w00w00 Security Advisory -
Discovered: 7th January, 2000
Author: K2 ([email protected])
Vendor Status: Notified.
Last Updated: N/A
When vpopmail is used to authenticate user information and passed an
excessively long command argument, a remote attacker may compromise the
privilege level that vpopmail is running (usually root).
A remote attacker may attain the privilege level of the authentication
module. Sample exploit code can be found at
Impose the 40 character limitation specified by RFC1939 into the mail
agent that passes password to vpopmail or modify vpopmail itself. A
qmail-specific patch is available at
Back to Advisories
Back to w00w00 webpage