Mail Notification POP3 Malformed STAT Reply Overflow

2004-10-06T05:33:24
ID OSVDB:10565
Type osvdb
Reporter OSVDB
Modified 2004-10-06T05:33:24

Description

Vulnerability Description

A remote overflow exists in Mail Notification. Mail Notification fails to perform sufficient input validation in POP3 code resulting in a stack overflow. Using a malformed STAT reply, an attacker can execute arbitrary code with privileges of the user running Mail Notification resulting in a loss of integrity. Note: To successfully exploit this vulnerability the attacker must first hijack the connection between Mail Notification and the POP3 server.

Solution Description

Upgrade to version 0.4.0 or higher, as it has been reported to fix this vulnerability. It is also possible to correct the flaw by implementing the following workaround(s): Do not monitor a POP3 mailbox. If you want to ensure that the faulty code will not be used, reinstall Mail Notification using the following commands: $ ./configure --disable-pop3 $ make $ make install

Short Description

A remote overflow exists in Mail Notification. Mail Notification fails to perform sufficient input validation in POP3 code resulting in a stack overflow. Using a malformed STAT reply, an attacker can execute arbitrary code with privileges of the user running Mail Notification resulting in a loss of integrity. Note: To successfully exploit this vulnerability the attacker must first hijack the connection between Mail Notification and the POP3 server.

References:

Vendor URL: http://www.nongnu.org/mailnotify/ Vendor Specific Advisory URL