Executive Summary

Informations
Name CVE-2003-0143 First vendor Publication 2003-03-18
Vendor Cve Last vendor Modification 2017-10-10

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 10 Attack Range Network
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

The pop_msg function in qpopper 4.0.x before 4.0.5fc2 does not null terminate a message buffer after a call to Qvsnprintf, which could allow authenticated users to execute arbitrary code via a buffer overflow in a mdef command with a long macro name.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0143

CWE : Common Weakness Enumeration

% Id Name

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 4

OpenVAS Exploits

Date Description
2008-01-17 Name : Debian Security Advisory DSA 259-1 (qpopper)
File : nvt/deb_259_1.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
9794 Qpopper pop_msg() Macroname Remote Overflow

A remote overflow exists in Qpopper. The server fails to properly check the length of macronames supplied to the pop_msg() function resulting in a buffer overflow. With a specially crafted request, an attacker can cause a denial of service or potentially execute arbitrary code. This attack requires valid user authentication credentials.

Nessus® Vulnerability Scanner

Date Description
2004-09-29 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-259.nasl - Type : ACT_GATHER_INFO
2004-07-25 Name : The remote host is missing a vendor-supplied security patch
File : suse_SA_2003_018.nasl - Type : ACT_GATHER_INFO
2003-03-13 Name : Arbitrary code may be run on the remote host.
File : qpopper_qvsnprinf_overflow.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
BID http://www.securityfocus.com/bid/7058
BUGTRAQ http://marc.info/?l=bugtraq&m=104739841223916&w=2
http://marc.info/?l=bugtraq&m=104748775900481&w=2
http://marc.info/?l=bugtraq&m=104768137314397&w=2
DEBIAN http://www.debian.org/security/2003/dsa-259
GENTOO http://marc.info/?l=bugtraq&m=104792541215354&w=2
SUSE http://www.novell.com/linux/security/advisories/2003_018_qpopper.html
XF https://exchange.xforce.ibmcloud.com/vulnerabilities/11516

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
Date Informations
2021-05-04 12:02:01
  • Multiple Updates
2021-04-22 01:02:07
  • Multiple Updates
2020-05-23 00:15:21
  • Multiple Updates
2017-10-10 09:23:25
  • Multiple Updates
2016-10-18 12:01:09
  • Multiple Updates
2014-02-17 10:25:53
  • Multiple Updates
2013-05-11 11:50:38
  • Multiple Updates