vendor:
Qpopper
by:
prizm/Buffer0verflow Security
7.5
CVSS
HIGH
Buffer Overflow
120
CWE
Product Name: Qpopper
Affected Version From: 2.53 and prior
Affected Version To: 2.53
Patch Exists: YES
Related CWE: N/A
CPE: o:qualcomm:qpopper
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2001
Buffer Overflow in Qpopper 2.53
A vulnerability exists in version 2.53 and prior of qpopper, a popular POP server, from Qualcomm. By placing machine executable code in the X-UIDL header field, supplying formatting strings in the 'From:' field in a mail header, and then issuing, as the user the mail was sent to, a 'euidl' command, it is possible to execute arbitrary code. This code will execute as the user executing the euidl command, but with group 'mail' permissions on hosts running qpopper in that group.
Mitigation:
Upgrade to version 2.53 or later