Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA071] DSA-071-1 fetchmail


Vulnerability Assessment Details

[DSA071] DSA-071-1 fetchmail

Vulnerability Assessment Summary
DSA-071-1 fetchmail

Detailed Explanation for this Vulnerability Assessment

Salvatore Sanfilippo found two remotely exploitable problems in
fetchmail while doing a security audit. In both the IMAP code
and the POP3 code, the input isn't verified even though it's used to store
a number in an array. Since
no bounds checking is done this can be used by a possible hacker to write
arbitrary data in memory. A possible hacker can use this if they can get a user
to transfer mail from a custom IMAP or POP3 server they control.

This has been fixed in version 5.3.3-3, we recommend that you
update your fetchmail packages immediately.



Solution : http://www.debian.org/security/2001/dsa-071
Network Security Threat Level: High

Networks Security ID: 3164, 3166

Vulnerability Assessment Copyright: This script is (C) 2005 Michel Arboi

Cables, Connectors

***2*** NetGear ProSafe (GS752TXS) 52-Ports-Ports Rack-Mountable Switch
$100.0
***2*** NetGear  ProSafe (GS752TXS) 52-Ports-Ports Rack-Mountable Switch pictureCisco ME-3400-24TS-A v04
$70.0
Cisco ME-3400-24TS-A  v04 pictureTRENDnet TEG-228WS
$45.0
TRENDnet TEG-228WS pictureNOISY Dell PowerConnect 5212 Managed Gigabit Ethernet 12-port Switch w/ 4 SFPs
$27.99
NOISY Dell PowerConnect 5212 Managed Gigabit Ethernet 12-port Switch w/ 4 SFPs picture


Discussions

No Discussions have been posted on this vulnerability.