File: 1937.txt

package info (click to toggle)
snort 2.7.0-20.4
  • links: PTS
  • area: main
  • in suites: lenny
  • size: 34,512 kB
  • ctags: 18,772
  • sloc: ansic: 115,404; sh: 10,893; makefile: 1,372; perl: 487; sql: 213
file content (64 lines) | stat: -rw-r--r-- 1,445 bytes parent folder | download | duplicates (6)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
Rule:

--
Sid:
1937

--
Summary:
This event is generated when an attempt is made to exploit a buffer 
overflow vulnerability using the LIST command on mail servers running 
the qpopper daemon.

--
Impact: Remote Access. 
This attack can allow an attacker to read other users mail as the Group 
ID mail.

--
Detailed Information: 
The attacker needs the username and password of a POP account on the 
server.  After a successful POP login, the attacker can cause a buffer 
overflow using the LIST command.  After successfully exploiting the 
qpopper daemon the attacker has remote access of the server with the UID
of the username used for the POP login and the GID of 'mail'.

--
Affected Systems: 
	Qualcomm qpopper 3.0 and 3.0 beta 1 through beta 29.

--
Attack Scenarios: 
An attacker can log in to a vulnerable mail server using a preexisting 
POP account and enter an overly long argument with the LIST command, 
causing a buffer overflow which may then result in remote access.

--
Ease of Attack: 
Simple.  Exploits exist.

--
False Positives: 
None known.

--
False Negatives: 
None Known.

--
Corrective Action: 
Upgrade to Qualcomm qpopper 3.0 beta 30 or higher.

--
Contributors: 
Snort documentation contributed by Chris Davis <christopher.davis@guardent.com>
Sourcefire Research Team
Brian Caswell <bmc@sourcefire.com>
Nigel Houghton <nigel.houghton@sourcefire.com>

-- 
Additional References:  
cve: CAN-2000-0096
bugtraq: 948

--