First published: Tue Mar 18 2003(Updated: )
The pop_msg function in qpopper 4.0.x before 4.0.5fc2 does not null terminate a message buffer after a call to Qvsnprintf, which could allow authenticated users to execute arbitrary code via a buffer overflow in a mdef command with a long macro name.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Qualcomm Qpopper | =4.0.1 | |
Qualcomm Qpopper | =4.0.4 | |
Qualcomm Qpopper | =4.0.3 | |
Qualcomm Qpopper | =4.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2003-0143 has a high severity due to the potential for authenticated users to execute arbitrary code via a buffer overflow.
To fix CVE-2003-0143, upgrade qpopper to version 4.0.5fc2 or later.
CVE-2003-0143 affects qpopper versions 4.0.1 through 4.0.4.
CVE-2003-0143 is a buffer overflow vulnerability.
CVE-2003-0143 cannot be exploited remotely as it requires authenticated users to trigger the vulnerability.