Qpopper远程内存损坏漏洞

漏洞信息详情

Qpopper远程内存损坏漏洞

漏洞简介

Qpopper 4.0.5fc2之前4.0.x版本的pop_msg函数在Qvsnprintf调用消息缓冲区后没有将其空终止,认证用户可以借助带有超长宏名称的mdef命令的缓冲区溢出执行任意代码。

漏洞公告

Sun have released a security update to address this issue in the RAQ XTR. Please see references section for further details. A fix is linked below.
SuSE has released a security advisory (SuSE-SA:2003:018) which contains fixes for this issue. Users are advised to upgrade as soon as possible.
Gentoo Linux have released an advisory that addresses this vulnerability (200303-12), users who are running net-mail/qpopper are advised to upgrade to qpopper-4.0.5 by issuing the following commands:
emerge sync
emerge qpopper
emerge clean
Debian has released a security advisory (DSA-259-1) which contains fixes for this issue. Users are advised to upgrade as soon as possible.
Qpopper version 4.0.5fc2 contains fixes for this issue. The vendor has also reported that the final version of 4.0.5 is pending release, and will also contain the fixes for this issue.
*** Additional information has been released which puts in question the changes made in Qpopper version 4.0.5fc2. As a result, users who have updated Qpopper may still be affected by this issue. Further details are available in the references section.
Sun Cobalt RaQ XTR

Qualcomm qpopper 4.0.1

Qualcomm qpopper 4.0.2

Qualcomm qpopper 4.0.3

Qualcomm qpopper 4.0.4

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享