vpopmail contains several bugs making it vulnerable to several SQL injection exploits as well as one buffer overflow and one format string exploit when using Sybase. This could lead to the execution of arbitrary code.
|Package||net-mail/vpopmail on all architectures|
|Affected versions||< 5.4.6|
|Unaffected versions||>= 5.4.6|
vpopmail handles virtual mail domains for qmail and Postfix.
vpopmail is vulnerable to several unspecified SQL injection exploits. Furthermore when using Sybase as the backend database vpopmail is vulnerable to a buffer overflow and format string exploit.
These vulnerabilities could allow an attacker to execute code with the permissions of the user running vpopmail.
There is no known workaround at this time. All users are encouraged to upgrade to the latest available version of vpopmail.
All vpopmail users should upgrade to the latest version:
# emerge sync # emerge -pv ">=net-mail/vpopmail-5.4.6" # emerge ">=net-mail/vpopmail-5.4.6"
September 01, 2004
September 01, 2004: 01