Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> FreeBSD Local Security Checks >> FreeBSD : fetchmail -- remote root/code injection from malicious POP3 server (598)


Vulnerability Assessment Details

FreeBSD : fetchmail -- remote root/code injection from malicious POP3 server (598)

Vulnerability Assessment Summary
Check for fetchmail

Detailed Explanation for this Vulnerability Assessment

The remote host is missing an update to the system

The following package is affected: fetchmail

Solution : Update the package on the remote host
See also :


Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2006 Tenable Network Security

Cables, Connectors

SHORETEL IP420 VOIP Phone 420 Black New 630-2081-01 Warranty IP Voice Display
$169.99
SHORETEL IP420 VOIP Phone 420 Black New 630-2081-01 Warranty IP Voice Display pictureSHORETEL IP420 VOIP Phone 420 Black 630-2081-01 Warranty IP Voice Display
$66.99
SHORETEL IP420 VOIP Phone 420 Black 630-2081-01 Warranty IP Voice Display pictureGrandstream HT702 2 Port VoIP Analog Telephone Adapter ATA NEVER USED
$29.99
Grandstream HT702 2 Port VoIP Analog Telephone Adapter ATA NEVER USED pictureMitel 5320 Black VoIP IP Telephone LCD Display 50006191 Mitel-5320 Warranty
$43.99
Mitel 5320 Black VoIP IP Telephone LCD Display 50006191 Mitel-5320 Warranty picture


Discussions

No Discussions have been posted on this vulnerability.