This host is running the Qpopper POP3 mail server. This mail server is vulnerable to a buffer overflow attack in the user option file processing routines. A local user can create a malformed '.qpopper-options' file to execute arbitrary code on this host. A potential intruder can use this to gain root level privileges.
The vendor has released a patch that fixes this issue. Please upgrade to that latest version of Qpopper available from http://www.eudora.com/qpopper/.