Gentoo Logo

vpopmail: Multiple vulnerabilities


1.  Gentoo Linux Security Advisory

Version Information

Advisory Reference GLSA 200409-01 / vpopmail
Release Date September 01, 2004
Latest Revision September 01, 2004: 01
Impact high
Exploitable remote
Package Vulnerable versions Unaffected versions Architecture(s)
net-mail/vpopmail < 5.4.6 >= 5.4.6 All supported architectures

Related bugreports: #60844


vpopmail contains several bugs making it vulnerable to several SQL injection exploits as well as one buffer overflow and one format string exploit when using Sybase. This could lead to the execution of arbitrary code.

2.  Impact Information


vpopmail handles virtual mail domains for qmail and Postfix.


vpopmail is vulnerable to several unspecified SQL injection exploits. Furthermore when using Sybase as the backend database vpopmail is vulnerable to a buffer overflow and format string exploit.


These vulnerabilities could allow an attacker to execute code with the permissions of the user running vpopmail.

3.  Resolution Information


There is no known workaround at this time. All users are encouraged to upgrade to the latest available version of vpopmail.


All vpopmail users should upgrade to the latest version:

Code Listing 3.1: Resolution

# emerge sync
# emerge -pv ">=net-mail/vpopmail-5.4.6"
# emerge ">=net-mail/vpopmail-5.4.6"

4.  References


Page updated September 01, 2004

Summary: This is a Gentoo Linux Security Advisory

Security Team
Contact Address

Donate to support our development efforts.

Copyright 2001-2015 Gentoo Foundation, Inc. Questions, Comments? Contact us.