Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA071] DSA-071-1 fetchmail


Vulnerability Assessment Details

[DSA071] DSA-071-1 fetchmail

Vulnerability Assessment Summary
DSA-071-1 fetchmail

Detailed Explanation for this Vulnerability Assessment

Salvatore Sanfilippo found two remotely exploitable problems in
fetchmail while doing a security audit. In both the IMAP code
and the POP3 code, the input isn't verified even though it's used to store
a number in an array. Since
no bounds checking is done this can be used by a possible hacker to write
arbitrary data in memory. A possible hacker can use this if they can get a user
to transfer mail from a custom IMAP or POP3 server they control.

This has been fixed in version 5.3.3-3, we recommend that you
update your fetchmail packages immediately.



Solution : http://www.debian.org/security/2001/dsa-071
Network Security Threat Level: High

Networks Security ID: 3164, 3166

Vulnerability Assessment Copyright: This script is (C) 2005 Michel Arboi

Cables, Connectors

1PC Xin AR-B1564A V1.0 Industrial computer motherboard with CPU memory fan#ZH
$402.0
1PC Xin AR-B1564A V1.0  Industrial computer motherboard with CPU memory fan#ZH picture1pc used SOBEY MG1000LE Ver 2.2
$205.0
1pc used   SOBEY MG1000LE Ver 2.2  picture1pc used ASUS Z8NA-D6C
$220.0
1pc used  ASUS Z8NA-D6C pictureGT30F124 30F124 Transistor TO-220 IGBT
$1.98
GT30F124 30F124 Transistor TO-220 IGBT  picture


Discussions

No Discussions have been posted on this vulnerability.