Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Detailed Explanation for this Vulnerability Assessment
Due to restrictive dependency definition for fetchmail-ssl the updated fetchmailconf
package couldn't be installed on the old stable distribution (woody)
together with fetchmail-ssl. Hence, this update loosens it, so that
the update can be pulled in. For completeness we're including the
original advisory text:
Thomas Wolff discovered that the fetchmailconf program which is
provided as part of fetchmail, an SSL enabled POP3, APOP, IMAP mail
gatherer/forwarder, creates the new configuration in an insecure
fashion that can lead to leaking passwords for mail accounts to local
This update also fixes a regression in the package for stable caused
by the last security update.
For the old stable distribution (woody) this problem has been fixed in
version 5.9.11-6.4 of fetchmail and in version 5.9.11-6.3 of
For the stable distribution (sarge) this problem has been fixed in
For the unstable distribution (sid) this problem has been fixed in
We recommend that you upgrade your fetchmail package.
Solution : http://www.debian.org/security/2005/dsa-900
Network Security Threat Level: High
Networks Security ID: 15179
Vulnerability Assessment Copyright: This script is (C) 2007 Michel Arboi
|Cisco 3750 Series 48 Port PoE Deployment Pack, WS-C3750-48PS-E, Lifetime Wty
|Cisco Catalyst 3750G Series WS-C3750G-48PS-S Switch Used - w/ Power Cord
|Microtik Routerboard RB201 1UiAS-RM network switch
|Cisco 3750 Series 48 Port PoE Switch, WS-C3750-48PS-E, Lifetime Warranty
No Discussions have been posted on this vulnerability.