Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Detailed Explanation for this Vulnerability Assessment
Due to restrictive dependency definition for fetchmail-ssl the updated fetchmailconf
package couldn't be installed on the old stable distribution (woody)
together with fetchmail-ssl. Hence, this update loosens it, so that
the update can be pulled in. For completeness we're including the
original advisory text:
Thomas Wolff discovered that the fetchmailconf program which is
provided as part of fetchmail, an SSL enabled POP3, APOP, IMAP mail
gatherer/forwarder, creates the new configuration in an insecure
fashion that can lead to leaking passwords for mail accounts to local
This update also fixes a regression in the package for stable caused
by the last security update.
For the old stable distribution (woody) this problem has been fixed in
version 5.9.11-6.4 of fetchmail and in version 5.9.11-6.3 of
For the stable distribution (sarge) this problem has been fixed in
For the unstable distribution (sid) this problem has been fixed in
We recommend that you upgrade your fetchmail package.
Solution : http://www.debian.org/security/2005/dsa-900
Network Security Threat Level: High
Networks Security ID: 15179
Vulnerability Assessment Copyright: This script is (C) 2007 Michel Arboi
|Drobo B800FS Beyond Raid 8-Bay Dual Gigabit Ethernet/SATA 6GB/S Storage Array
|Asus STRIX RAID PRO Sound Card
|Controller SAS RAID Adaptec ASR-6805H 6G 1-094
|Dell PowerEdge PERC H700 SAS RAID Controller 512MB 6GB/s 0XXFVX
No Discussions have been posted on this vulnerability.