Bugtraq mailing list archives
Re: Bug in QPopper (All Versions?)
From: Tim Jackson <tim () timj co uk>
Date: Sat, 20 Apr 2002 14:18:42 +0100
On 15 Mar 2002 01:51:10 -0000 Dustin Childers wrote:
When sending a string that has 2048+ characters in it, the in.qpopper or popper process will begin to use massive amounts of CPU and will not stop until it is manually killed.
(BID 4295) There has been no posting by the vendor here that I've seen, but from the ChangeLog at ftp://ftp.qualcomm.com/eudora/servers/unix/popper/Changes : "Changes from 4.0.3 to 4.0.4: ---------------------------- 1. Fixed DOS attack seen on some systems." which is presumably a reference to the same issue. To confirm this, I did some tests on an Red Hat 7.2 i386 system. Results are as follows: Qpopper 4.0.3 (inetd mode via xinetd) - VULNERABLE Qpopper 4.0.3 (standalone mode) - NOT TESTED Qpopper 4.0.4 (inetd mode via xinetd) - NOT VULNERABLE Qpopper 4.0.4 (standalone mode) - NOT VULNERABLE If you want to install Qpopper as an RPM while you're updating it, you may be interested in my RPM spec file, which can be found at http://www.timj.co.uk/linux/ . Tim -- To assure privacy, you are encouraged to use strong encryption when sending e-mail to me. PGP key at http://timj.co.uk/TimPubKey.asc
Attachment:
_bin
Description:
Current thread:
- Re: Bug in QPopper (All Versions?) Tim Jackson (Apr 20)