Gentoo Logo

Qpopper: Multiple Vulnerabilities

Content:

1.  Gentoo Linux Security Advisory

Version Information

Advisory Reference GLSA 200505-17 / qpopper
Release Date May 23, 2005
Latest Revision May 23, 2005: 01
Impact normal
Exploitable local
Package Vulnerable versions Unaffected versions Architecture(s)
net-mail/qpopper < 4.0.5-r3 >= 4.0.5-r3 All supported architectures

Related bugreports: #90622

Synopsis

Qpopper contains two vulnerabilities allowing an attacker to overwrite arbitrary files and create files with insecure permissions.

2.  Impact Information

Background

Qpopper is a widely used server for the POP3 protocol.

Description

Jens Steube discovered that Qpopper doesn't drop privileges to process local files from normal users (CAN-2005-1151). The upstream developers discovered that Qpopper can be forced to create group or world writeable files (CAN-2005-1152).

Impact

A malicious local attacker could exploit Qpopper to overwrite arbitrary files as root or create new files which are group or world writeable.

3.  Resolution Information

Workaround

There is no known workaround at this time.

Resolution

All Qpopper users should upgrade to the latest available version:

Code Listing 3.1: Resolution

# emerge --sync
# emerge --ask --oneshot --verbose ">=net-mail/qpopper-4.0.5-r3"

4.  References



Print

Page updated May 23, 2005

Summary: This is a Gentoo Linux Security Advisory

Security Team
Contact Address

Donate to support our development efforts.

Copyright 2001-2014 Gentoo Foundation, Inc. Questions, Comments? Contact us.