Vulnerability Assessment & Network Security Forums

If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.

Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA071] DSA-071-1 fetchmail

Vulnerability Assessment Details

[DSA071] DSA-071-1 fetchmail

Vulnerability Assessment Summary
DSA-071-1 fetchmail

Detailed Explanation for this Vulnerability Assessment

Salvatore Sanfilippo found two remotely exploitable problems in
fetchmail while doing a security audit. In both the IMAP code
and the POP3 code, the input isn't verified even though it's used to store
a number in an array. Since
no bounds checking is done this can be used by a possible hacker to write
arbitrary data in memory. A possible hacker can use this if they can get a user
to transfer mail from a custom IMAP or POP3 server they control.

This has been fixed in version 5.3.3-3, we recommend that you
update your fetchmail packages immediately.

Solution :
Network Security Threat Level: High

Networks Security ID: 3164, 3166

Vulnerability Assessment Copyright: This script is (C) 2005 Michel Arboi

Cables, Connectors

***2*** NetGear ProSafe (GS752TXS) 52-Ports-Ports Rack-Mountable Switch
***2*** NetGear  ProSafe (GS752TXS) 52-Ports-Ports Rack-Mountable Switch pictureCisco ME-3400-24TS-A v04
Cisco ME-3400-24TS-A  v04 pictureTRENDnet TEG-228WS
TRENDnet TEG-228WS pictureNOISY Dell PowerConnect 5212 Managed Gigabit Ethernet 12-port Switch w/ 4 SFPs
NOISY Dell PowerConnect 5212 Managed Gigabit Ethernet 12-port Switch w/ 4 SFPs picture


No Discussions have been posted on this vulnerability.