blob: cc6b59089531fa35a8bb247a4f9614850c6d01cd [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200505-17">
<title>Qpopper: Multiple Vulnerabilities</title>
Qpopper contains two vulnerabilities allowing an attacker to overwrite
arbitrary files and create files with insecure permissions.
<product type="ebuild">qpopper</product>
<announced>May 23, 2005</announced>
<revised>May 23, 2005: 01</revised>
<package name="net-mail/qpopper" auto="yes" arch="*">
<unaffected range="ge">4.0.5-r3</unaffected>
<vulnerable range="lt">4.0.5-r3</vulnerable>
Qpopper is a widely used server for the POP3 protocol.
Jens Steube discovered that Qpopper doesn't drop privileges to
process local files from normal users (CAN-2005-1151). The upstream
developers discovered that Qpopper can be forced to create group or
world writeable files (CAN-2005-1152).
<impact type="normal">
A malicious local attacker could exploit Qpopper to overwrite
arbitrary files as root or create new files which are group or world
There is no known workaround at this time.
All Qpopper users should upgrade to the latest available version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=net-mail/qpopper-4.0.5-r3&quot;</code>
<uri link="">CAN-2005-1151</uri>
<uri link="">CAN-2005-1152</uri>
<metadata tag="submitter" timestamp="Tue, 10 May 2005 16:31:30 +0000">
<metadata tag="bugReady" timestamp="Mon, 23 May 2005 19:25:37 +0000">