Gentoo Logo

vpopmail: Multiple vulnerabilities

Content:

1.  Gentoo Linux Security Advisory

Version Information

Advisory Reference GLSA 200409-01 / vpopmail
Release Date September 01, 2004
Latest Revision September 01, 2004: 01
Impact high
Exploitable remote
Package Vulnerable versions Unaffected versions Architecture(s)
net-mail/vpopmail < 5.4.6 >= 5.4.6 All supported architectures

Related bugreports: #60844

Synopsis

vpopmail contains several bugs making it vulnerable to several SQL injection exploits as well as one buffer overflow and one format string exploit when using Sybase. This could lead to the execution of arbitrary code.

2.  Impact Information

Background

vpopmail handles virtual mail domains for qmail and Postfix.

Description

vpopmail is vulnerable to several unspecified SQL injection exploits. Furthermore when using Sybase as the backend database vpopmail is vulnerable to a buffer overflow and format string exploit.

Impact

These vulnerabilities could allow an attacker to execute code with the permissions of the user running vpopmail.

3.  Resolution Information

Workaround

There is no known workaround at this time. All users are encouraged to upgrade to the latest available version of vpopmail.

Resolution

All vpopmail users should upgrade to the latest version:

Code Listing 3.1: Resolution

# emerge sync
# emerge -pv ">=net-mail/vpopmail-5.4.6"
# emerge ">=net-mail/vpopmail-5.4.6"

4.  References



Print

Page updated September 01, 2004

Summary: This is a Gentoo Linux Security Advisory

Security Team
Contact Address

Donate to support our development efforts.

Copyright 2001-2014 Gentoo Foundation, Inc. Questions, Comments? Contact us.