vendor:
Qpopper
by:
Zhodiac
7.5
CVSS
HIGH
Buffer Overflow
120
CWE
Product Name: Qpopper
Affected Version From: 3.0beta29 or lower
Affected Version To: 3.0beta29 or lower
Patch Exists: YES
Related CWE: N/A
CPE: a:qualcomm:qpopper
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Linux (x86)
2000
Remotely Exploitable Buffer-Overflow Vulnerability in Qualcomm’s ‘qpopper’ Daemon
A remotely exploitable buffer-overflow vulnerability affects Qualcomm's 'qpopper' daemon. This issue allows users already in possession of a username and password for a POP account to compromise the server running the qpopper daemon. The problem lies in the code that handles the 'LIST' command available to logged-in users. By providing an overly long argument, an attacker may cause a buffer to overflow. As a result, the attacker can gain access with the user ID (UID) of the user whose account is being used for the attack and with the group ID (GID) mail.
Mitigation:
Upgrade to the latest version of qpopper daemon.