oreilly.comSafari Books Online.Conferences.


Remote Root Exploit in QPopper
Pages: 1, 2


The Fpf kernel module alters the Linux TCP/IP stack so that it emulates other operating systems TCP/IP fingerprints and appears to applications such as nmap or queso to be a different OS. A bug in Fpf causes the kernel to panic when the IP stack receives a fragmented packet.

Users should watch for a new version of Fpf that fixes this problem.

HPUX kmmodreg

The HPUX utility kmmodreg has a symbolic-link race condition that an attacker can use to overwrite or create arbitrary files.

Users should install patch PHCO_24112 as soon as possible.


BestCrypt allows users to create an encrypted loopback file system. The Linux version of BestCrypt has a vulnerability in the set user ID root utility bctool that can be used to execute arbitrary code with the permissions of the root user.

Users of BestCrypt should remove the set user ID bit from bctool and upgrade to version 0.8 as soon as possible.


Qpopper, a server for POP mail, has a buffer overflow that may be exploitable to execute arbitrary code as the root user.

Users should upgrade to version 4.0.3 or newer of Qpopper as soon as possible.


The Message Transfer Agent exim has a format-string vulnerability that may be exploitable if headers_check_syntax has been turned on.

Users of exim should watch for a patch.


TIAtunnel, an IRC relay or bouncer, has a remotely executable buffer overflow that can be used by an attacker to execute arbitrary code on the server with the permissions of the user executing TIAtunnel. An automated exploit for this vulnerability has been released.

Users should watch for an updated version of TIAtunnel and should consider turning TIAtunnel off until it has been fixed.

Red Hat's xinetd

xinetd, under Red Hat Linux 7 and 7.1, is started with a umask of 0. This will cause applications xinetd starts that do not set their own umask to create world-writable files. It has also been reported that there is a potential buffer overflow in the version of xinetd distributed with Red Hat Linux 7.

Affected users should upgrade xinetd to the latest package available from Red Hat.


The ispell spell-checking program is vulnerable to a symbolic-link race condition attack. This vulnerability may be used to overwrite files with the permissions of the user executing ispell.

Users should upgrade to a patched version of ispell.

VirtualCart Shopping Cart

The VirtualCart Shopping Cart web-based application has a bug that can be exploited by an attacker to execute arbitrary code with the permissions of the user running the web server.

Users of VirtualCart Shopping Cart should contact the vendor for a patch.

Return to the Linux DevCenter.

Linux Online Certification

Linux/Unix System Administration Certificate Series
Linux/Unix System Administration Certificate Series — This course series targets both beginning and intermediate Linux/Unix users who want to acquire advanced system administration skills, and to back those skills up with a Certificate from the University of Illinois Office of Continuing Education.

Enroll today!

Linux Resources
  • Linux Online
  • The Linux FAQ
  • Linux Kernel Archives
  • Kernel Traffic

  • Sponsored by: