[25314] in bugtraq

home help back first fref pref prev next nref lref last post

Re: QPopper 4.0.4 buffer overflow

daemon@ATHENA.MIT.EDU (J Mike Rollins)
Tue Apr 30 11:53:09 2002

Date: Tue, 30 Apr 2002 09:43:53 -0400 (EDT)
From: J Mike Rollins <rollins@wfu.edu>
To: bugtraq@securityfocus.com
In-Reply-To: <006d01c1e768$56cc01f0$7507b33e@luscinia>
Message-ID: <Pine.A41.4.44.0204300933470.54734-100000@f1n11.spenet.wfu.edu>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII


> Affected versions 4.0.3 and 4.0.4. default install.
> Servers, not processing user`s configuration file
> (~/.qpopper-options) are insensible to this bug.

Our testing has shown that you must use the -u parameter to be susceptible
to this vulnerability.

If you don't use the -u parameter for qpopper this file is not accessed.

You can use the -d parameter to view the debug output to verify this.

Mike

      UNIX Systems Administrator at Wake Forest University.
======================================================================
          J. Mike Rollins              rollins@wfu.edu
     Wake Forest University     http://www.wfu.edu/~rollins
        Winston-Salem, NC            work: (336) 758-1938
======================================================================




home help back first fref pref prev next nref lref last post