FreeBSD Security Advisory 2000.26...

- AV AC AU C I A
发布: 2000-07-12
修订: 2025-04-13

FreeBSD-SA-00:26 - The popper port, version 2.53 and earlier, incorrectly parses string formatting operators included in part of the email message header. A remote attacker can send a malicious email message to a local user which can cause arbitrary code to be executed on the server when a POP client retrieves the message using the UIDL command. The code is executed as the user who is retrieving mail: thus if root reads email via POP3 this can lead to a root compromise.

0%
暂无可用Exp或PoC
当前有0条受影响产品信息