Short Name |
POP3:OVERFLOW:QPOP-OF2 |
---|---|
Severity |
Critical |
Recommended |
No |
Recommended Action |
Drop |
Category |
POP3 |
Release Date |
2003/04/22 |
Update Number |
1213 |
Supported Platforms |
di-5.3+, idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects an attempt to exploit a vulnerability in Qpopper. Version 3.0beta30 and many earlier versions are vulnerable. Authenticated users can exploit this vulnerability to execute commands on the server, or to access mailboxes of other users.
A remotely exploitable buffer-overflow vulnerability affects Qualcomm's 'qpopper' daemon. This issue allows users already in possession of a username and password for a POP account to compromise the server running the qpopper daemon. The problem lies in the code that handles the 'LIST' command available to logged-in users. By providing an overly long argument, an attacker may cause a buffer to overflow. As a result, the attacker can gain access with the user ID (UID) of the user whose account is being used for the attack and with the group ID (GID) mail. This will allow remote attackers to access the server itself and possibly (depending on how the computer is configured) to read other users' mail via the GID mail.