|
lug-bg: Fwd: Qpopper 4.0 Buffer Overflow
- Subject: lug-bg: Fwd: Qpopper 4.0 Buffer Overflow
- From: firedust@xxxxxxx (Stanislav Lechev)
- Date: Fri, 20 Apr 2001 17:27:24 +0300
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
koj kaza che bil secure ?...
che naposledyk chesto wzeha da go pishat ...
updatewajte kato izleze patch :)
- ---------- Forwarded Message ----------
Subject: Qpopper 4.0 Buffer Overflow
Date: Fri, 20 Apr 2001 03:15:29 -0000
From: Optium <shatan@xxxxxxxxxx>
To: VULN-DEV@xxxxxxxxxxxxxxxxx
Recently I came across a buffer overflow in qpop4.0.
The overflow occures when the input for the
command "user" is above 63 chars long. I was not
able to overflow beyond the edx due to what seems
like char filtering beyond a curtain point (being 64).
example :
Trying 127.0.0.1...
Connected to localhost.
Escape character is '^]'.
+OK
user
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAA
Connection closed by foreign host.
Optium
- -------------------------------------------------------
- --
- -===============================================================-
- - Regards, AngelFire -
- - Stanislav Lechev <firedust@xxxxxxx> -
- - PGP Key: http://firedust.vega.bg/pgp/StanislavLechev.asc -
- -===============================================================-
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.4 (GNU/Linux)
Comment: For info see http://www.gnupg.org
iD8DBQE64EdN8RPXBhiMqewRAjpTAJwJ11H6r5U5DutEpIfsX1UrlnQxrACfTVop
jB+3Vz53a8CtrEfH7dylcaQ=
=rBGC
-----END PGP SIGNATURE-----
===========================================================================
A mail-list of Linux Users Group - Bulgaria (bulgarian linuxers)
http://www.linux-bulgaria.org/ Hosted by Internet Group Ltd. - Stara Zagora
|
|
|