15 results (0.004 seconds)

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 0

qpopper 4.0.5 and earlier does not properly drop privileges before processing certain user-supplied files, which allows local users to overwrite or create arbitrary files as root. • http://bugs.gentoo.org/show_bug.cgi?id=90622 http://secunia.com/advisories/15475 http://secunia.com/advisories/15478 http://secunia.com/advisories/15505 http://www.debian.org/security/2005/dsa-728 http://www.gentoo.org/security/en/glsa/glsa-200505-17.xml •

CVSS: 2.1EPSS: 0%CPEs: 2EXPL: 0

popauth.c in qpopper 4.0.5 and earlier does not properly set the umask, which may cause qpopper to create files with group or world-writable permissions. • http://bugs.gentoo.org/attachment.cgi?id=58329&action=view http://bugs.gentoo.org/show_bug.cgi?id=90622 http://secunia.com/advisories/15475 http://secunia.com/advisories/15478 http://secunia.com/advisories/15505 http://www.debian.org/security/2005/dsa-728 http://www.gentoo.org/security/en/glsa/glsa-200505-17.xml •

CVSS: 3.6EPSS: 0%CPEs: 8EXPL: 4

Untrusted search path vulnerability in Qualcomm qpopper 4.0 through 4.05 allows local users to execute arbitrary code by modifying the PATH environment variable to reference a malicious smbpasswd program. • https://www.exploit-db.com/exploits/21 http://archives.neohapsis.com/archives/vulnwatch/2003-q2/0047.html http://securityreason.com/securityalert/3268 http://www.securityfocus.com/archive/1/319811 http://www.securityfocus.com/bid/7447 https://exchange.xforce.ibmcloud.com/vulnerabilities/11877 • CWE-16: Configuration •

CVSS: 10.0EPSS: 1%CPEs: 4EXPL: 2

The pop_msg function in qpopper 4.0.x before 4.0.5fc2 does not null terminate a message buffer after a call to Qvsnprintf, which could allow authenticated users to execute arbitrary code via a buffer overflow in a mdef command with a long macro name. La función pop_msg en qpopper 4.0.x antes de 4.0.5fc2 no termina en nulo un búfer de mensaje despues de una llamada a Qvsnprintf, lo que podría permitir a usuarios autenticados ejecutar código arbitrario mediante un desbordamiento de búfer en un comando mdef con un nombre de macro largo. • https://www.exploit-db.com/exploits/22342 http://marc.info/?l=bugtraq&m=104739841223916&w=2 http://marc.info/?l=bugtraq&m=104748775900481&w=2 http://marc.info/?l=bugtraq&m=104768137314397&w=2 http://marc.info/?l=bugtraq&m=104792541215354&w=2 http://www.debian.org/security/2003/dsa-259 http://www.novell.com/linux/security/advisories/2003_018_qpopper.html http://www.securityfocus.com/bid/7058 https://exchange.xforce.ibmcloud.com/vulnerabilities/11516 •

CVSS: 4.6EPSS: 0%CPEs: 2EXPL: 0

Buffer overflow in Qpopper (popper) 4.0.4 and earlier allows local users to cause a denial of service and possibly execute arbitrary code via a long bulldir argument in the user's .qpopper-options configuration file. • http://marc.info/?l=vuln-dev&m=102003707432457&w=2 http://online.securityfocus.com/archive/1/269969 http://www.iss.net/security_center/static/8949.php http://www.securityfocus.com/bid/4614 •