First published: Tue Mar 18 2003(Updated: )
The pop_msg function in qpopper 4.0.x before 4.0.5fc2 does not null terminate a message buffer after a call to Qvsnprintf, which could allow authenticated users to execute arbitrary code via a buffer overflow in a mdef command with a long macro name.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Qualcomm Qpopper | =4.0.1 | |
Qualcomm Qpopper | =4.0.4 | |
Qualcomm Qpopper | =4.0.3 | |
Qualcomm Qpopper | =4.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.