Gentoo Logo

Qpopper: Multiple Vulnerabilities


1.  Gentoo Linux Security Advisory

Version Information

Advisory Reference GLSA 200505-17 / qpopper
Release Date May 23, 2005
Latest Revision May 23, 2005: 01
Impact normal
Exploitable local
Package Vulnerable versions Unaffected versions Architecture(s)
net-mail/qpopper < 4.0.5-r3 >= 4.0.5-r3 All supported architectures

Related bugreports: #90622


Qpopper contains two vulnerabilities allowing an attacker to overwrite arbitrary files and create files with insecure permissions.

2.  Impact Information


Qpopper is a widely used server for the POP3 protocol.


Jens Steube discovered that Qpopper doesn't drop privileges to process local files from normal users (CAN-2005-1151). The upstream developers discovered that Qpopper can be forced to create group or world writeable files (CAN-2005-1152).


A malicious local attacker could exploit Qpopper to overwrite arbitrary files as root or create new files which are group or world writeable.

3.  Resolution Information


There is no known workaround at this time.


All Qpopper users should upgrade to the latest available version:

Code Listing 3.1: Resolution

# emerge --sync
# emerge --ask --oneshot --verbose ">=net-mail/qpopper-4.0.5-r3"

4.  References


Page updated May 23, 2005

Summary: This is a Gentoo Linux Security Advisory

Security Team
Contact Address

Donate to support our development efforts.

Copyright 2001-2015 Gentoo Foundation, Inc. Questions, Comments? Contact us.