Short Name |
OS:LINUXX86:POP2-OF-1 |
---|---|
Severity |
Critical |
Recommended |
No |
Recommended Action |
Drop |
Category |
OS |
Keywords |
Linux x86 Pop2 Buffer Overflow (1) |
Release Date |
2003/04/22 |
Update Number |
1213 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a known vulnerability in the pop2 daemon running on LINUX. Versions 4.4 and earlier are susceptible. Pop2 servers support anonymous proxy, where users can remotely instruct a server to open an IMAP mailbox on another server for which they have an account and execute commands under the user id "nobody". Attackers can log on through anonymous proxy and execute a 1000-byte FOLD command argument to cause a stack-based buffer overflow and gain root access.
A buffer overflow vulnerability in pop2d version 4.4 or earlier allow malicious remote users to obtain access to the "nobody" user account. The pop2 and pop3 servers support the concept of an "anonymous proxy", whereby a remote user connecting to the server can instruct it to open an IMAP mailbox on some other saver they have a valid account on. In this state the pop2 server runs under the "nobody" user id. Once logged on, issuing a FOLD command with an argument of about 1000 bytes will cause a stack based buffer overflow.