Executive Summary
Summary | |
---|---|
Title | New qpopper packages fix arbitrary file overwriting |
Informations | |||
---|---|---|---|
Name | DSA-728 | First vendor Publication | 2005-05-25 |
Vendor | Debian | Last vendor Modification | 2005-05-26 |
Severity (Vendor) | N/A | Revision | 2 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:L/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 7.2 | Attack Range | Local |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 3.9 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
This advisory does only covers updated packages for Debian 3.0 alias woody. Two bugs have been discovered in qpopper, an enhanced Post Office Protocol (POP3) server. The Common Vulnerability and Exposures project identifies the following problems: CAN-2005-1151 Jens Steube discovered that while processing local files owned or provided by a normal user privileges weren't dropped, which could lead to the overwriting or creation of arbitrary files as root. CAN-2005-1152 The upstream developers noticed that qpopper could be tricked to creating group- or world-writable files. For the stable distribution (woody) these problems have been fixed in version 4.0.4-2.woody.5. For the testing distribution (sarge) these problems have been fixed in version 4.0.5-4sarge1. For the unstable distribution (sid) these problems will be fixed in version 4.0.5-4sarge1. We recommend that you upgrade your qpopper package. |
Original Source
Url : http://www.debian.org/security/2005/dsa-728 |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 1 |
OpenVAS Exploits
Date | Description |
---|---|
2008-09-24 | Name : Gentoo Security Advisory GLSA 200505-17 (qpopper) File : nvt/glsa_200505_17.nasl |
2008-09-04 | Name : FreeBSD Ports: qpopper File : nvt/freebsd_qpopper0.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 728-1 (qpopper) File : nvt/deb_728_1.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 728-2 (qpopper) File : nvt/deb_728_2.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
16811 | Qpopper Unspecified Privileged File Creation Qpopper contains a flaw that may lead to an unauthorized information disclosure. The issue is triggered when Qpopper fails to set a proper umask for its process, causing it to create unspecified group- and world-writable files which could contribute to further attacks including privilege escalation. |
16810 | Qpopper Crafted config/trace File Privilege Escalation |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2012-01-12 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-773.nasl - Type : ACT_GATHER_INFO |
2009-09-24 | Name : The remote SuSE 9 host is missing a security-related patch. File : suse9_10045.nasl - Type : ACT_GATHER_INFO |
2006-05-13 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_eb29a575338111da8340000e0c2e438a.nasl - Type : ACT_GATHER_INFO |
2005-06-17 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-728.nasl - Type : ACT_GATHER_INFO |
2005-05-28 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200505-17.nasl - Type : ACT_GATHER_INFO |
2005-05-24 | Name : The remote POP3 server is affected by multiple file handling flaws. File : qpopper_file_handling_vulns.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:34:03 |
|