Debian Essential And Critical Security Patch Updates - Page 285

Find the information you need for your favorite open source distribution .

Debian: qpopper Privilege escalation

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The sample exploit requires a valid user account and password, and overflows astring in the pop_msg() function to give the user "mail" group privileges and ashell on the system. Since the Qvsnprintf function is used elsewhere inqpopper, additional exploits may be possible.