{"vuid":"VU#157961","idnumber":"157961","name":"PC-cillin \"pop3trap.exe\" vulnerable to buffer overflow via long string of characters","keywords":["PC-cillin","pop3trap.exe","buffer overflow","long string of characters","port 110/tcp"],"overview":"A locally exploitable buffer overflow exists in PC-cillin.","clean_desc":"Trend Micro describes PC-cillin as follows: Trend Micro PC-cillin provides all-in-one antivirus security, personal firewall, and PDA protection for your PC. The user-friendly interface makes it easy to install and use. It defends your system from viruses, hackers, and other Internet security threats in email, attachments, Internet downloads, and instant messaging. PC-cillin has the capability to scan incoming email for viruses. PC-cillin does this by running a local pop3 proxy daemon (pop3trap.exe). Trend Micro describes pop3trap.exe as follows: Trend Micro's pop3trap.exe is an application level proxy for POP3 defined in RFC 1939. It forwards the local POP3 client requests to a remote server running on a different machine, mostly at the ISP-side. The service is only accessible from the localhost with IP address 127.0.0.1. The pop3trap.exe application runs transparent in the background and scans all mails received by POP3. A buffer overflow in pop3trap.exe may allow a local attacker to execute arbitrary code with the privileges of the pop3 proxy.","impact":"A local attacker may be able to execute arbitrary code with the privileges of the pop3 proxy.","resolution":"Apply a patch.","workarounds":"","sysaffected":"","thanks":"This vulnerability was publicly reported by Joel Soderberg and Christer Oberg.","author":"This document was written by Ian A Finlay.","public":["http://www.texonet.com/advisories/TEXONET-20021210.txt","http://www.securityfocus.com/bid/6350"],"cveids":["CVE-2002-1349"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2002-12-10T19:09:19Z","publicdate":"2002-12-10T00:00:00Z","datefirstpublished":"2002-12-18T19:29:26Z","dateupdated":"2002-12-18T19:31:24Z","revision":7,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"20","cam_exploitation":"0","cam_internetinfrastructure":"13","cam_population":"12","cam_impact":"15","cam_easeofexploitation":"18","cam_attackeraccessrequired":"10","cam_scorecurrent":"20.0475","cam_scorecurrentwidelyknown":"20.0475","cam_scorecurrentwidelyknownexploited":"32.1975","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":20.0475,"vulnote":null}