vpopmail: Multiple vulnerabilities — GLSA 200409-01

vpopmail contains several bugs making it vulnerable to several SQL injection exploits as well as one buffer overflow and one format string exploit when using Sybase. This could lead to the execution of arbitrary code.

Affected packages

net-mail/vpopmail on all architectures
Affected versions < 5.4.6
Unaffected versions >= 5.4.6

Background

vpopmail handles virtual mail domains for qmail and Postfix.

Description

vpopmail is vulnerable to several unspecified SQL injection exploits. Furthermore when using Sybase as the backend database vpopmail is vulnerable to a buffer overflow and format string exploit.

Impact

These vulnerabilities could allow an attacker to execute code with the permissions of the user running vpopmail.

Workaround

There is no known workaround at this time. All users are encouraged to upgrade to the latest available version of vpopmail.

Resolution

All vpopmail users should upgrade to the latest version:

 # emerge sync

 # emerge -pv ">=net-mail/vpopmail-5.4.6"
 # emerge ">=net-mail/vpopmail-5.4.6"

References

Release date
September 01, 2004

Latest revision
September 01, 2004: 01

Severity
high

Exploitable
remote

Bugzilla entries