POP3: Qpopper LIST Overflow

This signature detects an attempt to exploit a vulnerability in Qpopper. Version 3.0beta30 and many earlier versions are vulnerable. Authenticated users can exploit this vulnerability to execute commands on the server, or to access mailboxes of other users.

Extended Description

A remotely exploitable buffer-overflow vulnerability affects Qualcomm's 'qpopper' daemon. This issue allows users already in possession of a username and password for a POP account to compromise the server running the qpopper daemon. The problem lies in the code that handles the 'LIST' command available to logged-in users. By providing an overly long argument, an attacker may cause a buffer to overflow. As a result, the attacker can gain access with the user ID (UID) of the user whose account is being used for the attack and with the group ID (GID) mail. This will allow remote attackers to access the server itself and possibly (depending on how the computer is configured) to read other users' mail via the GID mail.

Affected Products

Qualcomm qpopper

Short Name
POP3:OVERFLOW:QPOP-OF2
Severity
Critical
Recommended
False
Recommended Action
Drop
Category
POP3
Keywords
CVE-2000-0096 LIST Overflow Qpopper bid:948
Release Date
04/22/2003
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3375
False Positive
Unknown
Vendors

Qualcomm

CVSS Score

7.2

Found a potential security threat?