Qpopper: Multiple Vulnerabilities — GLSA 200505-17

Qpopper contains two vulnerabilities allowing an attacker to overwrite arbitrary files and create files with insecure permissions.

Affected packages

net-mail/qpopper on all architectures
Affected versions < 4.0.5-r3
Unaffected versions >= 4.0.5-r3

Background

Qpopper is a widely used server for the POP3 protocol.

Description

Jens Steube discovered that Qpopper doesn't drop privileges to process local files from normal users (CAN-2005-1151). The upstream developers discovered that Qpopper can be forced to create group or world writeable files (CAN-2005-1152).

Impact

A malicious local attacker could exploit Qpopper to overwrite arbitrary files as root or create new files which are group or world writeable.

Workaround

There is no known workaround at this time.

Resolution

All Qpopper users should upgrade to the latest available version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=net-mail/qpopper-4.0.5-r3"

References

Release date
May 23, 2005

Latest revision
May 23, 2005: 01

Severity
normal

Exploitable
local

Bugzilla entries