Mailing the story:

SuSE alert: qpopper

  • Mailing list (Posted by on CST)
  • Story Type: Security; Groups: SUSE
The Post-Office-Protocol- (POP-) Server qpopper (version 4) was vulnerable to a buffer overflow. The buffer overflow occurs after authentication has taken place. Therefore pop-users with a valid account can execute arbitrary code on the system running qpopper. Depending on the setup, the malicious code is run with higher privileges.
What is your name?

What is your E-Mail address?

What is the email address of the recipient?

Add a special note from yourself?