Family: Gain root remotely --> Category: destructive_attack
poppassd USER overflow Vulnerability Scan
Vulnerability Scan Summary
Sends a too long USER command to poppassd
Detailed Explanation for this Vulnerability Test
The remote poppassd daemon crashes when a too
long name is sent after the USER command.
It might be possible for a remote cracker to run
arbitrary code on this machine.
Solution : upgrade your software or use another one
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.