwise, upgrade to a newer version.
See also : http://online.securityfocus.com/archive/1/27197
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.
|