Qpopper: Multiple Vulnerabilities
Gentoo Linux Security Advisory
||GLSA 200505-17 / qpopper
||May 23, 2005
||May 23, 2005: 01
All supported architectures
Qpopper contains two vulnerabilities allowing an attacker to overwrite
arbitrary files and create files with insecure permissions.
Qpopper is a widely used server for the POP3 protocol.
Jens Steube discovered that Qpopper doesn't drop privileges to
process local files from normal users (CAN-2005-1151). The upstream
developers discovered that Qpopper can be forced to create group or
world writeable files (CAN-2005-1152).
A malicious local attacker could exploit Qpopper to overwrite
arbitrary files as root or create new files which are group or world
There is no known workaround at this time.
All Qpopper users should upgrade to the latest available version:
Code Listing 3.1: Resolution
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-mail/qpopper-4.0.5-r3"