Lucene search

K
gentooGentoo FoundationGLSA-200505-17
HistoryMay 23, 2005 - 12:00 a.m.

Qpopper: Multiple Vulnerabilities

2005-05-2300:00:00
Gentoo Foundation
security.gentoo.org
7

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

EPSS

0.001

Percentile

25.6%

Background

Qpopper is a widely used server for the POP3 protocol.

Description

Jens Steube discovered that Qpopper doesn’t drop privileges to process local files from normal users (CAN-2005-1151). The upstream developers discovered that Qpopper can be forced to create group or world writeable files (CAN-2005-1152).

Impact

A malicious local attacker could exploit Qpopper to overwrite arbitrary files as root or create new files which are group or world writeable.

Workaround

There is no known workaround at this time.

Resolution

All Qpopper users should upgrade to the latest available version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=net-mail/qpopper-4.0.5-r3"
OSVersionArchitecturePackageVersionFilename
Gentooanyallnet-mail/qpopper< 4.0.5-r3UNKNOWN

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

EPSS

0.001

Percentile

25.6%