[24701] in bugtraq

home help back first fref pref prev next nref lref last post

Bug in QPopper (All Versions?)

daemon@ATHENA.MIT.EDU (Dustin Childers)
Fri Mar 15 14:57:17 2002

Date: 15 Mar 2002 01:51:10 -0000
Message-ID: <20020315015110.14475.qmail@mail.securityfocus.com>
Content-Type: text/plain
Content-Disposition: inline
Content-Transfer-Encoding: binary
MIME-Version: 1.0
From: Dustin Childers <dustin@acm.org>
To: bugtraq@securityfocus.com



Description:
  When sending a string that has 2048+ characters in 
it, the
  in.qpopper or popper process will begin to use 
massive
  amounts of CPU and will not stop until it is manually 
killed.
 
Versions Affected:
  I tested this on 4.0.1 and 4.0.3.
  4.0.2 is probably vulnerable also.
  Older versions may also be vulnerable. I haven't 
tested those.
 
  This works locally and remotely.
 
Patch Information:
  I attempted to patch this but I was not successful. I 
found
  that the most reasonable place for this would be the 
msg_buf
  in popper/main.c or msg_buf in 
password/poppassd.c.

Dustin E. Childers
Security Administrator
http://www.digitux.net/

home help back first fref pref prev next nref lref last post