Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Detailed Explanation for this Vulnerability Assessment
Due to restrictive dependency definition for fetchmail-ssl the updated fetchmailconf
package couldn't be installed on the old stable distribution (woody)
together with fetchmail-ssl. Hence, this update loosens it, so that
the update can be pulled in. For completeness we're including the
original advisory text:
Thomas Wolff discovered that the fetchmailconf program which is
provided as part of fetchmail, an SSL enabled POP3, APOP, IMAP mail
gatherer/forwarder, creates the new configuration in an insecure
fashion that can lead to leaking passwords for mail accounts to local
This update also fixes a regression in the package for stable caused
by the last security update.
For the old stable distribution (woody) this problem has been fixed in
version 5.9.11-6.4 of fetchmail and in version 5.9.11-6.3 of
For the stable distribution (sarge) this problem has been fixed in
For the unstable distribution (sid) this problem has been fixed in
We recommend that you upgrade your fetchmail package.
Solution : http://www.debian.org/security/2005/dsa-900
Network Security Threat Level: High
Networks Security ID: 15179
Vulnerability Assessment Copyright: This script is (C) 2007 Michel Arboi
|GENUINE Dell Latitude E6510 Intel Laptop Motherboard TESTED PN: 0NCPCN LA-5573P
|HP ProBook 650 G1 Intel Motherboard 744016-001 *WORKS*
|Original Apple Mac Mini A1347 Logic Board With w/ Intel i5-3210M 2.5Ghz Wrty
|HP G72 Laptop Motherboard Intel 616449-001 Tested And Working GOOD
No Discussions have been posted on this vulnerability.