Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA553] DSA-553-1 getmail


Vulnerability Assessment Details

[DSA553] DSA-553-1 getmail

Vulnerability Assessment Summary
DSA-553-1 getmail

Detailed Explanation for this Vulnerability Assessment

A security problem has been discovered in getmail, a POP3 and APOP
mail gatherer and forwarder. A possible hacker with a shell account on the
victims host could utilise getmail to overwrite arbitrary files when
it is running as root.
For the stable distribution (woody) this problem has been fixed in
version 2.3.7-2.
For the unstable distribution (sid) this problem has been fixed in
version 3.2.5-1.
We recommend that you upgrade your getmail package.


Solution : http://www.debian.org/security/2004/dsa-553
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is (C) 2005 Michel Arboi

Cables, Connectors

16GB Corsair PC3-12800 4x4GB DIMM 1600MHz DDR3 Memory (CML16GX3M4A1600C9)
$75.0
16GB Corsair PC3-12800 4x4GB DIMM 1600MHz DDR3 Memory (CML16GX3M4A1600C9) pictureThink Pad T470s, Core i5 3.0GHz 8GB RAM 256GB SSD,
$495.0
Think Pad T470s, Core i5 3.0GHz 8GB RAM 256GB SSD,  pictureHP Mini 5103 Intel Atom N455 1.66GHz 2GB RAM 160GB HDD Windows 7 Pro
$69.99
HP Mini 5103 Intel Atom N455 1.66GHz 2GB RAM 160GB HDD Windows 7 Pro pictureHynix 2GB DIMM 1333 MHz DDR3 PC3-10600 Memory (HMT325U6CFR8C-H9) (2 STICKS)
$1.0
Hynix 2GB DIMM 1333 MHz DDR3 PC3-10600 Memory (HMT325U6CFR8C-H9) (2 STICKS) picture


Discussions

No Discussions have been posted on this vulnerability.