Vulnerabilites related to fetchmail - fetchmail
CVE-2002-1175 (GCVE-0-2002-1175)
Vulnerability from cvelistv5
Published
2002-10-01 04:00
Modified
2024-08-08 03:19
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The getmxrecord function in Fetchmail 6.0.0 and earlier does not properly check the boundary of a particular malformed DNS packet from a malicious DNS server, which allows remote attackers to cause a denial of service (crash) when Fetchmail attempts to read data beyond the expected boundary.
References
► | URL | Tags | ||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T03:19:27.488Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "MDKSA-2002:063", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred" ], "url": "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-063.php" }, { "name": "20020929 Advisory 03/2002: Fetchmail remote vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=103340148625187\u0026w=2" }, { "name": "RHSA-2002:215", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2002-215.html" }, { "name": "fetchmail-multidrop-bo(10203)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "http://www.iss.net/security_center/static/10203.php" }, { "name": "CLA-2002:531", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA", "x_transferred" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000531" }, { "name": "ESA-20021003-023", "tags": [ "vendor-advisory", "x_refsource_ENGARDE", "x_transferred" ], "url": "http://www.linuxsecurity.com/advisories/other_advisory-2402.html" }, { "name": "5826", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/5826" }, { "name": "DSA-171", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2002/dsa-171" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2002-09-29T00:00:00", "descriptions": [ { "lang": "en", "value": "The getmxrecord function in Fetchmail 6.0.0 and earlier does not properly check the boundary of a particular malformed DNS packet from a malicious DNS server, which allows remote attackers to cause a denial of service (crash) when Fetchmail attempts to read data beyond the expected boundary." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-10-17T13:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "MDKSA-2002:063", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE" ], "url": "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-063.php" }, { "name": "20020929 Advisory 03/2002: Fetchmail remote vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=103340148625187\u0026w=2" }, { "name": "RHSA-2002:215", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2002-215.html" }, { "name": "fetchmail-multidrop-bo(10203)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "http://www.iss.net/security_center/static/10203.php" }, { "name": "CLA-2002:531", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000531" }, { "name": "ESA-20021003-023", "tags": [ "vendor-advisory", "x_refsource_ENGARDE" ], "url": "http://www.linuxsecurity.com/advisories/other_advisory-2402.html" }, { "name": "5826", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/5826" }, { "name": "DSA-171", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2002/dsa-171" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-1175", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The getmxrecord function in Fetchmail 6.0.0 and earlier does not properly check the boundary of a particular malformed DNS packet from a malicious DNS server, which allows remote attackers to cause a denial of service (crash) when Fetchmail attempts to read data beyond the expected boundary." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "MDKSA-2002:063", "refsource": "MANDRAKE", "url": "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-063.php" }, { "name": "20020929 Advisory 03/2002: Fetchmail remote vulnerabilities", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=103340148625187\u0026w=2" }, { "name": "RHSA-2002:215", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2002-215.html" }, { "name": "fetchmail-multidrop-bo(10203)", "refsource": "XF", "url": "http://www.iss.net/security_center/static/10203.php" }, { "name": "CLA-2002:531", "refsource": "CONECTIVA", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000531" }, { "name": "ESA-20021003-023", "refsource": "ENGARDE", "url": "http://www.linuxsecurity.com/advisories/other_advisory-2402.html" }, { "name": "5826", "refsource": "BID", "url": "http://www.securityfocus.com/bid/5826" }, { "name": "DSA-171", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2002/dsa-171" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-1175", "datePublished": "2002-10-01T04:00:00", "dateReserved": "2002-09-30T00:00:00", "dateUpdated": "2024-08-08T03:19:27.488Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-5867 (GCVE-0-2006-5867)
Vulnerability from cvelistv5
Published
2007-01-09 00:00
Modified
2024-08-07 20:04
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
fetchmail before 6.3.6-rc4 does not properly enforce TLS and may transmit cleartext passwords over unsecured links if certain circumstances occur, which allows remote attackers to obtain sensitive information via man-in-the-middle (MITM) attacks.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T20:04:55.652Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SSA:2007-024-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.517995" }, { "name": "USN-405-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-405-1" }, { "name": "24966", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24966" }, { "name": "31580", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/31580" }, { "name": "23781", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/23781" }, { "name": "24174", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24174" }, { "name": "DSA-1259", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2007/dsa-1259" }, { "name": "23838", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/23838" }, { "name": "24151", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24151" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://docs.info.apple.com/article.html?artnum=305391" }, { "name": "23714", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/23714" }, { "name": "21903", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/21903" }, { "name": "24284", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24284" }, { "name": "23631", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/23631" }, { "name": "24007", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24007" }, { "name": "23804", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/23804" }, { "name": "20070105 fetchmail security announcement 2006-02 (CVE-2006-5867)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/456115/100/0/threaded" }, { "name": "ADV-2007-0088", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/0088" }, { "name": "SUSE-SR:2007:004", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2007_4_sr.html" }, { "name": "TA07-109A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-109A.html" }, { "name": "23695", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/23695" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://fetchmail.berlios.de/fetchmail-SA-2006-02.txt" }, { "name": "MDKSA-2007:016", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:016" }, { "name": "FEDORA-2007-041", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://fedoranews.org/cms/node/2429" }, { "name": "23923", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/23923" }, { "name": "OpenPKG-SA-2007.004", "tags": [ "vendor-advisory", "x_refsource_OPENPKG", "x_transferred" ], "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.004.html" }, { "name": "2007-0007", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX", "x_transferred" ], "url": "http://www.trustix.org/errata/2007/0007" }, { "name": "20070218 Re: [SECURITY] [DSA 1259-1] New fetchmail packages fix information disclosure", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/460528/100/0/threaded" }, { "name": "GLSA-200701-13", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200701-13.xml" }, { "name": "1017478", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1017478" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://issues.rpath.com/browse/RPL-919" }, { "name": "20070201-01-P", "tags": [ "vendor-advisory", "x_refsource_SGI", "x_transferred" ], "url": "ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc" }, { "name": "APPLE-SA-2007-04-19", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html" }, { "name": "ADV-2007-1470", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/1470" }, { "name": "ADV-2007-0087", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/0087" }, { "name": "RHSA-2007:0018", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0018.html" }, { "name": "oval:org.mitre.oval:def:10566", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10566" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-01-04T00:00:00", "descriptions": [ { "lang": "en", "value": "fetchmail before 6.3.6-rc4 does not properly enforce TLS and may transmit cleartext passwords over unsecured links if certain circumstances occur, which allows remote attackers to obtain sensitive information via man-in-the-middle (MITM) attacks." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-17T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "SSA:2007-024-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.517995" }, { "name": "USN-405-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-405-1" }, { "name": "24966", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24966" }, { "name": "31580", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/31580" }, { "name": "23781", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/23781" }, { "name": "24174", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24174" }, { "name": "DSA-1259", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2007/dsa-1259" }, { "name": "23838", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/23838" }, { "name": "24151", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24151" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://docs.info.apple.com/article.html?artnum=305391" }, { "name": "23714", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/23714" }, { "name": "21903", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/21903" }, { "name": "24284", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24284" }, { "name": "23631", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/23631" }, { "name": "24007", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24007" }, { "name": "23804", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/23804" }, { "name": "20070105 fetchmail security announcement 2006-02 (CVE-2006-5867)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/456115/100/0/threaded" }, { "name": "ADV-2007-0088", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/0088" }, { "name": "SUSE-SR:2007:004", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2007_4_sr.html" }, { "name": "TA07-109A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-109A.html" }, { "name": "23695", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/23695" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://fetchmail.berlios.de/fetchmail-SA-2006-02.txt" }, { "name": "MDKSA-2007:016", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:016" }, { "name": "FEDORA-2007-041", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://fedoranews.org/cms/node/2429" }, { "name": "23923", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/23923" }, { "name": "OpenPKG-SA-2007.004", "tags": [ "vendor-advisory", "x_refsource_OPENPKG" ], "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.004.html" }, { "name": "2007-0007", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX" ], "url": "http://www.trustix.org/errata/2007/0007" }, { "name": "20070218 Re: [SECURITY] [DSA 1259-1] New fetchmail packages fix information disclosure", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/460528/100/0/threaded" }, { "name": "GLSA-200701-13", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200701-13.xml" }, { "name": "1017478", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1017478" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://issues.rpath.com/browse/RPL-919" }, { "name": "20070201-01-P", "tags": [ "vendor-advisory", "x_refsource_SGI" ], "url": "ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc" }, { "name": "APPLE-SA-2007-04-19", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html" }, { "name": "ADV-2007-1470", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/1470" }, { "name": "ADV-2007-0087", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/0087" }, { "name": "RHSA-2007:0018", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0018.html" }, { "name": "oval:org.mitre.oval:def:10566", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10566" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-5867", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "fetchmail before 6.3.6-rc4 does not properly enforce TLS and may transmit cleartext passwords over unsecured links if certain circumstances occur, which allows remote attackers to obtain sensitive information via man-in-the-middle (MITM) attacks." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "SSA:2007-024-01", "refsource": "SLACKWARE", "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.517995" }, { "name": "USN-405-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/usn-405-1" }, { "name": "24966", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24966" }, { "name": "31580", "refsource": "OSVDB", "url": "http://osvdb.org/31580" }, { "name": "23781", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/23781" }, { "name": "24174", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24174" }, { "name": "DSA-1259", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2007/dsa-1259" }, { "name": "23838", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/23838" }, { "name": "24151", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24151" }, { "name": "http://docs.info.apple.com/article.html?artnum=305391", "refsource": "CONFIRM", "url": "http://docs.info.apple.com/article.html?artnum=305391" }, { "name": "23714", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/23714" }, { "name": "21903", "refsource": "BID", "url": "http://www.securityfocus.com/bid/21903" }, { "name": "24284", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24284" }, { "name": "23631", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/23631" }, { "name": "24007", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24007" }, { "name": "23804", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/23804" }, { "name": "20070105 fetchmail security announcement 2006-02 (CVE-2006-5867)", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/456115/100/0/threaded" }, { "name": "ADV-2007-0088", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/0088" }, { "name": "SUSE-SR:2007:004", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2007_4_sr.html" }, { "name": "TA07-109A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA07-109A.html" }, { "name": "23695", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/23695" }, { "name": "http://fetchmail.berlios.de/fetchmail-SA-2006-02.txt", "refsource": "CONFIRM", "url": "http://fetchmail.berlios.de/fetchmail-SA-2006-02.txt" }, { "name": "MDKSA-2007:016", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:016" }, { "name": "FEDORA-2007-041", "refsource": "FEDORA", "url": "http://fedoranews.org/cms/node/2429" }, { "name": "23923", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/23923" }, { "name": "OpenPKG-SA-2007.004", "refsource": "OPENPKG", "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.004.html" }, { "name": "2007-0007", "refsource": "TRUSTIX", "url": "http://www.trustix.org/errata/2007/0007" }, { "name": "20070218 Re: [SECURITY] [DSA 1259-1] New fetchmail packages fix information disclosure", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/460528/100/0/threaded" }, { "name": "GLSA-200701-13", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200701-13.xml" }, { "name": "1017478", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1017478" }, { "name": "https://issues.rpath.com/browse/RPL-919", "refsource": "CONFIRM", "url": "https://issues.rpath.com/browse/RPL-919" }, { "name": "20070201-01-P", "refsource": "SGI", "url": "ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc" }, { "name": "APPLE-SA-2007-04-19", "refsource": "APPLE", "url": "http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html" }, { "name": "ADV-2007-1470", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/1470" }, { "name": "ADV-2007-0087", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/0087" }, { "name": "RHSA-2007:0018", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2007-0018.html" }, { "name": "oval:org.mitre.oval:def:10566", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10566" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-5867", "datePublished": "2007-01-09T00:00:00", "dateReserved": "2006-11-14T00:00:00", "dateUpdated": "2024-08-07T20:04:55.652Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-0321 (GCVE-0-2006-0321)
Vulnerability from cvelistv5
Published
2006-01-24 00:00
Modified
2024-08-07 16:34
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
fetchmail 6.3.0 and other versions before 6.3.2 allows remote attackers to cause a denial of service (crash) via crafted e-mail messages that cause a free of an invalid pointer when fetchmail bounces the message to the originator or local postmaster.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T16:34:13.607Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "APPLE-SA-2006-08-01", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html" }, { "name": "16365", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/16365" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://developer.berlios.de/project/shownotes.php?release_id=8784" }, { "name": "fetchmail-message-bounce-dos(24265)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24265" }, { "name": "20060122 fetchmail security announcement fetchmail-SA-2006-01 (CVE-2006-0321)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/422936/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://fetchmail.berlios.de/fetchmail-SA-2006-01.txt" }, { "name": "ADV-2006-3101", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/3101" }, { "name": "21253", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21253" }, { "name": "18571", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/18571" }, { "name": "SSA:2006-045-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.443499" }, { "name": "ADV-2006-0300", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/0300" }, { "name": "19289", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/19289" }, { "name": "TA06-214A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA06-214A.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=348747" }, { "name": "22691", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/22691" }, { "name": "1015527", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1015527" }, { "name": "18895", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/18895" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-01-23T00:00:00", "descriptions": [ { "lang": "en", "value": "fetchmail 6.3.0 and other versions before 6.3.2 allows remote attackers to cause a denial of service (crash) via crafted e-mail messages that cause a free of an invalid pointer when fetchmail bounces the message to the originator or local postmaster." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-19T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "APPLE-SA-2006-08-01", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html" }, { "name": "16365", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/16365" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://developer.berlios.de/project/shownotes.php?release_id=8784" }, { "name": "fetchmail-message-bounce-dos(24265)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24265" }, { "name": "20060122 fetchmail security announcement fetchmail-SA-2006-01 (CVE-2006-0321)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/422936/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://fetchmail.berlios.de/fetchmail-SA-2006-01.txt" }, { "name": "ADV-2006-3101", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/3101" }, { "name": "21253", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21253" }, { "name": "18571", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/18571" }, { "name": "SSA:2006-045-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.443499" }, { "name": "ADV-2006-0300", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/0300" }, { "name": "19289", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/19289" }, { "name": "TA06-214A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA06-214A.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=348747" }, { "name": "22691", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/22691" }, { "name": "1015527", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1015527" }, { "name": "18895", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/18895" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-0321", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "fetchmail 6.3.0 and other versions before 6.3.2 allows remote attackers to cause a denial of service (crash) via crafted e-mail messages that cause a free of an invalid pointer when fetchmail bounces the message to the originator or local postmaster." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "APPLE-SA-2006-08-01", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html" }, { "name": "16365", "refsource": "BID", "url": "http://www.securityfocus.com/bid/16365" }, { "name": "http://developer.berlios.de/project/shownotes.php?release_id=8784", "refsource": "CONFIRM", "url": "http://developer.berlios.de/project/shownotes.php?release_id=8784" }, { "name": "fetchmail-message-bounce-dos(24265)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24265" }, { "name": "20060122 fetchmail security announcement fetchmail-SA-2006-01 (CVE-2006-0321)", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/422936/100/0/threaded" }, { "name": "http://fetchmail.berlios.de/fetchmail-SA-2006-01.txt", "refsource": "CONFIRM", "url": "http://fetchmail.berlios.de/fetchmail-SA-2006-01.txt" }, { "name": "ADV-2006-3101", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/3101" }, { "name": "21253", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21253" }, { "name": "18571", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/18571" }, { "name": "SSA:2006-045-01", "refsource": "SLACKWARE", "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.443499" }, { "name": "ADV-2006-0300", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/0300" }, { "name": "19289", "refsource": "BID", "url": "http://www.securityfocus.com/bid/19289" }, { "name": "TA06-214A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA06-214A.html" }, { "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=348747", "refsource": "CONFIRM", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=348747" }, { "name": "22691", "refsource": "OSVDB", "url": "http://www.osvdb.org/22691" }, { "name": "1015527", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1015527" }, { "name": "18895", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/18895" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-0321", "datePublished": "2006-01-24T00:00:00", "dateReserved": "2006-01-19T00:00:00", "dateUpdated": "2024-08-07T16:34:13.607Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2002-1174 (GCVE-0-2002-1174)
Vulnerability from cvelistv5
Published
2002-10-01 04:00
Modified
2024-08-08 03:19
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Buffer overflows in Fetchmail 6.0.0 and earlier allow remote attackers to cause a denial of service (crash) or execute arbitrary code via (1) long headers that are not properly processed by the readheaders function, or (2) via long Received: headers, which are not properly parsed by the parse_received function.
References
► | URL | Tags | |||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T03:19:27.643Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "MDKSA-2002:063", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred" ], "url": "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-063.php" }, { "name": "5827", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/5827" }, { "name": "20020929 Advisory 03/2002: Fetchmail remote vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=103340148625187\u0026w=2" }, { "name": "5825", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/5825" }, { "name": "RHSA-2002:215", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2002-215.html" }, { "name": "fetchmail-multidrop-bo(10203)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "http://www.iss.net/security_center/static/10203.php" }, { "name": "CLA-2002:531", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA", "x_transferred" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000531" }, { "name": "ESA-20021003-023", "tags": [ "vendor-advisory", "x_refsource_ENGARDE", "x_transferred" ], "url": "http://www.linuxsecurity.com/advisories/other_advisory-2402.html" }, { "name": "DSA-171", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2002/dsa-171" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2002-09-29T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflows in Fetchmail 6.0.0 and earlier allow remote attackers to cause a denial of service (crash) or execute arbitrary code via (1) long headers that are not properly processed by the readheaders function, or (2) via long Received: headers, which are not properly parsed by the parse_received function." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-10-17T13:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "MDKSA-2002:063", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE" ], "url": "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-063.php" }, { "name": "5827", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/5827" }, { "name": "20020929 Advisory 03/2002: Fetchmail remote vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=103340148625187\u0026w=2" }, { "name": "5825", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/5825" }, { "name": "RHSA-2002:215", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2002-215.html" }, { "name": "fetchmail-multidrop-bo(10203)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "http://www.iss.net/security_center/static/10203.php" }, { "name": "CLA-2002:531", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000531" }, { "name": "ESA-20021003-023", "tags": [ "vendor-advisory", "x_refsource_ENGARDE" ], "url": "http://www.linuxsecurity.com/advisories/other_advisory-2402.html" }, { "name": "DSA-171", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2002/dsa-171" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-1174", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflows in Fetchmail 6.0.0 and earlier allow remote attackers to cause a denial of service (crash) or execute arbitrary code via (1) long headers that are not properly processed by the readheaders function, or (2) via long Received: headers, which are not properly parsed by the parse_received function." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "MDKSA-2002:063", "refsource": "MANDRAKE", "url": "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-063.php" }, { "name": "5827", "refsource": "BID", "url": "http://www.securityfocus.com/bid/5827" }, { "name": "20020929 Advisory 03/2002: Fetchmail remote vulnerabilities", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=103340148625187\u0026w=2" }, { "name": "5825", "refsource": "BID", "url": "http://www.securityfocus.com/bid/5825" }, { "name": "RHSA-2002:215", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2002-215.html" }, { "name": "fetchmail-multidrop-bo(10203)", "refsource": "XF", "url": "http://www.iss.net/security_center/static/10203.php" }, { "name": "CLA-2002:531", "refsource": "CONECTIVA", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000531" }, { "name": "ESA-20021003-023", "refsource": "ENGARDE", "url": "http://www.linuxsecurity.com/advisories/other_advisory-2402.html" }, { "name": "DSA-171", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2002/dsa-171" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-1174", "datePublished": "2002-10-01T04:00:00", "dateReserved": "2002-09-30T00:00:00", "dateUpdated": "2024-08-08T03:19:27.643Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-1947 (GCVE-0-2011-1947)
Vulnerability from cvelistv5
Published
2011-06-02 19:00
Modified
2024-08-06 22:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
fetchmail 5.9.9 through 6.3.19 does not properly limit the wait time after issuing a (1) STARTTLS or (2) STLS request, which allows remote servers to cause a denial of service (application hang) by acknowledging the request but not sending additional packets.
References
► | URL | Tags | ||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:46:00.839Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20110531 Re: CVE request for fetchmail STARTTLS hang (Denial of Service)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2011/05/31/17" }, { "name": "48043", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/48043" }, { "name": "FEDORA-2011-8011", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061672.html" }, { "name": "[oss-security] 20110531 Re: CVE request for fetchmail STARTTLS hang (Denial of Service)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2011/05/31/12" }, { "name": "[oss-security] 20110530 CVE request for fetchmail STARTTLS hang (Denial of Service)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2011/05/30/1" }, { "name": "20110606 fetchmail security announcement fetchmail-SA-2011-01 (CVE-2011-1947)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/518251/100/0/threaded" }, { "name": "FEDORA-2011-8059", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061634.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://gitorious.org/fetchmail/fetchmail/blobs/legacy_63/fetchmail-SA-2011-01.txt" }, { "name": "1025605", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025605" }, { "name": "MDVSA-2011:107", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:107" }, { "name": "FEDORA-2011-8021", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061735.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.fetchmail.info/fetchmail-SA-2011-01.txt" }, { "name": "[oss-security] 20110601 Re: CVE request for fetchmail STARTTLS hang (Denial of Service)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2011/06/01/2" }, { "name": "fetchmail-starttls-dos(67700)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67700" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-05-30T00:00:00", "descriptions": [ { "lang": "en", "value": "fetchmail 5.9.9 through 6.3.19 does not properly limit the wait time after issuing a (1) STARTTLS or (2) STLS request, which allows remote servers to cause a denial of service (application hang) by acknowledging the request but not sending additional packets." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "[oss-security] 20110531 Re: CVE request for fetchmail STARTTLS hang (Denial of Service)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2011/05/31/17" }, { "name": "48043", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/48043" }, { "name": "FEDORA-2011-8011", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061672.html" }, { "name": "[oss-security] 20110531 Re: CVE request for fetchmail STARTTLS hang (Denial of Service)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2011/05/31/12" }, { "name": "[oss-security] 20110530 CVE request for fetchmail STARTTLS hang (Denial of Service)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2011/05/30/1" }, { "name": "20110606 fetchmail security announcement fetchmail-SA-2011-01 (CVE-2011-1947)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/518251/100/0/threaded" }, { "name": "FEDORA-2011-8059", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061634.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://gitorious.org/fetchmail/fetchmail/blobs/legacy_63/fetchmail-SA-2011-01.txt" }, { "name": "1025605", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025605" }, { "name": "MDVSA-2011:107", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:107" }, { "name": "FEDORA-2011-8021", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061735.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.fetchmail.info/fetchmail-SA-2011-01.txt" }, { "name": "[oss-security] 20110601 Re: CVE request for fetchmail STARTTLS hang (Denial of Service)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2011/06/01/2" }, { "name": "fetchmail-starttls-dos(67700)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67700" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2011-1947", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "fetchmail 5.9.9 through 6.3.19 does not properly limit the wait time after issuing a (1) STARTTLS or (2) STLS request, which allows remote servers to cause a denial of service (application hang) by acknowledging the request but not sending additional packets." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20110531 Re: CVE request for fetchmail STARTTLS hang (Denial of Service)", "refsource": "MLIST", "url": "http://openwall.com/lists/oss-security/2011/05/31/17" }, { "name": "48043", "refsource": "BID", "url": "http://www.securityfocus.com/bid/48043" }, { "name": "FEDORA-2011-8011", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061672.html" }, { "name": "[oss-security] 20110531 Re: CVE request for fetchmail STARTTLS hang (Denial of Service)", "refsource": "MLIST", "url": "http://openwall.com/lists/oss-security/2011/05/31/12" }, { "name": "[oss-security] 20110530 CVE request for fetchmail STARTTLS hang (Denial of Service)", "refsource": "MLIST", "url": "http://openwall.com/lists/oss-security/2011/05/30/1" }, { "name": "20110606 fetchmail security announcement fetchmail-SA-2011-01 (CVE-2011-1947)", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/518251/100/0/threaded" }, { "name": "FEDORA-2011-8059", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061634.html" }, { "name": "http://gitorious.org/fetchmail/fetchmail/blobs/legacy_63/fetchmail-SA-2011-01.txt", "refsource": "CONFIRM", "url": "http://gitorious.org/fetchmail/fetchmail/blobs/legacy_63/fetchmail-SA-2011-01.txt" }, { "name": "1025605", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025605" }, { "name": "MDVSA-2011:107", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:107" }, { "name": "FEDORA-2011-8021", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061735.html" }, { "name": "http://www.fetchmail.info/fetchmail-SA-2011-01.txt", "refsource": "CONFIRM", "url": "http://www.fetchmail.info/fetchmail-SA-2011-01.txt" }, { "name": "[oss-security] 20110601 Re: CVE request for fetchmail STARTTLS hang (Denial of Service)", "refsource": "MLIST", "url": "http://openwall.com/lists/oss-security/2011/06/01/2" }, { "name": "fetchmail-starttls-dos(67700)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67700" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2011-1947", "datePublished": "2011-06-02T19:00:00", "dateReserved": "2011-05-09T00:00:00", "dateUpdated": "2024-08-06T22:46:00.839Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2003-0792 (GCVE-0-2003-0792)
Vulnerability from cvelistv5
Published
2003-10-21 04:00
Modified
2024-08-08 02:05
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Fetchmail 6.2.4 and earlier does not properly allocate memory for long lines, which allows remote attackers to cause a denial of service (crash) via a certain email.
References
► | URL | Tags | ||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T02:05:12.602Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "CSSA-2004-004.0", "tags": [ "vendor-advisory", "x_refsource_SCO", "x_transferred" ], "url": "ftp://ftp.sco.com/pub/updates/OpenLinux/3.1.1/Server/CSSA-2004-004.0/CSSA-2004-004.0.txt" }, { "name": "fetchmail-email-dos(13450)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/13450" }, { "name": "IMNX-2003-7+-023-01", "tags": [ "vendor-advisory", "x_refsource_IMMUNIX", "x_transferred" ], "url": "http://www.securityfocus.com/advisories/5987" }, { "name": "8843", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/8843" }, { "name": "MDKSA-2003:101", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:101" }, { "name": "GLSA-200403-10", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200403-10.xml" }, { "name": "TLSA-2003-61", "tags": [ "vendor-advisory", "x_refsource_TURBO", "x_transferred" ], "url": "http://www.turbolinux.com/security/TLSA-2003-61.txt" }, { "name": "20040220 LNSA-#2004-0002: Fetchmail 6.2.4 and earlier remote denial of service", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=107731542827401\u0026w=2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2003-10-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Fetchmail 6.2.4 and earlier does not properly allocate memory for long lines, which allows remote attackers to cause a denial of service (crash) via a certain email." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "CSSA-2004-004.0", "tags": [ "vendor-advisory", "x_refsource_SCO" ], "url": "ftp://ftp.sco.com/pub/updates/OpenLinux/3.1.1/Server/CSSA-2004-004.0/CSSA-2004-004.0.txt" }, { "name": "fetchmail-email-dos(13450)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/13450" }, { "name": "IMNX-2003-7+-023-01", "tags": [ "vendor-advisory", "x_refsource_IMMUNIX" ], "url": "http://www.securityfocus.com/advisories/5987" }, { "name": "8843", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/8843" }, { "name": "MDKSA-2003:101", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:101" }, { "name": "GLSA-200403-10", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200403-10.xml" }, { "name": "TLSA-2003-61", "tags": [ "vendor-advisory", "x_refsource_TURBO" ], "url": "http://www.turbolinux.com/security/TLSA-2003-61.txt" }, { "name": "20040220 LNSA-#2004-0002: Fetchmail 6.2.4 and earlier remote denial of service", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=107731542827401\u0026w=2" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2003-0792", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Fetchmail 6.2.4 and earlier does not properly allocate memory for long lines, which allows remote attackers to cause a denial of service (crash) via a certain email." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "CSSA-2004-004.0", "refsource": "SCO", "url": "ftp://ftp.sco.com/pub/updates/OpenLinux/3.1.1/Server/CSSA-2004-004.0/CSSA-2004-004.0.txt" }, { "name": "fetchmail-email-dos(13450)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/13450" }, { "name": "IMNX-2003-7+-023-01", "refsource": "IMMUNIX", "url": "http://www.securityfocus.com/advisories/5987" }, { "name": "8843", "refsource": "BID", "url": "http://www.securityfocus.com/bid/8843" }, { "name": "MDKSA-2003:101", "refsource": "MANDRAKE", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:101" }, { "name": "GLSA-200403-10", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200403-10.xml" }, { "name": "TLSA-2003-61", "refsource": "TURBO", "url": "http://www.turbolinux.com/security/TLSA-2003-61.txt" }, { "name": "20040220 LNSA-#2004-0002: Fetchmail 6.2.4 and earlier remote denial of service", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=107731542827401\u0026w=2" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2003-0792", "datePublished": "2003-10-21T04:00:00", "dateReserved": "2003-09-17T00:00:00", "dateUpdated": "2024-08-08T02:05:12.602Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2001-0101 (GCVE-0-2001-0101)
Vulnerability from cvelistv5
Published
2001-02-02 05:00
Modified
2024-08-08 04:06
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Vulnerability in fetchmail 5.5.0-2 and earlier in the AUTHENTICATE GSSAPI command.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T04:06:55.260Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "TLSA2000024-1", "tags": [ "vendor-advisory", "x_refsource_TURBO", "x_transferred" ], "url": "http://www.turbolinux.com/pipermail/tl-security-announce/2000-December/000027.html" }, { "name": "RHBA-2000:106-04", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHBA-2000-106.html" }, { "name": "fetchmail-authenticate-gssapi(7455)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7455" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2000-12-27T00:00:00", "descriptions": [ { "lang": "en", "value": "Vulnerability in fetchmail 5.5.0-2 and earlier in the AUTHENTICATE GSSAPI command." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-12-18T21:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "TLSA2000024-1", "tags": [ "vendor-advisory", "x_refsource_TURBO" ], "url": "http://www.turbolinux.com/pipermail/tl-security-announce/2000-December/000027.html" }, { "name": "RHBA-2000:106-04", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHBA-2000-106.html" }, { "name": "fetchmail-authenticate-gssapi(7455)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7455" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2001-0101", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Vulnerability in fetchmail 5.5.0-2 and earlier in the AUTHENTICATE GSSAPI command." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "TLSA2000024-1", "refsource": "TURBO", "url": "http://www.turbolinux.com/pipermail/tl-security-announce/2000-December/000027.html" }, { "name": "RHBA-2000:106-04", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHBA-2000-106.html" }, { "name": "fetchmail-authenticate-gssapi(7455)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7455" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2001-0101", "datePublished": "2001-02-02T05:00:00", "dateReserved": "2001-02-01T00:00:00", "dateUpdated": "2024-08-08T04:06:55.260Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2002-1365 (GCVE-0-2002-1365)
Vulnerability from cvelistv5
Published
2004-09-01 04:00
Modified
2024-08-08 03:19
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Heap-based buffer overflow in Fetchmail 6.1.3 and earlier does not account for the "@" character when determining buffer lengths for local addresses, which allows remote attackers to execute arbitrary code via a header with a large number of local addresses.
References
► | URL | Tags | ||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T03:19:28.987Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "6390", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/6390" }, { "name": "MDKSA-2003:011", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred" ], "url": "http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:011" }, { "name": "20021213 Advisory 05/2002: Another Fetchmail Remote Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=103979751818638\u0026w=2" }, { "name": "20021215 GLSA: fetchmail", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=104004858802000\u0026w=2" }, { "name": "DSA-216", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2002/dsa-216" }, { "name": "fetchmail-address-header-bo(10839)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10839" }, { "name": "RHSA-2002:293", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2002-293.html" }, { "name": "CLA-2002:554", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA", "x_transferred" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000554" }, { "name": "RHSA-2002:294", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2002-294.html" }, { "name": "RHSA-2003:155", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-155.html" }, { "name": "CSSA-2003-001.0", "tags": [ "vendor-advisory", "x_refsource_CALDERA", "x_transferred" ], "url": "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2003-001.0.txt" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://security.e-matters.de/advisories/052002.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2002-12-13T00:00:00", "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in Fetchmail 6.1.3 and earlier does not account for the \"@\" character when determining buffer lengths for local addresses, which allows remote attackers to execute arbitrary code via a header with a large number of local addresses." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2007-11-13T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "6390", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/6390" }, { "name": "MDKSA-2003:011", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE" ], "url": "http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:011" }, { "name": "20021213 Advisory 05/2002: Another Fetchmail Remote Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=103979751818638\u0026w=2" }, { "name": "20021215 GLSA: fetchmail", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=104004858802000\u0026w=2" }, { "name": "DSA-216", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2002/dsa-216" }, { "name": "fetchmail-address-header-bo(10839)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10839" }, { "name": "RHSA-2002:293", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2002-293.html" }, { "name": "CLA-2002:554", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000554" }, { "name": "RHSA-2002:294", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2002-294.html" }, { "name": "RHSA-2003:155", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-155.html" }, { "name": "CSSA-2003-001.0", "tags": [ "vendor-advisory", "x_refsource_CALDERA" ], "url": "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2003-001.0.txt" }, { "tags": [ "x_refsource_MISC" ], "url": "http://security.e-matters.de/advisories/052002.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-1365", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Heap-based buffer overflow in Fetchmail 6.1.3 and earlier does not account for the \"@\" character when determining buffer lengths for local addresses, which allows remote attackers to execute arbitrary code via a header with a large number of local addresses." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "6390", "refsource": "BID", "url": "http://www.securityfocus.com/bid/6390" }, { "name": "MDKSA-2003:011", "refsource": "MANDRAKE", "url": "http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:011" }, { "name": "20021213 Advisory 05/2002: Another Fetchmail Remote Vulnerability", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=103979751818638\u0026w=2" }, { "name": "20021215 GLSA: fetchmail", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=104004858802000\u0026w=2" }, { "name": "DSA-216", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2002/dsa-216" }, { "name": "fetchmail-address-header-bo(10839)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10839" }, { "name": "RHSA-2002:293", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2002-293.html" }, { "name": "CLA-2002:554", "refsource": "CONECTIVA", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000554" }, { "name": "RHSA-2002:294", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2002-294.html" }, { "name": "RHSA-2003:155", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2003-155.html" }, { "name": "CSSA-2003-001.0", "refsource": "CALDERA", "url": "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2003-001.0.txt" }, { "name": "http://security.e-matters.de/advisories/052002.html", "refsource": "MISC", "url": "http://security.e-matters.de/advisories/052002.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-1365", "datePublished": "2004-09-01T04:00:00", "dateReserved": "2002-12-16T00:00:00", "dateUpdated": "2024-08-08T03:19:28.987Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2009-2666 (GCVE-0-2009-2666)
Vulnerability from cvelistv5
Published
2009-08-07 18:33
Modified
2024-08-07 05:59
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
socket.c in fetchmail before 6.3.11 does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T05:59:56.877Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "MDVSA-2009:201", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:201" }, { "name": "36175", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/36175" }, { "name": "36236", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/36236" }, { "name": "DSA-1852", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2009/dsa-1852" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://fetchmail.berlios.de/fetchmail-SA-2009-01.txt" }, { "name": "[oss-security] 20090805 Re: CVE request: fetchmail \u003c= 6.3.10 SSL certificate", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://marc.info/?l=oss-security\u0026m=124949601207156\u0026w=2" }, { "name": "20090806 fetchmail security announcement fetchmail-SA-2009-01 (CVE-2009-2666)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/505530/100/0/threaded" }, { "name": "SSA:2009-218-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred" ], "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.543463" }, { "name": "36179", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/36179" }, { "name": "1022679", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1022679" }, { "name": "56855", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/56855" }, { "name": "oval:org.mitre.oval:def:11059", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11059" }, { "name": "ADV-2009-3184", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/3184" }, { "name": "ADV-2009-2155", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/2155" }, { "name": "APPLE-SA-2009-11-09-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT3937" }, { "name": "35951", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/35951" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-08-05T00:00:00", "descriptions": [ { "lang": "en", "value": "socket.c in fetchmail before 6.3.11 does not properly handle a \u0027\\0\u0027 character in a domain name in the subject\u0027s Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "MDVSA-2009:201", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:201" }, { "name": "36175", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/36175" }, { "name": "36236", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/36236" }, { "name": "DSA-1852", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2009/dsa-1852" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://fetchmail.berlios.de/fetchmail-SA-2009-01.txt" }, { "name": "[oss-security] 20090805 Re: CVE request: fetchmail \u003c= 6.3.10 SSL certificate", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://marc.info/?l=oss-security\u0026m=124949601207156\u0026w=2" }, { "name": "20090806 fetchmail security announcement fetchmail-SA-2009-01 (CVE-2009-2666)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/505530/100/0/threaded" }, { "name": "SSA:2009-218-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE" ], "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.543463" }, { "name": "36179", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/36179" }, { "name": "1022679", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1022679" }, { "name": "56855", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/56855" }, { "name": "oval:org.mitre.oval:def:11059", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11059" }, { "name": "ADV-2009-3184", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/3184" }, { "name": "ADV-2009-2155", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/2155" }, { "name": "APPLE-SA-2009-11-09-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT3937" }, { "name": "35951", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/35951" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-2666", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "socket.c in fetchmail before 6.3.11 does not properly handle a \u0027\\0\u0027 character in a domain name in the subject\u0027s Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "MDVSA-2009:201", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:201" }, { "name": "36175", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/36175" }, { "name": "36236", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/36236" }, { "name": "DSA-1852", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2009/dsa-1852" }, { "name": "http://fetchmail.berlios.de/fetchmail-SA-2009-01.txt", "refsource": "CONFIRM", "url": "http://fetchmail.berlios.de/fetchmail-SA-2009-01.txt" }, { "name": "[oss-security] 20090805 Re: CVE request: fetchmail \u003c= 6.3.10 SSL certificate", "refsource": "MLIST", "url": "http://marc.info/?l=oss-security\u0026m=124949601207156\u0026w=2" }, { "name": "20090806 fetchmail security announcement fetchmail-SA-2009-01 (CVE-2009-2666)", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/505530/100/0/threaded" }, { "name": "SSA:2009-218-01", "refsource": "SLACKWARE", "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.543463" }, { "name": "36179", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/36179" }, { "name": "1022679", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1022679" }, { "name": "56855", "refsource": "OSVDB", "url": "http://osvdb.org/56855" }, { "name": "oval:org.mitre.oval:def:11059", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11059" }, { "name": "ADV-2009-3184", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/3184" }, { "name": "ADV-2009-2155", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/2155" }, { "name": "APPLE-SA-2009-11-09-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html" }, { "name": "http://support.apple.com/kb/HT3937", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT3937" }, { "name": "35951", "refsource": "BID", "url": "http://www.securityfocus.com/bid/35951" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-2666", "datePublished": "2009-08-07T18:33:00", "dateReserved": "2009-08-05T00:00:00", "dateUpdated": "2024-08-07T05:59:56.877Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-0562 (GCVE-0-2010-0562)
Vulnerability from cvelistv5
Published
2010-02-08 21:00
Modified
2024-08-07 00:52
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The sdump function in sdump.c in fetchmail 6.3.11, 6.3.12, and 6.3.13, when running in verbose mode on platforms for which char is signed, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an SSL X.509 certificate containing non-printable characters with the high bit set, which triggers a heap-based buffer overflow during escaping.
References
► | URL | Tags | ||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T00:52:19.355Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "MDVSA-2010:037", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:037" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.fetchmail.info/fetchmail-SA-2010-01.txt" }, { "name": "38088", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/38088" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://mknod.org/svn/fetchmail/branches/BRANCH_6-3/fetchmail-SA-2010-01.txt" }, { "name": "1023543", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1023543" }, { "name": "38391", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/38391" }, { "name": "62114", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/62114" }, { "name": "ADV-2010-0296", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/0296" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-02-04T00:00:00", "descriptions": [ { "lang": "en", "value": "The sdump function in sdump.c in fetchmail 6.3.11, 6.3.12, and 6.3.13, when running in verbose mode on platforms for which char is signed, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an SSL X.509 certificate containing non-printable characters with the high bit set, which triggers a heap-based buffer overflow during escaping." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2010-02-24T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "MDVSA-2010:037", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:037" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.fetchmail.info/fetchmail-SA-2010-01.txt" }, { "name": "38088", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/38088" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://mknod.org/svn/fetchmail/branches/BRANCH_6-3/fetchmail-SA-2010-01.txt" }, { "name": "1023543", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1023543" }, { "name": "38391", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/38391" }, { "name": "62114", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/62114" }, { "name": "ADV-2010-0296", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/0296" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-0562", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The sdump function in sdump.c in fetchmail 6.3.11, 6.3.12, and 6.3.13, when running in verbose mode on platforms for which char is signed, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an SSL X.509 certificate containing non-printable characters with the high bit set, which triggers a heap-based buffer overflow during escaping." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "MDVSA-2010:037", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:037" }, { "name": "http://www.fetchmail.info/fetchmail-SA-2010-01.txt", "refsource": "CONFIRM", "url": "http://www.fetchmail.info/fetchmail-SA-2010-01.txt" }, { "name": "38088", "refsource": "BID", "url": "http://www.securityfocus.com/bid/38088" }, { "name": "http://mknod.org/svn/fetchmail/branches/BRANCH_6-3/fetchmail-SA-2010-01.txt", "refsource": "CONFIRM", "url": "http://mknod.org/svn/fetchmail/branches/BRANCH_6-3/fetchmail-SA-2010-01.txt" }, { "name": "1023543", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1023543" }, { "name": "38391", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/38391" }, { "name": "62114", "refsource": "OSVDB", "url": "http://osvdb.org/62114" }, { "name": "ADV-2010-0296", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/0296" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-0562", "datePublished": "2010-02-08T21:00:00", "dateReserved": "2010-02-08T00:00:00", "dateUpdated": "2024-08-07T00:52:19.355Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2008-2711 (GCVE-0-2008-2711)
Vulnerability from cvelistv5
Published
2008-06-16 21:00
Modified
2024-08-07 09:14
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
fetchmail 6.3.8 and earlier, when running in -v -v (aka verbose) mode, allows remote attackers to cause a denial of service (crash and persistent mail failure) via a malformed mail message with long headers, which triggers an erroneous dereference when using vsnprintf to format log messages.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T09:14:14.639Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2008-1860", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1860/references" }, { "name": "31287", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31287" }, { "name": "20080729 rPSA-2008-0235-1 fetchmail fetchmailconf", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/494865/100/0/threaded" }, { "name": "1020298", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1020298" }, { "name": "33937", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/33937" }, { "name": "20080617 fetchmail security announcement fetchmail-SA-2008-01 (CVE-2008-2711)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/493391/100/0/threaded" }, { "name": "31262", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31262" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0235" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT3438" }, { "name": "APPLE-SA-2009-02-12", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html" }, { "name": "30895", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30895" }, { "name": "FEDORA-2008-5800", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg01095.html" }, { "name": "FEDORA-2008-5789", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg01091.html" }, { "name": "SSA:2008-210-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.495740" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.fetchmail.info/fetchmail-SA-2008-01.txt" }, { "name": "ADV-2009-0422", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/0422" }, { "name": "29705", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/29705" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://issues.rpath.com/browse/RPL-2623" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.novell.com/show_bug.cgi?id=354291" }, { "name": "MDVSA-2008:117", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:117" }, { "name": "fetchmail-logmessage-dos(43121)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43121" }, { "name": "[oss-security] 20080613 CVE Id Request: fetchmail \u003c= 6.3.8 DoS when logging long headers in -v -v mode", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2008/06/13/1" }, { "name": "oval:org.mitre.oval:def:10950", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10950" }, { "name": "30742", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30742" }, { "name": "[oss-security] 20210809 fetchmail 6.4.21 released/regression fix for 6.4.20\u0027s security fix, and UPDATE: fetchmail \u003c= 6.4.19 security announcement 2021-01 (CVE-2021-36386)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2021/08/09/1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-06-13T00:00:00", "descriptions": [ { "lang": "en", "value": "fetchmail 6.3.8 and earlier, when running in -v -v (aka verbose) mode, allows remote attackers to cause a denial of service (crash and persistent mail failure) via a malformed mail message with long headers, which triggers an erroneous dereference when using vsnprintf to format log messages." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-09T20:06:29", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "ADV-2008-1860", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1860/references" }, { "name": "31287", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31287" }, { "name": "20080729 rPSA-2008-0235-1 fetchmail fetchmailconf", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/494865/100/0/threaded" }, { "name": "1020298", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1020298" }, { "name": "33937", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/33937" }, { "name": "20080617 fetchmail security announcement fetchmail-SA-2008-01 (CVE-2008-2711)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/493391/100/0/threaded" }, { "name": "31262", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31262" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0235" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT3438" }, { "name": "APPLE-SA-2009-02-12", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html" }, { "name": "30895", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30895" }, { "name": "FEDORA-2008-5800", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg01095.html" }, { "name": "FEDORA-2008-5789", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg01091.html" }, { "name": "SSA:2008-210-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.495740" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.fetchmail.info/fetchmail-SA-2008-01.txt" }, { "name": "ADV-2009-0422", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/0422" }, { "name": "29705", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/29705" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://issues.rpath.com/browse/RPL-2623" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.novell.com/show_bug.cgi?id=354291" }, { "name": "MDVSA-2008:117", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:117" }, { "name": "fetchmail-logmessage-dos(43121)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43121" }, { "name": "[oss-security] 20080613 CVE Id Request: fetchmail \u003c= 6.3.8 DoS when logging long headers in -v -v mode", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2008/06/13/1" }, { "name": "oval:org.mitre.oval:def:10950", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10950" }, { "name": "30742", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30742" }, { "name": "[oss-security] 20210809 fetchmail 6.4.21 released/regression fix for 6.4.20\u0027s security fix, and UPDATE: fetchmail \u003c= 6.4.19 security announcement 2021-01 (CVE-2021-36386)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2021/08/09/1" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-2711", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "fetchmail 6.3.8 and earlier, when running in -v -v (aka verbose) mode, allows remote attackers to cause a denial of service (crash and persistent mail failure) via a malformed mail message with long headers, which triggers an erroneous dereference when using vsnprintf to format log messages." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2008-1860", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1860/references" }, { "name": "31287", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31287" }, { "name": "20080729 rPSA-2008-0235-1 fetchmail fetchmailconf", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/494865/100/0/threaded" }, { "name": "1020298", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1020298" }, { "name": "33937", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/33937" }, { "name": "20080617 fetchmail security announcement fetchmail-SA-2008-01 (CVE-2008-2711)", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/493391/100/0/threaded" }, { "name": "31262", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31262" }, { "name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0235", "refsource": "CONFIRM", "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0235" }, { "name": "http://support.apple.com/kb/HT3438", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT3438" }, { "name": "APPLE-SA-2009-02-12", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html" }, { "name": "30895", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30895" }, { "name": "FEDORA-2008-5800", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg01095.html" }, { "name": "FEDORA-2008-5789", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg01091.html" }, { "name": "SSA:2008-210-01", "refsource": "SLACKWARE", "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.495740" }, { "name": "http://www.fetchmail.info/fetchmail-SA-2008-01.txt", "refsource": "CONFIRM", "url": "http://www.fetchmail.info/fetchmail-SA-2008-01.txt" }, { "name": "ADV-2009-0422", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/0422" }, { "name": "29705", "refsource": "BID", "url": "http://www.securityfocus.com/bid/29705" }, { "name": "https://issues.rpath.com/browse/RPL-2623", "refsource": "CONFIRM", "url": "https://issues.rpath.com/browse/RPL-2623" }, { "name": "https://bugzilla.novell.com/show_bug.cgi?id=354291", "refsource": "MISC", "url": "https://bugzilla.novell.com/show_bug.cgi?id=354291" }, { "name": "MDVSA-2008:117", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:117" }, { "name": "fetchmail-logmessage-dos(43121)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43121" }, { "name": "[oss-security] 20080613 CVE Id Request: fetchmail \u003c= 6.3.8 DoS when logging long headers in -v -v mode", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2008/06/13/1" }, { "name": "oval:org.mitre.oval:def:10950", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10950" }, { "name": "30742", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30742" }, { "name": "[oss-security] 20210809 fetchmail 6.4.21 released/regression fix for 6.4.20\u0027s security fix, and UPDATE: fetchmail \u003c= 6.4.19 security announcement 2021-01 (CVE-2021-36386)", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/09/1" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-2711", "datePublished": "2008-06-16T21:00:00", "dateReserved": "2008-06-16T00:00:00", "dateUpdated": "2024-08-07T09:14:14.639Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2005-4348 (GCVE-0-2005-4348)
Vulnerability from cvelistv5
Published
2005-12-21 00:00
Modified
2024-08-07 23:38
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
fetchmail before 6.3.1 and before 6.2.5.5, when configured for multidrop mode, allows remote attackers to cause a denial of service (application crash) by sending messages without headers from upstream mail servers.
References
► | URL | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T23:38:51.851Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "18266", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/18266" }, { "name": "18172", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/18172" }, { "name": "18231", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/18231" }, { "name": "ADV-2006-3101", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/3101" }, { "name": "20051221 fetchmail security announcement fetchmail-SA-2005-03 (CVE-2005-4348)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/420098/100/0/threaded" }, { "name": "21253", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21253" }, { "name": "1015383", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1015383" }, { "name": "SSA:2006-045-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.443499" }, { "name": "17891", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/17891" }, { "name": "19289", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/19289" }, { "name": "2006-0002", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX", "x_transferred" ], "url": "http://www.trustix.org/errata/2006/0002/" }, { "name": "18463", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/18463" }, { "name": "24284", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24284" }, { "name": "24007", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24007" }, { "name": "oval:org.mitre.oval:def:9659", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9659" }, { "name": "15987", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/15987" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=343836" }, { "name": "fetchmail-null-pointer-dos(23713)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23713" }, { "name": "SUSE-SR:2007:004", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2007_4_sr.html" }, { "name": "USN-233-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/233-1/" }, { "name": "21906", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/21906" }, { "name": "ADV-2005-2996", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2005/2996" }, { "name": "MDKSA-2005:236", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:236" }, { "name": "20060526 rPSA-2006-0084-1 fetchmail", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/435197/100/0/threaded" }, { "name": "20070201-01-P", "tags": [ "vendor-advisory", "x_refsource_SGI", "x_transferred" ], "url": "ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc" }, { "name": "RHSA-2007:0018", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0018.html" }, { "name": "18895", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/18895" }, { "name": "DSA-939", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2005/dsa-939" }, { "name": "18433", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/18433" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://fetchmail.berlios.de/fetchmail-SA-2005-03.txt" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-12-19T00:00:00", "descriptions": [ { "lang": "en", "value": "fetchmail before 6.3.1 and before 6.2.5.5, when configured for multidrop mode, allows remote attackers to cause a denial of service (application crash) by sending messages without headers from upstream mail servers." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-19T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "18266", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/18266" }, { "name": "18172", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/18172" }, { "name": "18231", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/18231" }, { "name": "ADV-2006-3101", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/3101" }, { "name": "20051221 fetchmail security announcement fetchmail-SA-2005-03 (CVE-2005-4348)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/420098/100/0/threaded" }, { "name": "21253", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21253" }, { "name": "1015383", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1015383" }, { "name": "SSA:2006-045-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.443499" }, { "name": "17891", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/17891" }, { "name": "19289", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/19289" }, { "name": "2006-0002", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX" ], "url": "http://www.trustix.org/errata/2006/0002/" }, { "name": "18463", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/18463" }, { "name": "24284", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24284" }, { "name": "24007", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24007" }, { "name": "oval:org.mitre.oval:def:9659", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9659" }, { "name": "15987", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/15987" }, { "tags": [ "x_refsource_MISC" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=343836" }, { "name": "fetchmail-null-pointer-dos(23713)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23713" }, { "name": "SUSE-SR:2007:004", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2007_4_sr.html" }, { "name": "USN-233-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/233-1/" }, { "name": "21906", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/21906" }, { "name": "ADV-2005-2996", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2005/2996" }, { "name": "MDKSA-2005:236", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:236" }, { "name": "20060526 rPSA-2006-0084-1 fetchmail", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/435197/100/0/threaded" }, { "name": "20070201-01-P", "tags": [ "vendor-advisory", "x_refsource_SGI" ], "url": "ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc" }, { "name": "RHSA-2007:0018", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0018.html" }, { "name": "18895", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/18895" }, { "name": "DSA-939", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2005/dsa-939" }, { "name": "18433", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/18433" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://fetchmail.berlios.de/fetchmail-SA-2005-03.txt" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-4348", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "fetchmail before 6.3.1 and before 6.2.5.5, when configured for multidrop mode, allows remote attackers to cause a denial of service (application crash) by sending messages without headers from upstream mail servers." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "18266", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/18266" }, { "name": "18172", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/18172" }, { "name": "18231", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/18231" }, { "name": "ADV-2006-3101", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/3101" }, { "name": "20051221 fetchmail security announcement fetchmail-SA-2005-03 (CVE-2005-4348)", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/420098/100/0/threaded" }, { "name": "21253", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21253" }, { "name": "1015383", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1015383" }, { "name": "SSA:2006-045-01", "refsource": "SLACKWARE", "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.443499" }, { "name": "17891", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/17891" }, { "name": "19289", "refsource": "BID", "url": "http://www.securityfocus.com/bid/19289" }, { "name": "2006-0002", "refsource": "TRUSTIX", "url": "http://www.trustix.org/errata/2006/0002/" }, { "name": "18463", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/18463" }, { "name": "24284", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24284" }, { "name": "24007", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24007" }, { "name": "oval:org.mitre.oval:def:9659", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9659" }, { "name": "15987", "refsource": "BID", "url": "http://www.securityfocus.com/bid/15987" }, { "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=343836", "refsource": "MISC", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=343836" }, { "name": "fetchmail-null-pointer-dos(23713)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23713" }, { "name": "SUSE-SR:2007:004", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2007_4_sr.html" }, { "name": "USN-233-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/233-1/" }, { "name": "21906", "refsource": "OSVDB", "url": "http://www.osvdb.org/21906" }, { "name": "ADV-2005-2996", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2005/2996" }, { "name": "MDKSA-2005:236", "refsource": "MANDRIVA", "url": "http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:236" }, { "name": "20060526 rPSA-2006-0084-1 fetchmail", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/435197/100/0/threaded" }, { "name": "20070201-01-P", "refsource": "SGI", "url": "ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc" }, { "name": "RHSA-2007:0018", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2007-0018.html" }, { "name": "18895", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/18895" }, { "name": "DSA-939", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2005/dsa-939" }, { "name": "18433", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/18433" }, { "name": "http://fetchmail.berlios.de/fetchmail-SA-2005-03.txt", "refsource": "CONFIRM", "url": "http://fetchmail.berlios.de/fetchmail-SA-2005-03.txt" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-4348", "datePublished": "2005-12-21T00:00:00", "dateReserved": "2005-12-19T00:00:00", "dateUpdated": "2024-08-07T23:38:51.851Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-5974 (GCVE-0-2006-5974)
Vulnerability from cvelistv5
Published
2007-01-09 00:00
Modified
2024-08-07 20:12
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
fetchmail 6.3.5 and 6.3.6 before 6.3.6-rc4, when refusing a message delivered via the mda option, allows remote attackers to cause a denial of service (crash) via unknown vectors that trigger a NULL pointer dereference when calling the (1) ferror or (2) fflush functions.
References
► | URL | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T20:12:31.425Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1017479", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1017479" }, { "name": "SSA:2007-024-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.517995" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://fetchmail.berlios.de/fetchmail-SA-2006-03.txt" }, { "name": "23838", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/23838" }, { "name": "24151", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24151" }, { "name": "20070105 fetchmail security announcement 2006-03 (CVE-2006-5974)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/456114/100/0/threaded" }, { "name": "23631", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/23631" }, { "name": "23804", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/23804" }, { "name": "ADV-2007-0088", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/0088" }, { "name": "SUSE-SR:2007:004", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2007_4_sr.html" }, { "name": "FEDORA-2007-041", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://fedoranews.org/cms/node/2429" }, { "name": "23923", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/23923" }, { "name": "31836", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/31836" }, { "name": "OpenPKG-SA-2007.004", "tags": [ "vendor-advisory", "x_refsource_OPENPKG", "x_transferred" ], "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.004.html" }, { "name": "2007-0007", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX", "x_transferred" ], "url": "http://www.trustix.org/errata/2007/0007" }, { "name": "GLSA-200701-13", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200701-13.xml" }, { "name": "ADV-2007-0087", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/0087" }, { "name": "21902", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/21902" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-01-04T00:00:00", "descriptions": [ { "lang": "en", "value": "fetchmail 6.3.5 and 6.3.6 before 6.3.6-rc4, when refusing a message delivered via the mda option, allows remote attackers to cause a denial of service (crash) via unknown vectors that trigger a NULL pointer dereference when calling the (1) ferror or (2) fflush functions." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-17T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1017479", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1017479" }, { "name": "SSA:2007-024-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.517995" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://fetchmail.berlios.de/fetchmail-SA-2006-03.txt" }, { "name": "23838", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/23838" }, { "name": "24151", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24151" }, { "name": "20070105 fetchmail security announcement 2006-03 (CVE-2006-5974)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/456114/100/0/threaded" }, { "name": "23631", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/23631" }, { "name": "23804", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/23804" }, { "name": "ADV-2007-0088", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/0088" }, { "name": "SUSE-SR:2007:004", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2007_4_sr.html" }, { "name": "FEDORA-2007-041", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://fedoranews.org/cms/node/2429" }, { "name": "23923", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/23923" }, { "name": "31836", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/31836" }, { "name": "OpenPKG-SA-2007.004", "tags": [ "vendor-advisory", "x_refsource_OPENPKG" ], "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.004.html" }, { "name": "2007-0007", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX" ], "url": "http://www.trustix.org/errata/2007/0007" }, { "name": "GLSA-200701-13", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200701-13.xml" }, { "name": "ADV-2007-0087", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/0087" }, { "name": "21902", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/21902" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-5974", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "fetchmail 6.3.5 and 6.3.6 before 6.3.6-rc4, when refusing a message delivered via the mda option, allows remote attackers to cause a denial of service (crash) via unknown vectors that trigger a NULL pointer dereference when calling the (1) ferror or (2) fflush functions." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1017479", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1017479" }, { "name": "SSA:2007-024-01", "refsource": "SLACKWARE", "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.517995" }, { "name": "http://fetchmail.berlios.de/fetchmail-SA-2006-03.txt", "refsource": "CONFIRM", "url": "http://fetchmail.berlios.de/fetchmail-SA-2006-03.txt" }, { "name": "23838", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/23838" }, { "name": "24151", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24151" }, { "name": "20070105 fetchmail security announcement 2006-03 (CVE-2006-5974)", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/456114/100/0/threaded" }, { "name": "23631", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/23631" }, { "name": "23804", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/23804" }, { "name": "ADV-2007-0088", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/0088" }, { "name": "SUSE-SR:2007:004", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2007_4_sr.html" }, { "name": "FEDORA-2007-041", "refsource": "FEDORA", "url": "http://fedoranews.org/cms/node/2429" }, { "name": "23923", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/23923" }, { "name": "31836", "refsource": "OSVDB", "url": "http://osvdb.org/31836" }, { "name": "OpenPKG-SA-2007.004", "refsource": "OPENPKG", "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.004.html" }, { "name": "2007-0007", "refsource": "TRUSTIX", "url": "http://www.trustix.org/errata/2007/0007" }, { "name": "GLSA-200701-13", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200701-13.xml" }, { "name": "ADV-2007-0087", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/0087" }, { "name": "21902", "refsource": "BID", "url": "http://www.securityfocus.com/bid/21902" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-5974", "datePublished": "2007-01-09T00:00:00", "dateReserved": "2006-11-20T00:00:00", "dateUpdated": "2024-08-07T20:12:31.425Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2002-0146 (GCVE-0-2002-0146)
Vulnerability from cvelistv5
Published
2003-04-02 05:00
Modified
2024-08-08 02:42
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
fetchmail email client before 5.9.10 does not properly limit the maximum number of messages available, which allows a remote IMAP server to overwrite memory via a message count that exceeds the boundaries of an array.
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T02:42:27.666Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "HPSBTL0205-042", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://online.securityfocus.com/advisories/4145" }, { "name": "fetchmail-imap-msgnum-bo(9133)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "http://www.iss.net/security_center/static/9133.php" }, { "name": "4788", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/4788" }, { "name": "CSSA-2002-027.0", "tags": [ "vendor-advisory", "x_refsource_CALDERA", "x_transferred" ], "url": "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-027.0.txt" }, { "name": "RHSA-2002:047", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2002-047.html" }, { "name": "MDKSA-2002:036", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred" ], "url": "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-036.php" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2002-05-20T00:00:00", "descriptions": [ { "lang": "en", "value": "fetchmail email client before 5.9.10 does not properly limit the maximum number of messages available, which allows a remote IMAP server to overwrite memory via a message count that exceeds the boundaries of an array." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2002-08-17T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "HPSBTL0205-042", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://online.securityfocus.com/advisories/4145" }, { "name": "fetchmail-imap-msgnum-bo(9133)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "http://www.iss.net/security_center/static/9133.php" }, { "name": "4788", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/4788" }, { "name": "CSSA-2002-027.0", "tags": [ "vendor-advisory", "x_refsource_CALDERA" ], "url": "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-027.0.txt" }, { "name": "RHSA-2002:047", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2002-047.html" }, { "name": "MDKSA-2002:036", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE" ], "url": "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-036.php" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-0146", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "fetchmail email client before 5.9.10 does not properly limit the maximum number of messages available, which allows a remote IMAP server to overwrite memory via a message count that exceeds the boundaries of an array." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "HPSBTL0205-042", "refsource": "HP", "url": "http://online.securityfocus.com/advisories/4145" }, { "name": "fetchmail-imap-msgnum-bo(9133)", "refsource": "XF", "url": "http://www.iss.net/security_center/static/9133.php" }, { "name": "4788", "refsource": "BID", "url": "http://www.securityfocus.com/bid/4788" }, { "name": "CSSA-2002-027.0", "refsource": "CALDERA", "url": "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-027.0.txt" }, { "name": "RHSA-2002:047", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2002-047.html" }, { "name": "MDKSA-2002:036", "refsource": "MANDRAKE", "url": "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-036.php" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-0146", "datePublished": "2003-04-02T05:00:00", "dateReserved": "2002-03-18T00:00:00", "dateUpdated": "2024-08-08T02:42:27.666Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2001-1378 (GCVE-0-2001-1378)
Vulnerability from cvelistv5
Published
2003-04-02 05:00
Modified
2024-08-08 04:51
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
fetchmailconf in fetchmail before 5.7.4 allows local users to overwrite files of other users via a symlink attack on temporary files.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T04:51:08.433Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2001:103", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2001-103.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://lists.ccil.org/pipermail/fetchmail-announce/2001-March/000015.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2001-03-12T00:00:00", "descriptions": [ { "lang": "en", "value": "fetchmailconf in fetchmail before 5.7.4 allows local users to overwrite files of other users via a symlink attack on temporary files." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2002-07-26T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "RHSA-2001:103", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2001-103.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://lists.ccil.org/pipermail/fetchmail-announce/2001-March/000015.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2001-1378", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "fetchmailconf in fetchmail before 5.7.4 allows local users to overwrite files of other users via a symlink attack on temporary files." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2001:103", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2001-103.html" }, { "name": "http://lists.ccil.org/pipermail/fetchmail-announce/2001-March/000015.html", "refsource": "MISC", "url": "http://lists.ccil.org/pipermail/fetchmail-announce/2001-March/000015.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2001-1378", "datePublished": "2003-04-02T05:00:00", "dateReserved": "2002-07-15T00:00:00", "dateUpdated": "2024-08-08T04:51:08.433Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2007-4565 (GCVE-0-2007-4565)
Vulnerability from cvelistv5
Published
2007-08-28 01:00
Modified
2024-08-07 15:01
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
sink.c in fetchmail before 6.3.9 allows context-dependent attackers to cause a denial of service (NULL dereference and application crash) by refusing certain warning messages that are sent over SMTP.
References
► | URL | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T15:01:09.632Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "33937", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/33937" }, { "name": "3074", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/3074" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://fetchmail.berlios.de/fetchmail-SA-2007-02.txt" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://mknod.org/svn/fetchmail/branches/BRANCH_6-3/fetchmail-SA-2007-02.txt" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT3438" }, { "name": "1018627", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1018627" }, { "name": "APPLE-SA-2009-02-12", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html" }, { "name": "20080617 fetchmail security announcement fetchmail-SA-2007-02 (CVE-2007-4565)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/493388/100/0/threaded" }, { "name": "2007-0028", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX", "x_transferred" ], "url": "http://www.trustix.org/errata/2007/0028/" }, { "name": "oval:org.mitre.oval:def:10528", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10528" }, { "name": "25495", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/25495" }, { "name": "ADV-2007-3032", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/3032" }, { "name": "ADV-2009-0422", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/0422" }, { "name": "20070907 FLEA-2007-0053-1 fetchmail", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/478798/100/0/threaded" }, { "name": "27399", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27399" }, { "name": "fetchmail-warning-dos(36385)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36385" }, { "name": "DSA-1377", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2007/dsa-1377" }, { "name": "MDKSA-2007:179", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:179" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://issues.rpath.com/browse/RPL-1690" }, { "name": "USN-520-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-520-1" }, { "name": "SUSE-SR:2007:022", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00008.html" }, { "name": "45833", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/45833" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-07-29T00:00:00", "descriptions": [ { "lang": "en", "value": "sink.c in fetchmail before 6.3.9 allows context-dependent attackers to cause a denial of service (NULL dereference and application crash) by refusing certain warning messages that are sent over SMTP." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-15T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "33937", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/33937" }, { "name": "3074", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/3074" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://fetchmail.berlios.de/fetchmail-SA-2007-02.txt" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://mknod.org/svn/fetchmail/branches/BRANCH_6-3/fetchmail-SA-2007-02.txt" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT3438" }, { "name": "1018627", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1018627" }, { "name": "APPLE-SA-2009-02-12", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html" }, { "name": "20080617 fetchmail security announcement fetchmail-SA-2007-02 (CVE-2007-4565)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/493388/100/0/threaded" }, { "name": "2007-0028", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX" ], "url": "http://www.trustix.org/errata/2007/0028/" }, { "name": "oval:org.mitre.oval:def:10528", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10528" }, { "name": "25495", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/25495" }, { "name": "ADV-2007-3032", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/3032" }, { "name": "ADV-2009-0422", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/0422" }, { "name": "20070907 FLEA-2007-0053-1 fetchmail", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/478798/100/0/threaded" }, { "name": "27399", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27399" }, { "name": "fetchmail-warning-dos(36385)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36385" }, { "name": "DSA-1377", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2007/dsa-1377" }, { "name": "MDKSA-2007:179", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:179" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://issues.rpath.com/browse/RPL-1690" }, { "name": "USN-520-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-520-1" }, { "name": "SUSE-SR:2007:022", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00008.html" }, { "name": "45833", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/45833" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-4565", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "sink.c in fetchmail before 6.3.9 allows context-dependent attackers to cause a denial of service (NULL dereference and application crash) by refusing certain warning messages that are sent over SMTP." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "33937", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/33937" }, { "name": "3074", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/3074" }, { "name": "http://fetchmail.berlios.de/fetchmail-SA-2007-02.txt", "refsource": "CONFIRM", "url": "http://fetchmail.berlios.de/fetchmail-SA-2007-02.txt" }, { "name": "http://mknod.org/svn/fetchmail/branches/BRANCH_6-3/fetchmail-SA-2007-02.txt", "refsource": "CONFIRM", "url": "http://mknod.org/svn/fetchmail/branches/BRANCH_6-3/fetchmail-SA-2007-02.txt" }, { "name": "http://support.apple.com/kb/HT3438", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT3438" }, { "name": "1018627", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1018627" }, { "name": "APPLE-SA-2009-02-12", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html" }, { "name": "20080617 fetchmail security announcement fetchmail-SA-2007-02 (CVE-2007-4565)", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/493388/100/0/threaded" }, { "name": "2007-0028", "refsource": "TRUSTIX", "url": "http://www.trustix.org/errata/2007/0028/" }, { "name": "oval:org.mitre.oval:def:10528", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10528" }, { "name": "25495", "refsource": "BID", "url": "http://www.securityfocus.com/bid/25495" }, { "name": "ADV-2007-3032", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/3032" }, { "name": "ADV-2009-0422", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/0422" }, { "name": "20070907 FLEA-2007-0053-1 fetchmail", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/478798/100/0/threaded" }, { "name": "27399", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/27399" }, { "name": "fetchmail-warning-dos(36385)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36385" }, { "name": "DSA-1377", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2007/dsa-1377" }, { "name": "MDKSA-2007:179", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:179" }, { "name": "https://issues.rpath.com/browse/RPL-1690", "refsource": "CONFIRM", "url": "https://issues.rpath.com/browse/RPL-1690" }, { "name": "USN-520-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/usn-520-1" }, { "name": "SUSE-SR:2007:022", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00008.html" }, { "name": "45833", "refsource": "OSVDB", "url": "http://osvdb.org/45833" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-4565", "datePublished": "2007-08-28T01:00:00", "dateReserved": "2007-08-27T00:00:00", "dateUpdated": "2024-08-07T15:01:09.632Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2001-1009 (GCVE-0-2001-1009)
Vulnerability from cvelistv5
Published
2002-02-02 05:00
Modified
2024-08-08 04:37
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Fetchmail (aka fetchmail-ssl) before 5.8.17 allows a remote malicious (1) IMAP server or (2) POP/POP3 server to overwrite arbitrary memory and possibly gain privileges via a negative index number as part of a response to a LIST request.
References
► | URL | Tags | ||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T04:37:07.103Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SuSE-SA:2001:026", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2001_026_fetchmail_txt.html" }, { "name": "DSA-071", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2001/dsa-071" }, { "name": "RHSA-2001:103", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2001-103.html" }, { "name": "3166", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/3166" }, { "name": "20010809 Fetchmail security advisory", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2001-08/0118.html" }, { "name": "CLA-2001:419", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA", "x_transferred" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000419" }, { "name": "MDKSA-2001:072", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred" ], "url": "http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-072.php3" }, { "name": "ESA-20010816-01", "tags": [ "vendor-advisory", "x_refsource_ENGARDE", "x_transferred" ], "url": "http://www.linuxsecurity.com/advisories/other_advisory-1555.html" }, { "name": "3164", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/3164" }, { "name": "fetchmail-signed-integer-index(6965)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "http://www.iss.net/security_center/static/6965.php" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2001-08-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Fetchmail (aka fetchmail-ssl) before 5.8.17 allows a remote malicious (1) IMAP server or (2) POP/POP3 server to overwrite arbitrary memory and possibly gain privileges via a negative index number as part of a response to a LIST request." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2002-08-17T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "SuSE-SA:2001:026", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2001_026_fetchmail_txt.html" }, { "name": "DSA-071", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2001/dsa-071" }, { "name": "RHSA-2001:103", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2001-103.html" }, { "name": "3166", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/3166" }, { "name": "20010809 Fetchmail security advisory", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2001-08/0118.html" }, { "name": "CLA-2001:419", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000419" }, { "name": "MDKSA-2001:072", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE" ], "url": "http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-072.php3" }, { "name": "ESA-20010816-01", "tags": [ "vendor-advisory", "x_refsource_ENGARDE" ], "url": "http://www.linuxsecurity.com/advisories/other_advisory-1555.html" }, { "name": "3164", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/3164" }, { "name": "fetchmail-signed-integer-index(6965)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "http://www.iss.net/security_center/static/6965.php" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2001-1009", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Fetchmail (aka fetchmail-ssl) before 5.8.17 allows a remote malicious (1) IMAP server or (2) POP/POP3 server to overwrite arbitrary memory and possibly gain privileges via a negative index number as part of a response to a LIST request." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "SuSE-SA:2001:026", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2001_026_fetchmail_txt.html" }, { "name": "DSA-071", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2001/dsa-071" }, { "name": "RHSA-2001:103", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2001-103.html" }, { "name": "3166", "refsource": "BID", "url": "http://www.securityfocus.com/bid/3166" }, { "name": "20010809 Fetchmail security advisory", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2001-08/0118.html" }, { "name": "CLA-2001:419", "refsource": "CONECTIVA", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000419" }, { "name": "MDKSA-2001:072", "refsource": "MANDRAKE", "url": "http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-072.php3" }, { "name": "ESA-20010816-01", "refsource": "ENGARDE", "url": "http://www.linuxsecurity.com/advisories/other_advisory-1555.html" }, { "name": "3164", "refsource": "BID", "url": "http://www.securityfocus.com/bid/3164" }, { "name": "fetchmail-signed-integer-index(6965)", "refsource": "XF", "url": "http://www.iss.net/security_center/static/6965.php" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2001-1009", "datePublished": "2002-02-02T05:00:00", "dateReserved": "2002-01-31T00:00:00", "dateUpdated": "2024-08-08T04:37:07.103Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-3482 (GCVE-0-2012-3482)
Vulnerability from cvelistv5
Published
2012-12-21 02:00
Modified
2024-08-06 20:05
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Fetchmail 5.0.8 through 6.3.21, when using NTLM authentication in debug mode, allows remote NTLM servers to (1) cause a denial of service (crash and delayed delivery of inbound mail) via a crafted NTLM response that triggers an out-of-bounds read in the base64 decoder, or (2) obtain sensitive information from memory via an NTLM Type 2 message with a crafted Target Name structure, which triggers an out-of-bounds read.
References
► | URL | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:05:12.577Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20120813 Re: CVE ID request for fetchmail segfault in NTLM protocol exchange", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://seclists.org/oss-sec/2012/q3/232" }, { "name": "[oss-security] 20120813 CVE ID request for fetchmail segfault in NTLM protocol exchange", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://seclists.org/oss-sec/2012/q3/230" }, { "name": "54987", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/54987" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail" }, { "name": "FEDORA-2012-14451", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-October/088871.html" }, { "name": "FEDORA-2012-14462", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-October/088836.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.fetchmail.info/fetchmail-SA-2012-02.txt" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-08-13T00:00:00", "descriptions": [ { "lang": "en", "value": "Fetchmail 5.0.8 through 6.3.21, when using NTLM authentication in debug mode, allows remote NTLM servers to (1) cause a denial of service (crash and delayed delivery of inbound mail) via a crafted NTLM response that triggers an out-of-bounds read in the base64 decoder, or (2) obtain sensitive information from memory via an NTLM Type 2 message with a crafted Target Name structure, which triggers an out-of-bounds read." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-04-05T09:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "[oss-security] 20120813 Re: CVE ID request for fetchmail segfault in NTLM protocol exchange", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://seclists.org/oss-sec/2012/q3/232" }, { "name": "[oss-security] 20120813 CVE ID request for fetchmail segfault in NTLM protocol exchange", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://seclists.org/oss-sec/2012/q3/230" }, { "name": "54987", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/54987" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail" }, { "name": "FEDORA-2012-14451", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-October/088871.html" }, { "name": "FEDORA-2012-14462", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-October/088836.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.fetchmail.info/fetchmail-SA-2012-02.txt" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2012-3482", "datePublished": "2012-12-21T02:00:00", "dateReserved": "2012-06-14T00:00:00", "dateUpdated": "2024-08-06T20:05:12.577Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-1167 (GCVE-0-2010-1167)
Vulnerability from cvelistv5
Published
2010-05-07 17:43
Modified
2024-08-07 01:14
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
fetchmail 4.6.3 through 6.3.16, when debug mode is enabled, does not properly handle invalid characters in a multi-character locale, which allows remote attackers to cause a denial of service (memory consumption and application crash) via a crafted (1) message header or (2) POP3 UIDL list.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T01:14:06.646Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "39556", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/39556" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.fetchmail.info/fetchmail-SA-2010-02.txt" }, { "name": "20100506 fetchmail security announcement fetchmail-SA-2010-02 (CVE-2010-1167)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/511140/100/0/threaded" }, { "name": "MDVSA-2011:107", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:107" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://developer.berlios.de/project/shownotes.php?group_id=1824\u0026release_id=17512" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-05-06T00:00:00", "descriptions": [ { "lang": "en", "value": "fetchmail 4.6.3 through 6.3.16, when debug mode is enabled, does not properly handle invalid characters in a multi-character locale, which allows remote attackers to cause a denial of service (memory consumption and application crash) via a crafted (1) message header or (2) POP3 UIDL list." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "39556", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/39556" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.fetchmail.info/fetchmail-SA-2010-02.txt" }, { "name": "20100506 fetchmail security announcement fetchmail-SA-2010-02 (CVE-2010-1167)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/511140/100/0/threaded" }, { "name": "MDVSA-2011:107", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:107" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://developer.berlios.de/project/shownotes.php?group_id=1824\u0026release_id=17512" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2010-1167", "datePublished": "2010-05-07T17:43:00", "dateReserved": "2010-03-29T00:00:00", "dateUpdated": "2024-08-07T01:14:06.646Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-39272 (GCVE-0-2021-39272)
Vulnerability from cvelistv5
Published
2021-08-30 05:05
Modified
2024-08-04 02:06
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Fetchmail before 6.4.22 fails to enforce STARTTLS session encryption in some circumstances, such as a certain situation with IMAP and PREAUTH.
References
► | URL | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:06:41.615Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.fetchmail.info/security.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://nostarttls.secvuln.info/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2021/08/27/3" }, { "name": "FEDORA-2021-ddefbdbb46", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3XJ6XLEJCEZCAM5LGGD6XBCC522QLG4/" }, { "name": "FEDORA-2021-9998719311", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZYCYLL73NP7ALJWSDICIVSA47ZIXWSSA/" }, { "name": "FEDORA-2021-e61a978fef", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VXMKSEHAQSEDCWZMAOJEGX3P3JW6QY6H/" }, { "name": "GLSA-202209-14", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202209-14" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Fetchmail before 6.4.22 fails to enforce STARTTLS session encryption in some circumstances, such as a certain situation with IMAP and PREAUTH." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-25T15:07:04", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.fetchmail.info/security.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://nostarttls.secvuln.info/" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.openwall.com/lists/oss-security/2021/08/27/3" }, { "name": "FEDORA-2021-ddefbdbb46", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3XJ6XLEJCEZCAM5LGGD6XBCC522QLG4/" }, { "name": "FEDORA-2021-9998719311", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZYCYLL73NP7ALJWSDICIVSA47ZIXWSSA/" }, { "name": "FEDORA-2021-e61a978fef", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VXMKSEHAQSEDCWZMAOJEGX3P3JW6QY6H/" }, { "name": "GLSA-202209-14", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202209-14" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-39272", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Fetchmail before 6.4.22 fails to enforce STARTTLS session encryption in some circumstances, such as a certain situation with IMAP and PREAUTH." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.fetchmail.info/security.html", "refsource": "MISC", "url": "https://www.fetchmail.info/security.html" }, { "name": "https://nostarttls.secvuln.info/", "refsource": "MISC", "url": "https://nostarttls.secvuln.info/" }, { "name": "http://www.openwall.com/lists/oss-security/2021/08/27/3", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2021/08/27/3" }, { "name": "FEDORA-2021-ddefbdbb46", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L3XJ6XLEJCEZCAM5LGGD6XBCC522QLG4/" }, { "name": "FEDORA-2021-9998719311", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZYCYLL73NP7ALJWSDICIVSA47ZIXWSSA/" }, { "name": "FEDORA-2021-e61a978fef", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXMKSEHAQSEDCWZMAOJEGX3P3JW6QY6H/" }, { "name": "GLSA-202209-14", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202209-14" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-39272", "datePublished": "2021-08-30T05:05:26", "dateReserved": "2021-08-18T00:00:00", "dateUpdated": "2024-08-04T02:06:41.615Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2001-0819 (GCVE-0-2001-0819)
Vulnerability from cvelistv5
Published
2002-03-09 05:00
Modified
2024-08-08 04:37
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
A buffer overflow in Linux fetchmail before 5.8.6 allows remote attackers to execute arbitrary code via a large 'To:' field in an email header.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T04:37:06.917Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SuSE-SA:2001:026", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2001_026_fetchmail_txt.html" }, { "name": "RHSA-2001:103", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2001-103.html" }, { "name": "FreeBSD-SA-01:43", "tags": [ "vendor-advisory", "x_refsource_FREEBSD", "x_transferred" ], "url": "ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:43.fetchmail.asc" }, { "name": "2877", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/2877" }, { "name": "IMNX-2001-70-025-01", "tags": [ "vendor-advisory", "x_refsource_IMMUNIX", "x_transferred" ], "url": "http://download.immunix.org/ImmunixOS/7.0/updates/IMNX-2001-70-025-01" }, { "name": "ESA-20010620-01", "tags": [ "vendor-advisory", "x_refsource_ENGARDE", "x_transferred" ], "url": "http://www.linuxsecurity.com/advisories/other_advisory-1451.html" }, { "name": "CSSA-2001-022.1", "tags": [ "vendor-advisory", "x_refsource_CALDERA", "x_transferred" ], "url": "http://www.caldera.com/support/security/advisories/CSSA-2001-022.1.txt" }, { "name": "DSA-060", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2001/dsa-060" }, { "name": "MDKSA-2001:063", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred" ], "url": "http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-063.php3?dis=7.1" }, { "name": "fetchmail-long-header-bo(6704)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6704" }, { "name": "CLA-2001:403", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA", "x_transferred" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000403" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2001-06-10T00:00:00", "descriptions": [ { "lang": "en", "value": "A buffer overflow in Linux fetchmail before 5.8.6 allows remote attackers to execute arbitrary code via a large \u0027To:\u0027 field in an email header." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2002-02-26T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "SuSE-SA:2001:026", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2001_026_fetchmail_txt.html" }, { "name": "RHSA-2001:103", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2001-103.html" }, { "name": "FreeBSD-SA-01:43", "tags": [ "vendor-advisory", "x_refsource_FREEBSD" ], "url": "ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:43.fetchmail.asc" }, { "name": "2877", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/2877" }, { "name": "IMNX-2001-70-025-01", "tags": [ "vendor-advisory", "x_refsource_IMMUNIX" ], "url": "http://download.immunix.org/ImmunixOS/7.0/updates/IMNX-2001-70-025-01" }, { "name": "ESA-20010620-01", "tags": [ "vendor-advisory", "x_refsource_ENGARDE" ], "url": "http://www.linuxsecurity.com/advisories/other_advisory-1451.html" }, { "name": "CSSA-2001-022.1", "tags": [ "vendor-advisory", "x_refsource_CALDERA" ], "url": "http://www.caldera.com/support/security/advisories/CSSA-2001-022.1.txt" }, { "name": "DSA-060", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2001/dsa-060" }, { "name": "MDKSA-2001:063", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE" ], "url": "http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-063.php3?dis=7.1" }, { "name": "fetchmail-long-header-bo(6704)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6704" }, { "name": "CLA-2001:403", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000403" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2001-0819", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A buffer overflow in Linux fetchmail before 5.8.6 allows remote attackers to execute arbitrary code via a large \u0027To:\u0027 field in an email header." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "SuSE-SA:2001:026", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2001_026_fetchmail_txt.html" }, { "name": "RHSA-2001:103", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2001-103.html" }, { "name": "FreeBSD-SA-01:43", "refsource": "FREEBSD", "url": "ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:43.fetchmail.asc" }, { "name": "2877", "refsource": "BID", "url": "http://www.securityfocus.com/bid/2877" }, { "name": "IMNX-2001-70-025-01", "refsource": "IMMUNIX", "url": "http://download.immunix.org/ImmunixOS/7.0/updates/IMNX-2001-70-025-01" }, { "name": "ESA-20010620-01", "refsource": "ENGARDE", "url": "http://www.linuxsecurity.com/advisories/other_advisory-1451.html" }, { "name": "CSSA-2001-022.1", "refsource": "CALDERA", "url": "http://www.caldera.com/support/security/advisories/CSSA-2001-022.1.txt" }, { "name": "DSA-060", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2001/dsa-060" }, { "name": "MDKSA-2001:063", "refsource": "MANDRAKE", "url": "http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-063.php3?dis=7.1" }, { "name": "fetchmail-long-header-bo(6704)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6704" }, { "name": "CLA-2001:403", "refsource": "CONECTIVA", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000403" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2001-0819", "datePublished": "2002-03-09T05:00:00", "dateReserved": "2001-11-22T00:00:00", "dateUpdated": "2024-08-08T04:37:06.917Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2005-3088 (GCVE-0-2005-3088)
Vulnerability from cvelistv5
Published
2005-10-27 04:00
Modified
2024-08-07 23:01
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
fetchmailconf before 1.49 in fetchmail 6.2.0, 6.2.5 and 6.2.5.2 creates configuration files with insecure world-readable permissions, which allows local users to obtain sensitive information such as passwords.
References
► | URL | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T23:01:57.815Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2005-2182", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2005/2182" }, { "name": "APPLE-SA-2006-08-01", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html" }, { "name": "20267", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/20267" }, { "name": "17293", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/17293" }, { "name": "17349", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/17349" }, { "name": "17446", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/17446" }, { "name": "ADV-2006-3101", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/3101" }, { "name": "1015114", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1015114" }, { "name": "21253", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21253" }, { "name": "SSA:2006-045-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.443499" }, { "name": "19289", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/19289" }, { "name": "TA06-214A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA06-214A.html" }, { "name": "20051027 fetchmail security announcement 2005-02 (CVE-2005-3088)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=113042785902031\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://fetchmail.berlios.de/fetchmail-SA-2005-02.txt" }, { "name": "DSA-900", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2005/dsa-900" }, { "name": "15179", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/15179" }, { "name": "RHSA-2005:823", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-823.html" }, { "name": "17495", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/17495" }, { "name": "USN-215-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/215-1/" }, { "name": "MDKSA-2005:209", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:209" }, { "name": "17491", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/17491" }, { "name": "18895", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/18895" }, { "name": "GLSA-200511-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200511-06.xml" }, { "name": "17631", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/17631" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-10-24T00:00:00", "descriptions": [ { "lang": "en", "value": "fetchmailconf before 1.49 in fetchmail 6.2.0, 6.2.5 and 6.2.5.2 creates configuration files with insecure world-readable permissions, which allows local users to obtain sensitive information such as passwords." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-03T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "ADV-2005-2182", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2005/2182" }, { "name": "APPLE-SA-2006-08-01", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html" }, { "name": "20267", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/20267" }, { "name": "17293", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/17293" }, { "name": "17349", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/17349" }, { "name": "17446", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/17446" }, { "name": "ADV-2006-3101", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/3101" }, { "name": "1015114", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1015114" }, { "name": "21253", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21253" }, { "name": "SSA:2006-045-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.443499" }, { "name": "19289", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/19289" }, { "name": "TA06-214A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA06-214A.html" }, { "name": "20051027 fetchmail security announcement 2005-02 (CVE-2005-3088)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=113042785902031\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://fetchmail.berlios.de/fetchmail-SA-2005-02.txt" }, { "name": "DSA-900", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2005/dsa-900" }, { "name": "15179", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/15179" }, { "name": "RHSA-2005:823", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-823.html" }, { "name": "17495", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/17495" }, { "name": "USN-215-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/215-1/" }, { "name": "MDKSA-2005:209", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:209" }, { "name": "17491", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/17491" }, { "name": "18895", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/18895" }, { "name": "GLSA-200511-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200511-06.xml" }, { "name": "17631", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/17631" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-3088", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "fetchmailconf before 1.49 in fetchmail 6.2.0, 6.2.5 and 6.2.5.2 creates configuration files with insecure world-readable permissions, which allows local users to obtain sensitive information such as passwords." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2005-2182", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2005/2182" }, { "name": "APPLE-SA-2006-08-01", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html" }, { "name": "20267", "refsource": "OSVDB", "url": "http://www.osvdb.org/20267" }, { "name": "17293", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/17293" }, { "name": "17349", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/17349" }, { "name": "17446", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/17446" }, { "name": "ADV-2006-3101", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/3101" }, { "name": "1015114", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1015114" }, { "name": "21253", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21253" }, { "name": "SSA:2006-045-01", "refsource": "SLACKWARE", "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.443499" }, { "name": "19289", "refsource": "BID", "url": "http://www.securityfocus.com/bid/19289" }, { "name": "TA06-214A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA06-214A.html" }, { "name": "20051027 fetchmail security announcement 2005-02 (CVE-2005-3088)", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=113042785902031\u0026w=2" }, { "name": "http://fetchmail.berlios.de/fetchmail-SA-2005-02.txt", "refsource": "CONFIRM", "url": "http://fetchmail.berlios.de/fetchmail-SA-2005-02.txt" }, { "name": "DSA-900", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2005/dsa-900" }, { "name": "15179", "refsource": "BID", "url": "http://www.securityfocus.com/bid/15179" }, { "name": "RHSA-2005:823", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2005-823.html" }, { "name": "17495", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/17495" }, { "name": "USN-215-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/215-1/" }, { "name": "MDKSA-2005:209", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:209" }, { "name": "17491", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/17491" }, { "name": "18895", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/18895" }, { "name": "GLSA-200511-06", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-200511-06.xml" }, { "name": "17631", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/17631" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-3088", "datePublished": "2005-10-27T04:00:00", "dateReserved": "2005-09-28T00:00:00", "dateUpdated": "2024-08-07T23:01:57.815Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2005-2335 (GCVE-0-2005-2335)
Vulnerability from cvelistv5
Published
2005-07-27 04:00
Modified
2024-08-07 22:22
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Buffer overflow in the POP3 client in Fetchmail before 6.2.5.2 allows remote POP3 servers to cause a denial of service and possibly execute arbitrary code via long UIDL responses. NOTE: a typo in an advisory accidentally used the wrong CVE identifier for the Fetchmail issue. This is the correct identifier.
References
► | URL | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T22:22:48.888Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "APPLE-SA-2006-08-01", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html" }, { "name": "14349", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/14349" }, { "name": "SUSE-SR:2005:018", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2005_18_sr.html" }, { "name": "ADV-2006-3101", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/3101" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.redhat.com/archives/fedora-announce-list/2005-July/msg00104.html" }, { "name": "ADV-2005-1171", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2005/1171" }, { "name": "21253", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21253" }, { "name": "19289", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/19289" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://fetchmail.berlios.de/fetchmail-SA-2005-01.txt" }, { "name": "18174", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/18174" }, { "name": "TA06-214A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA06-214A.html" }, { "name": "oval:org.mitre.oval:def:1124", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1124" }, { "name": "FEDORA-2005-613", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://www.redhat.com/archives/fedora-announce-list/2005-July/msg00088.html" }, { "name": "oval:org.mitre.oval:def:1038", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1038" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://developer.berlios.de/project/shownotes.php?release_id=6617" }, { "name": "20060801 DMA[2006-0801a] - \u0027Apple OSX fetchmail buffer overflow\u0027", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/441856/100/200/threaded" }, { "name": "oval:org.mitre.oval:def:8833", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8833" }, { "name": "DSA-774", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2005/dsa-774" }, { "name": "RHSA-2005:640", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-640.html" }, { "name": "FEDORA-2005-614", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://www.redhat.com/archives/fedora-announce-list/2005-July/msg00089.html" }, { "name": "20060526 rPSA-2006-0084-1 fetchmail", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/435197/100/0/threaded" }, { "name": "16176", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/16176" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-07-21T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in the POP3 client in Fetchmail before 6.2.5.2 allows remote POP3 servers to cause a denial of service and possibly execute arbitrary code via long UIDL responses. NOTE: a typo in an advisory accidentally used the wrong CVE identifier for the Fetchmail issue. This is the correct identifier." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-19T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "APPLE-SA-2006-08-01", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html" }, { "name": "14349", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/14349" }, { "name": "SUSE-SR:2005:018", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2005_18_sr.html" }, { "name": "ADV-2006-3101", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/3101" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.redhat.com/archives/fedora-announce-list/2005-July/msg00104.html" }, { "name": "ADV-2005-1171", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2005/1171" }, { "name": "21253", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21253" }, { "name": "19289", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/19289" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://fetchmail.berlios.de/fetchmail-SA-2005-01.txt" }, { "name": "18174", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/18174" }, { "name": "TA06-214A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA06-214A.html" }, { "name": "oval:org.mitre.oval:def:1124", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1124" }, { "name": "FEDORA-2005-613", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://www.redhat.com/archives/fedora-announce-list/2005-July/msg00088.html" }, { "name": "oval:org.mitre.oval:def:1038", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1038" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://developer.berlios.de/project/shownotes.php?release_id=6617" }, { "name": "20060801 DMA[2006-0801a] - \u0027Apple OSX fetchmail buffer overflow\u0027", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/441856/100/200/threaded" }, { "name": "oval:org.mitre.oval:def:8833", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8833" }, { "name": "DSA-774", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2005/dsa-774" }, { "name": "RHSA-2005:640", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-640.html" }, { "name": "FEDORA-2005-614", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://www.redhat.com/archives/fedora-announce-list/2005-July/msg00089.html" }, { "name": "20060526 rPSA-2006-0084-1 fetchmail", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/435197/100/0/threaded" }, { "name": "16176", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/16176" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-2335", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in the POP3 client in Fetchmail before 6.2.5.2 allows remote POP3 servers to cause a denial of service and possibly execute arbitrary code via long UIDL responses. NOTE: a typo in an advisory accidentally used the wrong CVE identifier for the Fetchmail issue. This is the correct identifier." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "APPLE-SA-2006-08-01", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html" }, { "name": "14349", "refsource": "BID", "url": "http://www.securityfocus.com/bid/14349" }, { "name": "SUSE-SR:2005:018", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2005_18_sr.html" }, { "name": "ADV-2006-3101", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/3101" }, { "name": "http://www.redhat.com/archives/fedora-announce-list/2005-July/msg00104.html", "refsource": "MISC", "url": "http://www.redhat.com/archives/fedora-announce-list/2005-July/msg00104.html" }, { "name": "ADV-2005-1171", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2005/1171" }, { "name": "21253", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21253" }, { "name": "19289", "refsource": "BID", "url": "http://www.securityfocus.com/bid/19289" }, { "name": "http://fetchmail.berlios.de/fetchmail-SA-2005-01.txt", "refsource": "CONFIRM", "url": "http://fetchmail.berlios.de/fetchmail-SA-2005-01.txt" }, { "name": "18174", "refsource": "OSVDB", "url": "http://www.osvdb.org/18174" }, { "name": "TA06-214A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA06-214A.html" }, { "name": "oval:org.mitre.oval:def:1124", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1124" }, { "name": "FEDORA-2005-613", "refsource": "FEDORA", "url": "http://www.redhat.com/archives/fedora-announce-list/2005-July/msg00088.html" }, { "name": "oval:org.mitre.oval:def:1038", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1038" }, { "name": "http://developer.berlios.de/project/shownotes.php?release_id=6617", "refsource": "CONFIRM", "url": "http://developer.berlios.de/project/shownotes.php?release_id=6617" }, { "name": "20060801 DMA[2006-0801a] - \u0027Apple OSX fetchmail buffer overflow\u0027", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/441856/100/200/threaded" }, { "name": "oval:org.mitre.oval:def:8833", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8833" }, { "name": "DSA-774", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2005/dsa-774" }, { "name": "RHSA-2005:640", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2005-640.html" }, { "name": "FEDORA-2005-614", "refsource": "FEDORA", "url": "http://www.redhat.com/archives/fedora-announce-list/2005-July/msg00089.html" }, { "name": "20060526 rPSA-2006-0084-1 fetchmail", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/435197/100/0/threaded" }, { "name": "16176", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/16176" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-2335", "datePublished": "2005-07-27T04:00:00", "dateReserved": "2005-07-21T00:00:00", "dateUpdated": "2024-08-07T22:22:48.888Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-36386 (GCVE-0-2021-36386)
Vulnerability from cvelistv5
Published
2021-07-29 13:59
Modified
2024-08-04 00:54
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
report_vbuild in report.c in Fetchmail before 6.4.20 sometimes omits initialization of the vsnprintf va_list argument, which might allow mail servers to cause a denial of service or possibly have unspecified other impact via long error messages. NOTE: it is unclear whether use of Fetchmail on any realistic platform results in an impact beyond an inconvenience to the client user.
References
► | URL | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T00:54:51.476Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.fetchmail.info/security.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2021/07/28/5" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.fetchmail.info/fetchmail-SA-2021-01.txt" }, { "name": "[oss-security] 20210809 fetchmail 6.4.21 released/regression fix for 6.4.20\u0027s security fix, and UPDATE: fetchmail \u003c= 6.4.19 security announcement 2021-01 (CVE-2021-36386)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2021/08/09/1" }, { "name": "FEDORA-2021-47893f53ed", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OIXKO6QW3AUHGJVWKJXBCOVBYJUJRBFC/" }, { "name": "FEDORA-2021-b904d99ce5", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AGYO5AHSXTCKA4NQC2Z4H3XMMYNAGC77/" }, { "name": "GLSA-202209-14", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202209-14" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "report_vbuild in report.c in Fetchmail before 6.4.20 sometimes omits initialization of the vsnprintf va_list argument, which might allow mail servers to cause a denial of service or possibly have unspecified other impact via long error messages. NOTE: it is unclear whether use of Fetchmail on any realistic platform results in an impact beyond an inconvenience to the client user." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-25T15:07:03", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.fetchmail.info/security.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.openwall.com/lists/oss-security/2021/07/28/5" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.fetchmail.info/fetchmail-SA-2021-01.txt" }, { "name": "[oss-security] 20210809 fetchmail 6.4.21 released/regression fix for 6.4.20\u0027s security fix, and UPDATE: fetchmail \u003c= 6.4.19 security announcement 2021-01 (CVE-2021-36386)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2021/08/09/1" }, { "name": "FEDORA-2021-47893f53ed", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OIXKO6QW3AUHGJVWKJXBCOVBYJUJRBFC/" }, { "name": "FEDORA-2021-b904d99ce5", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AGYO5AHSXTCKA4NQC2Z4H3XMMYNAGC77/" }, { "name": "GLSA-202209-14", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202209-14" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-36386", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "report_vbuild in report.c in Fetchmail before 6.4.20 sometimes omits initialization of the vsnprintf va_list argument, which might allow mail servers to cause a denial of service or possibly have unspecified other impact via long error messages. NOTE: it is unclear whether use of Fetchmail on any realistic platform results in an impact beyond an inconvenience to the client user." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.fetchmail.info/security.html", "refsource": "MISC", "url": "https://www.fetchmail.info/security.html" }, { "name": "http://www.openwall.com/lists/oss-security/2021/07/28/5", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2021/07/28/5" }, { "name": "https://www.fetchmail.info/fetchmail-SA-2021-01.txt", "refsource": "CONFIRM", "url": "https://www.fetchmail.info/fetchmail-SA-2021-01.txt" }, { "name": "[oss-security] 20210809 fetchmail 6.4.21 released/regression fix for 6.4.20\u0027s security fix, and UPDATE: fetchmail \u003c= 6.4.19 security announcement 2021-01 (CVE-2021-36386)", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/09/1" }, { "name": "FEDORA-2021-47893f53ed", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIXKO6QW3AUHGJVWKJXBCOVBYJUJRBFC/" }, { "name": "FEDORA-2021-b904d99ce5", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AGYO5AHSXTCKA4NQC2Z4H3XMMYNAGC77/" }, { "name": "GLSA-202209-14", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202209-14" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-36386", "datePublished": "2021-07-29T13:59:24", "dateReserved": "2021-07-12T00:00:00", "dateUpdated": "2024-08-04T00:54:51.476Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2005-10-27 10:02
Modified
2025-04-03 01:03
Severity ?
Summary
fetchmailconf before 1.49 in fetchmail 6.2.0, 6.2.5 and 6.2.5.2 creates configuration files with insecure world-readable permissions, which allows local users to obtain sensitive information such as passwords.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://fetchmail.berlios.de/fetchmail-SA-2005-02.txt | Patch, Vendor Advisory | |
cve@mitre.org | http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html | ||
cve@mitre.org | http://marc.info/?l=bugtraq&m=113042785902031&w=2 | ||
cve@mitre.org | http://secunia.com/advisories/17293 | Patch, Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/17349 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/17446 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/17491 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/17495 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/17631 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/18895 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/21253 | Vendor Advisory | |
cve@mitre.org | http://securitytracker.com/id?1015114 | ||
cve@mitre.org | http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.443499 | ||
cve@mitre.org | http://www.debian.org/security/2005/dsa-900 | ||
cve@mitre.org | http://www.gentoo.org/security/en/glsa/glsa-200511-06.xml | ||
cve@mitre.org | http://www.mandriva.com/security/advisories?name=MDKSA-2005:209 | ||
cve@mitre.org | http://www.osvdb.org/20267 | ||
cve@mitre.org | http://www.redhat.com/support/errata/RHSA-2005-823.html | ||
cve@mitre.org | http://www.securityfocus.com/bid/15179 | Patch | |
cve@mitre.org | http://www.securityfocus.com/bid/19289 | ||
cve@mitre.org | http://www.us-cert.gov/cas/techalerts/TA06-214A.html | US Government Resource | |
cve@mitre.org | http://www.vupen.com/english/advisories/2005/2182 | ||
cve@mitre.org | http://www.vupen.com/english/advisories/2006/3101 | ||
cve@mitre.org | https://usn.ubuntu.com/215-1/ | ||
af854a3a-2127-422b-91ae-364da2661108 | http://fetchmail.berlios.de/fetchmail-SA-2005-02.txt | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=113042785902031&w=2 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/17293 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/17349 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/17446 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/17491 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/17495 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/17631 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/18895 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/21253 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://securitytracker.com/id?1015114 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.443499 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2005/dsa-900 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.gentoo.org/security/en/glsa/glsa-200511-06.xml | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDKSA-2005:209 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.osvdb.org/20267 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2005-823.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/15179 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/19289 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA06-214A.html | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2005/2182 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2006/3101 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/215-1/ |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "264386DA-747F-492C-B660-D49BE9DB7139", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "61F908FF-9986-4F71-B0B6-D6A86555EF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "028F7F83-AF15-443B-A7DB-4E695E62EAFB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "fetchmailconf before 1.49 in fetchmail 6.2.0, 6.2.5 and 6.2.5.2 creates configuration files with insecure world-readable permissions, which allows local users to obtain sensitive information such as passwords." } ], "id": "CVE-2005-3088", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-10-27T10:02:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://fetchmail.berlios.de/fetchmail-SA-2005-02.txt" }, { "source": "cve@mitre.org", "url": "http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=113042785902031\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/17293" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/17349" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/17446" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/17491" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/17495" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/17631" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/18895" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21253" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1015114" }, { "source": "cve@mitre.org", "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.443499" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2005/dsa-900" }, { "source": "cve@mitre.org", "url": "http://www.gentoo.org/security/en/glsa/glsa-200511-06.xml" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:209" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/20267" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2005-823.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/15179" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/19289" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA06-214A.html" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2005/2182" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2006/3101" }, { "source": "cve@mitre.org", "url": "https://usn.ubuntu.com/215-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://fetchmail.berlios.de/fetchmail-SA-2005-02.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=113042785902031\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/17293" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/17349" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/17446" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/17491" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/17495" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/17631" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/18895" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21253" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1015114" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.443499" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2005/dsa-900" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.gentoo.org/security/en/glsa/glsa-200511-06.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:209" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/20267" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2005-823.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/15179" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/19289" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA06-214A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2005/2182" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/3101" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://usn.ubuntu.com/215-1/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2001-08-31 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Fetchmail (aka fetchmail-ssl) before 5.8.17 allows a remote malicious (1) IMAP server or (2) POP/POP3 server to overwrite arbitrary memory and possibly gain privileges via a negative index number as part of a response to a LIST request.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://archives.neohapsis.com/archives/bugtraq/2001-08/0118.html | Exploit, Patch, Vendor Advisory | |
cve@mitre.org | http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000419 | ||
cve@mitre.org | http://www.debian.org/security/2001/dsa-071 | ||
cve@mitre.org | http://www.iss.net/security_center/static/6965.php | ||
cve@mitre.org | http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-072.php3 | ||
cve@mitre.org | http://www.linuxsecurity.com/advisories/other_advisory-1555.html | Patch, Vendor Advisory | |
cve@mitre.org | http://www.novell.com/linux/security/advisories/2001_026_fetchmail_txt.html | ||
cve@mitre.org | http://www.redhat.com/support/errata/RHSA-2001-103.html | Patch, Vendor Advisory | |
cve@mitre.org | http://www.securityfocus.com/bid/3164 | Exploit, Patch, Vendor Advisory | |
cve@mitre.org | http://www.securityfocus.com/bid/3166 | Exploit, Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://archives.neohapsis.com/archives/bugtraq/2001-08/0118.html | Exploit, Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000419 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2001/dsa-071 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.iss.net/security_center/static/6965.php | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-072.php3 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.linuxsecurity.com/advisories/other_advisory-1555.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.novell.com/linux/security/advisories/2001_026_fetchmail_txt.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2001-103.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/3164 | Exploit, Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/3166 | Exploit, Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
fetchmail | fetchmail | * | |
fetchmail | fetchmail | 4.5.1 | |
fetchmail | fetchmail | 4.5.2 | |
fetchmail | fetchmail | 4.5.3 | |
fetchmail | fetchmail | 4.5.4 | |
fetchmail | fetchmail | 4.5.5 | |
fetchmail | fetchmail | 4.5.6 | |
fetchmail | fetchmail | 4.5.7 | |
fetchmail | fetchmail | 4.5.8 | |
fetchmail | fetchmail | 4.6.0 | |
fetchmail | fetchmail | 4.6.1 | |
fetchmail | fetchmail | 4.6.2 | |
fetchmail | fetchmail | 4.6.3 | |
fetchmail | fetchmail | 4.6.4 | |
fetchmail | fetchmail | 4.6.5 | |
fetchmail | fetchmail | 4.6.6 | |
fetchmail | fetchmail | 4.6.7 | |
fetchmail | fetchmail | 4.6.8 | |
fetchmail | fetchmail | 4.6.9 | |
fetchmail | fetchmail | 4.7.0 | |
fetchmail | fetchmail | 4.7.1 | |
fetchmail | fetchmail | 4.7.2 | |
fetchmail | fetchmail | 4.7.3 | |
fetchmail | fetchmail | 4.7.4 | |
fetchmail | fetchmail | 4.7.5 | |
fetchmail | fetchmail | 4.7.6 | |
fetchmail | fetchmail | 4.7.7 | |
fetchmail | fetchmail | 5.0.0 | |
fetchmail | fetchmail | 5.0.1 | |
fetchmail | fetchmail | 5.0.2 | |
fetchmail | fetchmail | 5.0.3 | |
fetchmail | fetchmail | 5.0.4 | |
fetchmail | fetchmail | 5.0.5 | |
fetchmail | fetchmail | 5.0.6 | |
fetchmail | fetchmail | 5.0.7 | |
fetchmail | fetchmail | 5.0.8 | |
fetchmail | fetchmail | 5.1.0 | |
fetchmail | fetchmail | 5.1.4 | |
fetchmail | fetchmail | 5.2.0 | |
fetchmail | fetchmail | 5.2.1 | |
fetchmail | fetchmail | 5.2.3 | |
fetchmail | fetchmail | 5.2.4 | |
fetchmail | fetchmail | 5.2.7 | |
fetchmail | fetchmail | 5.2.8 | |
fetchmail | fetchmail | 5.3.0 | |
fetchmail | fetchmail | 5.3.1 | |
fetchmail | fetchmail | 5.3.3 | |
fetchmail | fetchmail | 5.3.8 | |
fetchmail | fetchmail | 5.4.0 | |
fetchmail | fetchmail | 5.4.3 | |
fetchmail | fetchmail | 5.4.4 | |
fetchmail | fetchmail | 5.4.5 | |
fetchmail | fetchmail | 5.5.0 | |
fetchmail | fetchmail | 5.5.2 | |
fetchmail | fetchmail | 5.5.3 | |
fetchmail | fetchmail | 5.5.5 | |
fetchmail | fetchmail | 5.5.6 | |
fetchmail | fetchmail | 5.6.0 | |
fetchmail | fetchmail | 5.7.0 | |
fetchmail | fetchmail | 5.7.2 | |
fetchmail | fetchmail | 5.7.4 | |
fetchmail | fetchmail | 5.8 | |
fetchmail | fetchmail | 5.8.1 | |
fetchmail | fetchmail | 5.8.2 | |
fetchmail | fetchmail | 5.8.3 | |
fetchmail | fetchmail | 5.8.4 | |
fetchmail | fetchmail | 5.8.5 | |
fetchmail | fetchmail | 5.8.6 | |
fetchmail | fetchmail | 5.8.11 | |
fetchmail | fetchmail | 5.8.13 | |
fetchmail | fetchmail | 5.9.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fetchmail:fetchmail:*:*:*:*:*:*:*:*", "matchCriteriaId": "848FBF74-4AF9-4C79-91D8-5770CFA7B100", "versionEndIncluding": "5.8.14", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "BF519D04-7596-42C6-A1D8-FC1018D1A414", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "9AFEC739-BDFA-4D14-9A04-96FFB71AE330", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "E1923712-7B88-483E-B38A-0EA6FB38EB38", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "C9608A96-D131-401B-B041-09ADEEB59354", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "F4555DBB-B63B-4637-86A9-399B34B27D14", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "D8AB8504-8CD1-4013-9413-1378F3BAE0AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "3DC47DA9-D110-4E6B-9F5B-D17ECB942B40", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.8:*:*:*:*:*:*:*", "matchCriteriaId": "345D0848-958F-4B44-8F31-0793C36A5ADD", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "7E179061-FB6A-44AA-8EAC-4916719D9A28", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "58A6B5F4-C799-45C4-9EAD-A55023767033", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "54FDB8B9-5537-4E08-8FA0-931D4BED43E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "E7EB9B1D-C6B0-494B-8A8C-752E5659EA1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "CC13DE1B-1428-4842-9567-BBE5EEF7042F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "215ED879-1E26-4FF4-8857-18499C5DE3A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "72604F3D-2DE8-4BFF-97D5-4AFA64399201", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "8792F7FF-9E56-4201-89FD-F0146D4F0DF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "B12812E8-1C5B-46CF-A266-EE19C5CD3B12", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.9:*:*:*:*:*:*:*", "matchCriteriaId": "4DEAA0E8-746D-446D-AAEA-0ED287766332", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "7D3E14C3-82AE-4D4A-8963-438BECBA5678", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "4DCFB7BB-2879-4EB7-BE1D-163238E313C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "6ED223B6-1864-415C-96D6-64E1EDE4C840", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "14CBC8ED-CC10-40B6-8AA7-9F1342432ECB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "D3417C2E-1117-4FE7-B2FA-74CAB57235B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.5:*:*:*:*:*:*:*", "matchCriteriaId": "07C61DC4-50D5-44B2-92F8-A59C65144108", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.6:*:*:*:*:*:*:*", "matchCriteriaId": "31A37E19-1E07-4FD0-AC6D-6AC3ED954787", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.7:*:*:*:*:*:*:*", "matchCriteriaId": "570C9443-81CE-42AC-B4A6-3B2ABAD97EC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "853DD3E0-668F-4FAC-BA0B-D4E9C416D646", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "CEF70FCA-5DA4-4C0B-B876-0345FA077D44", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "BF0C4F7C-0003-4C77-AE22-A9C2FCBFAF3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "78D12F53-07DE-447D-8403-40EB75B91955", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "19ECB844-F378-4A94-B9FC-A731B8186013", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "3169AA63-79F6-4B89-9405-8F6A2FB6FD64", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "88D1D54C-81A4-44CE-BE12-798CF7DD2CC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "D6615C7D-09B5-4943-A124-2FF9A0F4B927", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "EF18219F-0406-4D46-90DE-EA2A17C8EFF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "87B56DFD-BDA9-4D8B-BE54-BF59B762D574", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "33EA0CA8-468F-4A94-8DA3-5D820AB65973", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA21C847-57ED-4E7D-9366-6038467D9080", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "0450BD04-15D2-4122-A210-6225B89BDA7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "18428805-AEB2-4BA4-9762-906B59CE74D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "AFCCBB15-DFFE-4A57-A029-E57707D15E04", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "0427B5C8-265C-47C3-9BAB-B2A0EAA1DEE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "89A4B962-BE5B-471C-83EF-674525C5AE83", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "7166ECCB-54FB-44EA-BA80-4D2AAF494AF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "6B309C89-99E2-4F0B-976C-95E44A45ADC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "A3DE7EE7-F627-4955-8D95-1F00F1F85C7D", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "D549098D-FE16-4BCB-91C4-D71A8C8D2E9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "57BFA165-6E2E-49AF-9E2D-3D8923CF36C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "F5C67DFF-A1BE-4486-A11F-CD3729927220", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "1D365E6E-8777-4084-BEC8-7CBF4997D976", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "20C4FF28-0DBA-4995-8252-2D62FF896BC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "F80C6B9B-AFCE-46A1-8DEF-51C1B526EB18", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "BF667DB5-F41E-4E73-A01F-4EC3F60BAD0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "D2B144FA-A901-4CDF-AC3D-7F5E820B7A4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "96774635-9A12-4DAB-BCF6-2D678F244CE9", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "EFD2EE7A-36CB-4A26-8EEB-DACA2864D921", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "C3898EBC-75A9-4DDD-A0AF-2CDEC72DAE4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "4267DCE8-985C-416D-A6B7-536585E5A573", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "50E63EDF-FF0A-447C-A3FC-7BA2414C15CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "61DDD4A1-6185-41B6-A715-4C70F0AA2631", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8:*:*:*:*:*:*:*", "matchCriteriaId": "B10A7E3C-07CD-48A6-9075-5314B4E1EEAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "319955A4-27A8-46FF-ACE7-97E6DF27B2DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "925CF3DD-682B-40E6-900C-23F784CD9239", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "16366780-611E-4217-A614-EBA01421D148", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "43AEA36F-E730-4305-9CB6-738A7152F02E", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.5:*:*:*:*:*:*:*", "matchCriteriaId": "2B9536BA-6334-4957-9632-6D64365B88AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.6:*:*:*:*:*:*:*", "matchCriteriaId": "F52FA32B-8048-4FD7-9D20-20DC5E52098B", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.11:*:*:*:*:*:*:*", "matchCriteriaId": "9FA92DF1-3AAD-46AC-A9E4-E9386C977818", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.13:*:*:*:*:*:*:*", "matchCriteriaId": "837D66DB-F9CB-41F1-A091-BCFBAC2F45B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "1A17995E-DCAF-465A-8ABD-F1EA0D538784", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Fetchmail (aka fetchmail-ssl) before 5.8.17 allows a remote malicious (1) IMAP server or (2) POP/POP3 server to overwrite arbitrary memory and possibly gain privileges via a negative index number as part of a response to a LIST request." } ], "id": "CVE-2001-1009", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2001-08-31T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2001-08/0118.html" }, { "source": "cve@mitre.org", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000419" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2001/dsa-071" }, { "source": "cve@mitre.org", "url": "http://www.iss.net/security_center/static/6965.php" }, { "source": "cve@mitre.org", "url": "http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-072.php3" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.linuxsecurity.com/advisories/other_advisory-1555.html" }, { "source": "cve@mitre.org", "url": "http://www.novell.com/linux/security/advisories/2001_026_fetchmail_txt.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2001-103.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/3164" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/3166" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2001-08/0118.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000419" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2001/dsa-071" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.iss.net/security_center/static/6965.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-072.php3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.linuxsecurity.com/advisories/other_advisory-1555.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.novell.com/linux/security/advisories/2001_026_fetchmail_txt.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2001-103.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/3164" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/3166" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-08-07 19:00
Modified
2025-04-09 00:30
Severity ?
Summary
socket.c in fetchmail before 6.3.11 does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://fetchmail.berlios.de/fetchmail-SA-2009-01.txt | ||
cve@mitre.org | http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html | ||
cve@mitre.org | http://marc.info/?l=oss-security&m=124949601207156&w=2 | ||
cve@mitre.org | http://osvdb.org/56855 | ||
cve@mitre.org | http://secunia.com/advisories/36175 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/36179 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/36236 | Vendor Advisory | |
cve@mitre.org | http://support.apple.com/kb/HT3937 | ||
cve@mitre.org | http://www.debian.org/security/2009/dsa-1852 | ||
cve@mitre.org | http://www.mandriva.com/security/advisories?name=MDVSA-2009:201 | ||
cve@mitre.org | http://www.securityfocus.com/archive/1/505530/100/0/threaded | ||
cve@mitre.org | http://www.securityfocus.com/bid/35951 | ||
cve@mitre.org | http://www.securitytracker.com/id?1022679 | ||
cve@mitre.org | http://www.slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.543463 | ||
cve@mitre.org | http://www.vupen.com/english/advisories/2009/2155 | Vendor Advisory | |
cve@mitre.org | http://www.vupen.com/english/advisories/2009/3184 | Vendor Advisory | |
cve@mitre.org | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11059 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://fetchmail.berlios.de/fetchmail-SA-2009-01.txt | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=oss-security&m=124949601207156&w=2 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/56855 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/36175 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/36179 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/36236 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://support.apple.com/kb/HT3937 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2009/dsa-1852 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2009:201 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/505530/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/35951 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1022679 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.543463 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2009/2155 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2009/3184 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11059 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
fetchmail | fetchmail | * | |
fetchmail | fetchmail | 4.5.1 | |
fetchmail | fetchmail | 4.5.2 | |
fetchmail | fetchmail | 4.5.3 | |
fetchmail | fetchmail | 4.5.4 | |
fetchmail | fetchmail | 4.5.5 | |
fetchmail | fetchmail | 4.5.6 | |
fetchmail | fetchmail | 4.5.7 | |
fetchmail | fetchmail | 4.5.8 | |
fetchmail | fetchmail | 4.6.0 | |
fetchmail | fetchmail | 4.6.1 | |
fetchmail | fetchmail | 4.6.2 | |
fetchmail | fetchmail | 4.6.3 | |
fetchmail | fetchmail | 4.6.4 | |
fetchmail | fetchmail | 4.6.5 | |
fetchmail | fetchmail | 4.6.6 | |
fetchmail | fetchmail | 4.6.7 | |
fetchmail | fetchmail | 4.6.8 | |
fetchmail | fetchmail | 4.6.9 | |
fetchmail | fetchmail | 4.7.0 | |
fetchmail | fetchmail | 4.7.1 | |
fetchmail | fetchmail | 4.7.2 | |
fetchmail | fetchmail | 4.7.3 | |
fetchmail | fetchmail | 4.7.4 | |
fetchmail | fetchmail | 4.7.5 | |
fetchmail | fetchmail | 4.7.6 | |
fetchmail | fetchmail | 4.7.7 | |
fetchmail | fetchmail | 5.0.0 | |
fetchmail | fetchmail | 5.0.1 | |
fetchmail | fetchmail | 5.0.2 | |
fetchmail | fetchmail | 5.0.3 | |
fetchmail | fetchmail | 5.0.4 | |
fetchmail | fetchmail | 5.0.5 | |
fetchmail | fetchmail | 5.0.6 | |
fetchmail | fetchmail | 5.0.7 | |
fetchmail | fetchmail | 5.0.8 | |
fetchmail | fetchmail | 5.1.0 | |
fetchmail | fetchmail | 5.1.4 | |
fetchmail | fetchmail | 5.2.0 | |
fetchmail | fetchmail | 5.2.1 | |
fetchmail | fetchmail | 5.2.3 | |
fetchmail | fetchmail | 5.2.4 | |
fetchmail | fetchmail | 5.2.7 | |
fetchmail | fetchmail | 5.2.8 | |
fetchmail | fetchmail | 5.3.0 | |
fetchmail | fetchmail | 5.3.1 | |
fetchmail | fetchmail | 5.3.3 | |
fetchmail | fetchmail | 5.3.8 | |
fetchmail | fetchmail | 5.4.0 | |
fetchmail | fetchmail | 5.4.3 | |
fetchmail | fetchmail | 5.4.4 | |
fetchmail | fetchmail | 5.4.5 | |
fetchmail | fetchmail | 5.5.0 | |
fetchmail | fetchmail | 5.5.2 | |
fetchmail | fetchmail | 5.5.3 | |
fetchmail | fetchmail | 5.5.5 | |
fetchmail | fetchmail | 5.5.6 | |
fetchmail | fetchmail | 5.6.0 | |
fetchmail | fetchmail | 5.7.0 | |
fetchmail | fetchmail | 5.7.2 | |
fetchmail | fetchmail | 5.7.4 | |
fetchmail | fetchmail | 5.8 | |
fetchmail | fetchmail | 5.8.1 | |
fetchmail | fetchmail | 5.8.2 | |
fetchmail | fetchmail | 5.8.3 | |
fetchmail | fetchmail | 5.8.4 | |
fetchmail | fetchmail | 5.8.5 | |
fetchmail | fetchmail | 5.8.6 | |
fetchmail | fetchmail | 5.8.11 | |
fetchmail | fetchmail | 5.8.13 | |
fetchmail | fetchmail | 5.8.14 | |
fetchmail | fetchmail | 5.8.17 | |
fetchmail | fetchmail | 5.9.0 | |
fetchmail | fetchmail | 5.9.4 | |
fetchmail | fetchmail | 5.9.5 | |
fetchmail | fetchmail | 5.9.8 | |
fetchmail | fetchmail | 5.9.10 | |
fetchmail | fetchmail | 5.9.11 | |
fetchmail | fetchmail | 5.9.13 | |
fetchmail | fetchmail | 6.0.0 | |
fetchmail | fetchmail | 6.1.0 | |
fetchmail | fetchmail | 6.1.3 | |
fetchmail | fetchmail | 6.2.0 | |
fetchmail | fetchmail | 6.2.1 | |
fetchmail | fetchmail | 6.2.2 | |
fetchmail | fetchmail | 6.2.3 | |
fetchmail | fetchmail | 6.2.4 | |
fetchmail | fetchmail | 6.2.5 | |
fetchmail | fetchmail | 6.2.5.1 | |
fetchmail | fetchmail | 6.2.5.2 | |
fetchmail | fetchmail | 6.2.5.4 | |
fetchmail | fetchmail | 6.2.6 | |
fetchmail | fetchmail | 6.2.6 | |
fetchmail | fetchmail | 6.2.6 | |
fetchmail | fetchmail | 6.2.9 | |
fetchmail | fetchmail | 6.2.9 | |
fetchmail | fetchmail | 6.2.9 | |
fetchmail | fetchmail | 6.2.9 | |
fetchmail | fetchmail | 6.2.9 | |
fetchmail | fetchmail | 6.2.9 | |
fetchmail | fetchmail | 6.2.9 | |
fetchmail | fetchmail | 6.3.0 | |
fetchmail | fetchmail | 6.3.1 | |
fetchmail | fetchmail | 6.3.2 | |
fetchmail | fetchmail | 6.3.3 | |
fetchmail | fetchmail | 6.3.4 | |
fetchmail | fetchmail | 6.3.5 | |
fetchmail | fetchmail | 6.3.6 | |
fetchmail | fetchmail | 6.3.6 | |
fetchmail | fetchmail | 6.3.6 | |
fetchmail | fetchmail | 6.3.6 | |
fetchmail | fetchmail | 6.3.6 | |
fetchmail | fetchmail | 6.3.6 | |
fetchmail | fetchmail | 6.3.7 | |
fetchmail | fetchmail | 6.3.8 | |
fetchmail | fetchmail | 6.3.9 | |
fetchmail | fetchmail | 6.3.9 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fetchmail:fetchmail:*:*:*:*:*:*:*:*", "matchCriteriaId": "21F26EF3-6F31-46C9-9D08-396B3708E498", "versionEndIncluding": "6.3.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "BF519D04-7596-42C6-A1D8-FC1018D1A414", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "9AFEC739-BDFA-4D14-9A04-96FFB71AE330", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "E1923712-7B88-483E-B38A-0EA6FB38EB38", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "C9608A96-D131-401B-B041-09ADEEB59354", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "F4555DBB-B63B-4637-86A9-399B34B27D14", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "D8AB8504-8CD1-4013-9413-1378F3BAE0AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "3DC47DA9-D110-4E6B-9F5B-D17ECB942B40", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.8:*:*:*:*:*:*:*", "matchCriteriaId": "345D0848-958F-4B44-8F31-0793C36A5ADD", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "7E179061-FB6A-44AA-8EAC-4916719D9A28", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "58A6B5F4-C799-45C4-9EAD-A55023767033", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "54FDB8B9-5537-4E08-8FA0-931D4BED43E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "E7EB9B1D-C6B0-494B-8A8C-752E5659EA1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "CC13DE1B-1428-4842-9567-BBE5EEF7042F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "215ED879-1E26-4FF4-8857-18499C5DE3A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "72604F3D-2DE8-4BFF-97D5-4AFA64399201", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "8792F7FF-9E56-4201-89FD-F0146D4F0DF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "B12812E8-1C5B-46CF-A266-EE19C5CD3B12", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.9:*:*:*:*:*:*:*", "matchCriteriaId": "4DEAA0E8-746D-446D-AAEA-0ED287766332", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "7D3E14C3-82AE-4D4A-8963-438BECBA5678", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "4DCFB7BB-2879-4EB7-BE1D-163238E313C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "6ED223B6-1864-415C-96D6-64E1EDE4C840", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "14CBC8ED-CC10-40B6-8AA7-9F1342432ECB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "D3417C2E-1117-4FE7-B2FA-74CAB57235B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.5:*:*:*:*:*:*:*", "matchCriteriaId": "07C61DC4-50D5-44B2-92F8-A59C65144108", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.6:*:*:*:*:*:*:*", "matchCriteriaId": "31A37E19-1E07-4FD0-AC6D-6AC3ED954787", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.7:*:*:*:*:*:*:*", "matchCriteriaId": "570C9443-81CE-42AC-B4A6-3B2ABAD97EC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "853DD3E0-668F-4FAC-BA0B-D4E9C416D646", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "CEF70FCA-5DA4-4C0B-B876-0345FA077D44", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "BF0C4F7C-0003-4C77-AE22-A9C2FCBFAF3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "78D12F53-07DE-447D-8403-40EB75B91955", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "19ECB844-F378-4A94-B9FC-A731B8186013", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "3169AA63-79F6-4B89-9405-8F6A2FB6FD64", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "88D1D54C-81A4-44CE-BE12-798CF7DD2CC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "D6615C7D-09B5-4943-A124-2FF9A0F4B927", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "EF18219F-0406-4D46-90DE-EA2A17C8EFF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "87B56DFD-BDA9-4D8B-BE54-BF59B762D574", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "33EA0CA8-468F-4A94-8DA3-5D820AB65973", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA21C847-57ED-4E7D-9366-6038467D9080", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "0450BD04-15D2-4122-A210-6225B89BDA7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "18428805-AEB2-4BA4-9762-906B59CE74D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "AFCCBB15-DFFE-4A57-A029-E57707D15E04", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "0427B5C8-265C-47C3-9BAB-B2A0EAA1DEE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "89A4B962-BE5B-471C-83EF-674525C5AE83", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "7166ECCB-54FB-44EA-BA80-4D2AAF494AF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "6B309C89-99E2-4F0B-976C-95E44A45ADC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "A3DE7EE7-F627-4955-8D95-1F00F1F85C7D", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "D549098D-FE16-4BCB-91C4-D71A8C8D2E9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "57BFA165-6E2E-49AF-9E2D-3D8923CF36C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "F5C67DFF-A1BE-4486-A11F-CD3729927220", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "1D365E6E-8777-4084-BEC8-7CBF4997D976", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "20C4FF28-0DBA-4995-8252-2D62FF896BC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "F80C6B9B-AFCE-46A1-8DEF-51C1B526EB18", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "BF667DB5-F41E-4E73-A01F-4EC3F60BAD0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "D2B144FA-A901-4CDF-AC3D-7F5E820B7A4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "96774635-9A12-4DAB-BCF6-2D678F244CE9", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "EFD2EE7A-36CB-4A26-8EEB-DACA2864D921", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "C3898EBC-75A9-4DDD-A0AF-2CDEC72DAE4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "4267DCE8-985C-416D-A6B7-536585E5A573", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "50E63EDF-FF0A-447C-A3FC-7BA2414C15CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "61DDD4A1-6185-41B6-A715-4C70F0AA2631", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8:*:*:*:*:*:*:*", "matchCriteriaId": "B10A7E3C-07CD-48A6-9075-5314B4E1EEAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "319955A4-27A8-46FF-ACE7-97E6DF27B2DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "925CF3DD-682B-40E6-900C-23F784CD9239", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "16366780-611E-4217-A614-EBA01421D148", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "43AEA36F-E730-4305-9CB6-738A7152F02E", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.5:*:*:*:*:*:*:*", "matchCriteriaId": "2B9536BA-6334-4957-9632-6D64365B88AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.6:*:*:*:*:*:*:*", "matchCriteriaId": "F52FA32B-8048-4FD7-9D20-20DC5E52098B", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.11:*:*:*:*:*:*:*", "matchCriteriaId": "9FA92DF1-3AAD-46AC-A9E4-E9386C977818", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.13:*:*:*:*:*:*:*", "matchCriteriaId": "837D66DB-F9CB-41F1-A091-BCFBAC2F45B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.14:*:*:*:*:*:*:*", "matchCriteriaId": "74D12B67-6E66-419A-A28F-6306402931EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.17:*:*:*:*:*:*:*", "matchCriteriaId": "A71FCBED-B25D-48E3-916C-FBA9E0DE8D12", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "1A17995E-DCAF-465A-8ABD-F1EA0D538784", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "93D03D78-C56E-4189-97FC-916C918EDFEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "19A66C77-041F-4A12-8A36-233A6B50641C", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C945059C-EF39-486D-A804-FBB8704AB927", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "1258CA65-FBC1-4848-A9E5-A8F5E5D6FBD5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.11:*:*:*:*:*:*:*", "matchCriteriaId": "A91C6418-41F0-46EB-ACFC-FCE907F5AA87", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.13:*:*:*:*:*:*:*", "matchCriteriaId": "0C020534-7596-496C-B9B0-739F58F6F4EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "0A77D40C-6FF5-42BD-9EFB-B532824D7606", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "F04C6A76-2718-4DBA-8972-A3EECDDB1A17", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "38ACD96E-5582-4ED0-BBB1-C891094D8217", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "264386DA-747F-492C-B660-D49BE9DB7139", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "DC4066AC-BE10-4189-86F6-BF94443738DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "1C25A146-50D5-4BA2-ABA2-20BF8784D7DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "72E76256-997F-4229-9B03-7BC3074F359D", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "7A717C50-2C5A-4CD1-B2E6-8CDF450940CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "61F908FF-9986-4F71-B0B6-D6A86555EF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "B0C1F99C-A246-40D3-B84A-5D11FF24AC1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "028F7F83-AF15-443B-A7DB-4E695E62EAFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "B418C3CE-E6E6-401D-AD83-5BB181009A7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.6:pre4:*:*:*:*:*:*", "matchCriteriaId": "8BF06FD2-0A4C-4557-B8EF-F0F021179498", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.6:pre8:*:*:*:*:*:*", "matchCriteriaId": "38C949C2-07A0-4FE4-8FBF-86215CB999CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.6:pre9:*:*:*:*:*:*", "matchCriteriaId": "88B23630-79DD-4B69-BB01-286193BA562E", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc10:*:*:*:*:*:*", "matchCriteriaId": "5FE21564-68C0-4765-BA40-9D3046C4CB14", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc3:*:*:*:*:*:*", "matchCriteriaId": "208102ED-6F22-44C5-BAF1-FD85EACF208F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc4:*:*:*:*:*:*", "matchCriteriaId": "C1CF7767-EB24-44E2-8E59-B4DBC99AFD23", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc5:*:*:*:*:*:*", "matchCriteriaId": "CF3D6D4C-5FD8-4EE1-A34A-99D397F09E85", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc7:*:*:*:*:*:*", "matchCriteriaId": "D63D88C1-B201-4D48-9659-5802DC4FD3EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc8:*:*:*:*:*:*", "matchCriteriaId": "16463B23-E884-467E-9F63-6B57EED39856", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc9:*:*:*:*:*:*", "matchCriteriaId": "9F2C03AF-666D-4AF6-BC69-F8B081EB41AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "84F90AFA-4B13-46A0-89D7-4065300C94C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "5DAD0F05-8B55-43ED-89D5-61A19F41EDFF", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "99053698-7F8B-4E71-8647-1A8B0DF7CEB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "9314F22D-22A8-4374-A2BF-3C64CF1F69BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "816E9640-A932-4E2F-9793-689F80D2AA89", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "5D09BB43-6CBA-499B-91D1-BA256A65E40D", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "ABE76611-08CE-4D85-B57A-021909835A81", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc1:*:*:*:*:*:*", "matchCriteriaId": "B98AFEDF-2BAB-4588-94E0-35AEA5F1B514", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc2:*:*:*:*:*:*", "matchCriteriaId": "4E8BAB5B-4DBC-4D05-B5E2-591573BC05FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc3:*:*:*:*:*:*", "matchCriteriaId": "02F6E729-A2F2-42AC-A941-F57A0A4E84A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc4:*:*:*:*:*:*", "matchCriteriaId": "4143D519-4B49-4E71-8686-FC6A095F0999", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc5:*:*:*:*:*:*", "matchCriteriaId": "387ADB82-4FAD-44DA-ABF2-2F4645C4F1E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "CED4FBCB-B6DF-429D-871D-2A9F7F59E63B", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "237F86BD-82CD-4A37-BF64-F103B1304F0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.9:*:*:*:*:*:*:*", "matchCriteriaId": "667847D9-58DD-4693-B544-593AC6D7746D", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.9:rc2:*:*:*:*:*:*", "matchCriteriaId": "12BA2E29-5547-45F5-BC46-1A7B4A222055", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "socket.c in fetchmail before 6.3.11 does not properly handle a \u0027\\0\u0027 character in a domain name in the subject\u0027s Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408." }, { "lang": "es", "value": "socket.c en fetchmail antes de v6.3.11 no maneja correctamente un caracter \u0027\\ 0\u0027 en el nombre de dominio en el campo Common Name (CN) de un certificado X.509, lo cual permite a atacacantes hombre-en-el-medio (man-in-the-middle) suplantar servidores SSL a su elecci\u00f3n a trav\u00e9s de certificados manipulados expedidos por una Autoridad de Certificaci\u00f3n (CA) leg\u00edtima, una cuesti\u00f3n relacionada con CVE-2009-2408." } ], "id": "CVE-2009-2666", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-08-07T19:00:01.063", "references": [ { "source": "cve@mitre.org", "url": "http://fetchmail.berlios.de/fetchmail-SA-2009-01.txt" }, { "source": "cve@mitre.org", "url": "http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=oss-security\u0026m=124949601207156\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/56855" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/36175" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/36179" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/36236" }, { "source": "cve@mitre.org", "url": "http://support.apple.com/kb/HT3937" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2009/dsa-1852" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:201" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/505530/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/35951" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1022679" }, { "source": "cve@mitre.org", "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.543463" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/2155" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/3184" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11059" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://fetchmail.berlios.de/fetchmail-SA-2009-01.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=oss-security\u0026m=124949601207156\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/56855" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/36175" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/36179" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/36236" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.apple.com/kb/HT3937" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2009/dsa-1852" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:201" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/505530/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/35951" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1022679" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.543463" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/2155" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/3184" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11059" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-310" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2001-12-06 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
A buffer overflow in Linux fetchmail before 5.8.6 allows remote attackers to execute arbitrary code via a large 'To:' field in an email header.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:43.fetchmail.asc | ||
cve@mitre.org | http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000403 | ||
cve@mitre.org | http://download.immunix.org/ImmunixOS/7.0/updates/IMNX-2001-70-025-01 | ||
cve@mitre.org | http://www.caldera.com/support/security/advisories/CSSA-2001-022.1.txt | ||
cve@mitre.org | http://www.debian.org/security/2001/dsa-060 | Patch, Vendor Advisory | |
cve@mitre.org | http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-063.php3?dis=7.1 | ||
cve@mitre.org | http://www.linuxsecurity.com/advisories/other_advisory-1451.html | Patch, Vendor Advisory | |
cve@mitre.org | http://www.novell.com/linux/security/advisories/2001_026_fetchmail_txt.html | ||
cve@mitre.org | http://www.redhat.com/support/errata/RHSA-2001-103.html | ||
cve@mitre.org | http://www.securityfocus.com/bid/2877 | Patch, Vendor Advisory | |
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/6704 | ||
af854a3a-2127-422b-91ae-364da2661108 | ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:43.fetchmail.asc | ||
af854a3a-2127-422b-91ae-364da2661108 | http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000403 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://download.immunix.org/ImmunixOS/7.0/updates/IMNX-2001-70-025-01 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.caldera.com/support/security/advisories/CSSA-2001-022.1.txt | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2001/dsa-060 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-063.php3?dis=7.1 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.linuxsecurity.com/advisories/other_advisory-1451.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.novell.com/linux/security/advisories/2001_026_fetchmail_txt.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2001-103.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/2877 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/6704 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
fetchmail | fetchmail | * | |
fetchmail | fetchmail | 4.5.1 | |
fetchmail | fetchmail | 4.5.2 | |
fetchmail | fetchmail | 4.5.3 | |
fetchmail | fetchmail | 4.5.4 | |
fetchmail | fetchmail | 4.5.5 | |
fetchmail | fetchmail | 4.5.6 | |
fetchmail | fetchmail | 4.5.7 | |
fetchmail | fetchmail | 4.5.8 | |
fetchmail | fetchmail | 4.6.0 | |
fetchmail | fetchmail | 4.6.1 | |
fetchmail | fetchmail | 4.6.2 | |
fetchmail | fetchmail | 4.6.3 | |
fetchmail | fetchmail | 4.6.4 | |
fetchmail | fetchmail | 4.6.5 | |
fetchmail | fetchmail | 4.6.6 | |
fetchmail | fetchmail | 4.6.7 | |
fetchmail | fetchmail | 4.6.8 | |
fetchmail | fetchmail | 4.6.9 | |
fetchmail | fetchmail | 4.7.0 | |
fetchmail | fetchmail | 4.7.1 | |
fetchmail | fetchmail | 4.7.2 | |
fetchmail | fetchmail | 4.7.3 | |
fetchmail | fetchmail | 4.7.4 | |
fetchmail | fetchmail | 4.7.5 | |
fetchmail | fetchmail | 4.7.6 | |
fetchmail | fetchmail | 4.7.7 | |
fetchmail | fetchmail | 5.0.0 | |
fetchmail | fetchmail | 5.0.1 | |
fetchmail | fetchmail | 5.0.2 | |
fetchmail | fetchmail | 5.0.3 | |
fetchmail | fetchmail | 5.0.4 | |
fetchmail | fetchmail | 5.0.5 | |
fetchmail | fetchmail | 5.0.6 | |
fetchmail | fetchmail | 5.0.7 | |
fetchmail | fetchmail | 5.0.8 | |
fetchmail | fetchmail | 5.1.0 | |
fetchmail | fetchmail | 5.1.4 | |
fetchmail | fetchmail | 5.2.0 | |
fetchmail | fetchmail | 5.2.1 | |
fetchmail | fetchmail | 5.2.3 | |
fetchmail | fetchmail | 5.2.4 | |
fetchmail | fetchmail | 5.2.7 | |
fetchmail | fetchmail | 5.2.8 | |
fetchmail | fetchmail | 5.3.0 | |
fetchmail | fetchmail | 5.3.1 | |
fetchmail | fetchmail | 5.3.3 | |
fetchmail | fetchmail | 5.3.8 | |
fetchmail | fetchmail | 5.4.0 | |
fetchmail | fetchmail | 5.4.3 | |
fetchmail | fetchmail | 5.4.4 | |
fetchmail | fetchmail | 5.4.5 | |
fetchmail | fetchmail | 5.5.0 | |
fetchmail | fetchmail | 5.5.2 | |
fetchmail | fetchmail | 5.5.3 | |
fetchmail | fetchmail | 5.5.5 | |
fetchmail | fetchmail | 5.5.6 | |
fetchmail | fetchmail | 5.6.0 | |
fetchmail | fetchmail | 5.7.0 | |
fetchmail | fetchmail | 5.7.2 | |
fetchmail | fetchmail | 5.7.4 | |
fetchmail | fetchmail | 5.8 | |
fetchmail | fetchmail | 5.8.1 | |
fetchmail | fetchmail | 5.8.2 | |
fetchmail | fetchmail | 5.8.3 | |
fetchmail | fetchmail | 5.8.4 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fetchmail:fetchmail:*:*:*:*:*:*:*:*", "matchCriteriaId": "00047715-4AB1-411A-B1A2-02245F1266A3", "versionEndIncluding": "5.8.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "BF519D04-7596-42C6-A1D8-FC1018D1A414", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "9AFEC739-BDFA-4D14-9A04-96FFB71AE330", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "E1923712-7B88-483E-B38A-0EA6FB38EB38", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "C9608A96-D131-401B-B041-09ADEEB59354", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "F4555DBB-B63B-4637-86A9-399B34B27D14", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "D8AB8504-8CD1-4013-9413-1378F3BAE0AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "3DC47DA9-D110-4E6B-9F5B-D17ECB942B40", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.8:*:*:*:*:*:*:*", "matchCriteriaId": "345D0848-958F-4B44-8F31-0793C36A5ADD", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "7E179061-FB6A-44AA-8EAC-4916719D9A28", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "58A6B5F4-C799-45C4-9EAD-A55023767033", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "54FDB8B9-5537-4E08-8FA0-931D4BED43E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "E7EB9B1D-C6B0-494B-8A8C-752E5659EA1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "CC13DE1B-1428-4842-9567-BBE5EEF7042F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "215ED879-1E26-4FF4-8857-18499C5DE3A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "72604F3D-2DE8-4BFF-97D5-4AFA64399201", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "8792F7FF-9E56-4201-89FD-F0146D4F0DF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "B12812E8-1C5B-46CF-A266-EE19C5CD3B12", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.9:*:*:*:*:*:*:*", "matchCriteriaId": "4DEAA0E8-746D-446D-AAEA-0ED287766332", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "7D3E14C3-82AE-4D4A-8963-438BECBA5678", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "4DCFB7BB-2879-4EB7-BE1D-163238E313C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "6ED223B6-1864-415C-96D6-64E1EDE4C840", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "14CBC8ED-CC10-40B6-8AA7-9F1342432ECB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "D3417C2E-1117-4FE7-B2FA-74CAB57235B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.5:*:*:*:*:*:*:*", "matchCriteriaId": "07C61DC4-50D5-44B2-92F8-A59C65144108", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.6:*:*:*:*:*:*:*", "matchCriteriaId": "31A37E19-1E07-4FD0-AC6D-6AC3ED954787", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.7:*:*:*:*:*:*:*", "matchCriteriaId": "570C9443-81CE-42AC-B4A6-3B2ABAD97EC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "853DD3E0-668F-4FAC-BA0B-D4E9C416D646", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "CEF70FCA-5DA4-4C0B-B876-0345FA077D44", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "BF0C4F7C-0003-4C77-AE22-A9C2FCBFAF3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "78D12F53-07DE-447D-8403-40EB75B91955", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "19ECB844-F378-4A94-B9FC-A731B8186013", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "3169AA63-79F6-4B89-9405-8F6A2FB6FD64", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "88D1D54C-81A4-44CE-BE12-798CF7DD2CC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "D6615C7D-09B5-4943-A124-2FF9A0F4B927", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "EF18219F-0406-4D46-90DE-EA2A17C8EFF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "87B56DFD-BDA9-4D8B-BE54-BF59B762D574", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "33EA0CA8-468F-4A94-8DA3-5D820AB65973", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA21C847-57ED-4E7D-9366-6038467D9080", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "0450BD04-15D2-4122-A210-6225B89BDA7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "18428805-AEB2-4BA4-9762-906B59CE74D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "AFCCBB15-DFFE-4A57-A029-E57707D15E04", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "0427B5C8-265C-47C3-9BAB-B2A0EAA1DEE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "89A4B962-BE5B-471C-83EF-674525C5AE83", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "7166ECCB-54FB-44EA-BA80-4D2AAF494AF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "6B309C89-99E2-4F0B-976C-95E44A45ADC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "A3DE7EE7-F627-4955-8D95-1F00F1F85C7D", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "D549098D-FE16-4BCB-91C4-D71A8C8D2E9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "57BFA165-6E2E-49AF-9E2D-3D8923CF36C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "F5C67DFF-A1BE-4486-A11F-CD3729927220", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "1D365E6E-8777-4084-BEC8-7CBF4997D976", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "20C4FF28-0DBA-4995-8252-2D62FF896BC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "F80C6B9B-AFCE-46A1-8DEF-51C1B526EB18", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "BF667DB5-F41E-4E73-A01F-4EC3F60BAD0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "D2B144FA-A901-4CDF-AC3D-7F5E820B7A4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "96774635-9A12-4DAB-BCF6-2D678F244CE9", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "EFD2EE7A-36CB-4A26-8EEB-DACA2864D921", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "C3898EBC-75A9-4DDD-A0AF-2CDEC72DAE4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "4267DCE8-985C-416D-A6B7-536585E5A573", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "50E63EDF-FF0A-447C-A3FC-7BA2414C15CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "61DDD4A1-6185-41B6-A715-4C70F0AA2631", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8:*:*:*:*:*:*:*", "matchCriteriaId": "B10A7E3C-07CD-48A6-9075-5314B4E1EEAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "319955A4-27A8-46FF-ACE7-97E6DF27B2DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "925CF3DD-682B-40E6-900C-23F784CD9239", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "16366780-611E-4217-A614-EBA01421D148", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "43AEA36F-E730-4305-9CB6-738A7152F02E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A buffer overflow in Linux fetchmail before 5.8.6 allows remote attackers to execute arbitrary code via a large \u0027To:\u0027 field in an email header." } ], "id": "CVE-2001-0819", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2001-12-06T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:43.fetchmail.asc" }, { "source": "cve@mitre.org", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000403" }, { "source": "cve@mitre.org", "url": "http://download.immunix.org/ImmunixOS/7.0/updates/IMNX-2001-70-025-01" }, { "source": "cve@mitre.org", "url": "http://www.caldera.com/support/security/advisories/CSSA-2001-022.1.txt" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.debian.org/security/2001/dsa-060" }, { "source": "cve@mitre.org", "url": "http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-063.php3?dis=7.1" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.linuxsecurity.com/advisories/other_advisory-1451.html" }, { "source": "cve@mitre.org", "url": "http://www.novell.com/linux/security/advisories/2001_026_fetchmail_txt.html" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2001-103.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/2877" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6704" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:43.fetchmail.asc" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000403" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://download.immunix.org/ImmunixOS/7.0/updates/IMNX-2001-70-025-01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.caldera.com/support/security/advisories/CSSA-2001-022.1.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.debian.org/security/2001/dsa-060" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-063.php3?dis=7.1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.linuxsecurity.com/advisories/other_advisory-1451.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.novell.com/linux/security/advisories/2001_026_fetchmail_txt.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2001-103.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/2877" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6704" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-05-07 18:24
Modified
2025-04-11 00:51
Severity ?
Summary
fetchmail 4.6.3 through 6.3.16, when debug mode is enabled, does not properly handle invalid characters in a multi-character locale, which allows remote attackers to cause a denial of service (memory consumption and application crash) via a crafted (1) message header or (2) POP3 UIDL list.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://developer.berlios.de/project/shownotes.php?group_id=1824&release_id=17512 | ||
secalert@redhat.com | http://www.fetchmail.info/fetchmail-SA-2010-02.txt | Patch | |
secalert@redhat.com | http://www.mandriva.com/security/advisories?name=MDVSA-2011:107 | ||
secalert@redhat.com | http://www.securityfocus.com/archive/1/511140/100/0/threaded | ||
secalert@redhat.com | http://www.securityfocus.com/bid/39556 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://developer.berlios.de/project/shownotes.php?group_id=1824&release_id=17512 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.fetchmail.info/fetchmail-SA-2010-02.txt | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2011:107 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/511140/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/39556 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
fetchmail | fetchmail | * | |
fetchmail | fetchmail | 4.6.3 | |
fetchmail | fetchmail | 4.6.4 | |
fetchmail | fetchmail | 4.6.5 | |
fetchmail | fetchmail | 4.6.6 | |
fetchmail | fetchmail | 4.6.7 | |
fetchmail | fetchmail | 4.6.8 | |
fetchmail | fetchmail | 4.6.9 | |
fetchmail | fetchmail | 4.7.0 | |
fetchmail | fetchmail | 4.7.1 | |
fetchmail | fetchmail | 4.7.2 | |
fetchmail | fetchmail | 4.7.3 | |
fetchmail | fetchmail | 4.7.4 | |
fetchmail | fetchmail | 4.7.5 | |
fetchmail | fetchmail | 4.7.6 | |
fetchmail | fetchmail | 4.7.7 | |
fetchmail | fetchmail | 5.0.0 | |
fetchmail | fetchmail | 5.0.1 | |
fetchmail | fetchmail | 5.0.2 | |
fetchmail | fetchmail | 5.0.3 | |
fetchmail | fetchmail | 5.0.4 | |
fetchmail | fetchmail | 5.0.5 | |
fetchmail | fetchmail | 5.0.6 | |
fetchmail | fetchmail | 5.0.7 | |
fetchmail | fetchmail | 5.0.8 | |
fetchmail | fetchmail | 5.1.0 | |
fetchmail | fetchmail | 5.1.4 | |
fetchmail | fetchmail | 5.2.0 | |
fetchmail | fetchmail | 5.2.1 | |
fetchmail | fetchmail | 5.2.3 | |
fetchmail | fetchmail | 5.2.4 | |
fetchmail | fetchmail | 5.2.7 | |
fetchmail | fetchmail | 5.2.8 | |
fetchmail | fetchmail | 5.3.0 | |
fetchmail | fetchmail | 5.3.1 | |
fetchmail | fetchmail | 5.3.3 | |
fetchmail | fetchmail | 5.3.8 | |
fetchmail | fetchmail | 5.4.0 | |
fetchmail | fetchmail | 5.4.3 | |
fetchmail | fetchmail | 5.4.4 | |
fetchmail | fetchmail | 5.4.5 | |
fetchmail | fetchmail | 5.5.0 | |
fetchmail | fetchmail | 5.5.2 | |
fetchmail | fetchmail | 5.5.3 | |
fetchmail | fetchmail | 5.5.5 | |
fetchmail | fetchmail | 5.5.6 | |
fetchmail | fetchmail | 5.6.0 | |
fetchmail | fetchmail | 5.7.0 | |
fetchmail | fetchmail | 5.7.2 | |
fetchmail | fetchmail | 5.7.4 | |
fetchmail | fetchmail | 5.8 | |
fetchmail | fetchmail | 5.8.1 | |
fetchmail | fetchmail | 5.8.2 | |
fetchmail | fetchmail | 5.8.3 | |
fetchmail | fetchmail | 5.8.4 | |
fetchmail | fetchmail | 5.8.5 | |
fetchmail | fetchmail | 5.8.6 | |
fetchmail | fetchmail | 5.8.11 | |
fetchmail | fetchmail | 5.8.13 | |
fetchmail | fetchmail | 5.8.14 | |
fetchmail | fetchmail | 5.8.17 | |
fetchmail | fetchmail | 5.9.0 | |
fetchmail | fetchmail | 5.9.4 | |
fetchmail | fetchmail | 5.9.5 | |
fetchmail | fetchmail | 5.9.8 | |
fetchmail | fetchmail | 5.9.10 | |
fetchmail | fetchmail | 5.9.11 | |
fetchmail | fetchmail | 5.9.13 | |
fetchmail | fetchmail | 6.0.0 | |
fetchmail | fetchmail | 6.1.0 | |
fetchmail | fetchmail | 6.1.3 | |
fetchmail | fetchmail | 6.2.0 | |
fetchmail | fetchmail | 6.2.1 | |
fetchmail | fetchmail | 6.2.2 | |
fetchmail | fetchmail | 6.2.3 | |
fetchmail | fetchmail | 6.2.4 | |
fetchmail | fetchmail | 6.2.5 | |
fetchmail | fetchmail | 6.2.5.1 | |
fetchmail | fetchmail | 6.2.5.2 | |
fetchmail | fetchmail | 6.2.5.4 | |
fetchmail | fetchmail | 6.2.6 | |
fetchmail | fetchmail | 6.2.6 | |
fetchmail | fetchmail | 6.2.6 | |
fetchmail | fetchmail | 6.2.9 | |
fetchmail | fetchmail | 6.2.9 | |
fetchmail | fetchmail | 6.2.9 | |
fetchmail | fetchmail | 6.2.9 | |
fetchmail | fetchmail | 6.2.9 | |
fetchmail | fetchmail | 6.2.9 | |
fetchmail | fetchmail | 6.2.9 | |
fetchmail | fetchmail | 6.3.0 | |
fetchmail | fetchmail | 6.3.1 | |
fetchmail | fetchmail | 6.3.2 | |
fetchmail | fetchmail | 6.3.3 | |
fetchmail | fetchmail | 6.3.4 | |
fetchmail | fetchmail | 6.3.5 | |
fetchmail | fetchmail | 6.3.6 | |
fetchmail | fetchmail | 6.3.6 | |
fetchmail | fetchmail | 6.3.6 | |
fetchmail | fetchmail | 6.3.6 | |
fetchmail | fetchmail | 6.3.6 | |
fetchmail | fetchmail | 6.3.6 | |
fetchmail | fetchmail | 6.3.7 | |
fetchmail | fetchmail | 6.3.8 | |
fetchmail | fetchmail | 6.3.9 | |
fetchmail | fetchmail | 6.3.10 | |
fetchmail | fetchmail | 6.3.11 | |
fetchmail | fetchmail | 6.3.12 | |
fetchmail | fetchmail | 6.3.13 | |
fetchmail | fetchmail | 6.3.14 | |
fetchmail | fetchmail | 6.3.15 | |
fetchmail | fetchmail | 6.3.16 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fetchmail:fetchmail:*:rc2:*:*:*:*:*:*", "matchCriteriaId": "6089D7C8-8651-4C85-9F03-96A2C2BBD380", "versionEndIncluding": "6.3.9", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "E7EB9B1D-C6B0-494B-8A8C-752E5659EA1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "CC13DE1B-1428-4842-9567-BBE5EEF7042F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "215ED879-1E26-4FF4-8857-18499C5DE3A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "72604F3D-2DE8-4BFF-97D5-4AFA64399201", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "8792F7FF-9E56-4201-89FD-F0146D4F0DF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "B12812E8-1C5B-46CF-A266-EE19C5CD3B12", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.9:*:*:*:*:*:*:*", "matchCriteriaId": "4DEAA0E8-746D-446D-AAEA-0ED287766332", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "7D3E14C3-82AE-4D4A-8963-438BECBA5678", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "4DCFB7BB-2879-4EB7-BE1D-163238E313C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "6ED223B6-1864-415C-96D6-64E1EDE4C840", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "14CBC8ED-CC10-40B6-8AA7-9F1342432ECB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "D3417C2E-1117-4FE7-B2FA-74CAB57235B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.5:*:*:*:*:*:*:*", "matchCriteriaId": "07C61DC4-50D5-44B2-92F8-A59C65144108", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.6:*:*:*:*:*:*:*", "matchCriteriaId": "31A37E19-1E07-4FD0-AC6D-6AC3ED954787", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.7:*:*:*:*:*:*:*", "matchCriteriaId": "570C9443-81CE-42AC-B4A6-3B2ABAD97EC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "853DD3E0-668F-4FAC-BA0B-D4E9C416D646", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "CEF70FCA-5DA4-4C0B-B876-0345FA077D44", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "BF0C4F7C-0003-4C77-AE22-A9C2FCBFAF3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "78D12F53-07DE-447D-8403-40EB75B91955", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "19ECB844-F378-4A94-B9FC-A731B8186013", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "3169AA63-79F6-4B89-9405-8F6A2FB6FD64", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "88D1D54C-81A4-44CE-BE12-798CF7DD2CC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "D6615C7D-09B5-4943-A124-2FF9A0F4B927", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "EF18219F-0406-4D46-90DE-EA2A17C8EFF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "87B56DFD-BDA9-4D8B-BE54-BF59B762D574", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "33EA0CA8-468F-4A94-8DA3-5D820AB65973", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA21C847-57ED-4E7D-9366-6038467D9080", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "0450BD04-15D2-4122-A210-6225B89BDA7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "18428805-AEB2-4BA4-9762-906B59CE74D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "AFCCBB15-DFFE-4A57-A029-E57707D15E04", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "0427B5C8-265C-47C3-9BAB-B2A0EAA1DEE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "89A4B962-BE5B-471C-83EF-674525C5AE83", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "7166ECCB-54FB-44EA-BA80-4D2AAF494AF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "6B309C89-99E2-4F0B-976C-95E44A45ADC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "A3DE7EE7-F627-4955-8D95-1F00F1F85C7D", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "D549098D-FE16-4BCB-91C4-D71A8C8D2E9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "57BFA165-6E2E-49AF-9E2D-3D8923CF36C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "F5C67DFF-A1BE-4486-A11F-CD3729927220", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "1D365E6E-8777-4084-BEC8-7CBF4997D976", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "20C4FF28-0DBA-4995-8252-2D62FF896BC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "F80C6B9B-AFCE-46A1-8DEF-51C1B526EB18", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "BF667DB5-F41E-4E73-A01F-4EC3F60BAD0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "D2B144FA-A901-4CDF-AC3D-7F5E820B7A4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "96774635-9A12-4DAB-BCF6-2D678F244CE9", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "EFD2EE7A-36CB-4A26-8EEB-DACA2864D921", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "C3898EBC-75A9-4DDD-A0AF-2CDEC72DAE4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "4267DCE8-985C-416D-A6B7-536585E5A573", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "50E63EDF-FF0A-447C-A3FC-7BA2414C15CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "61DDD4A1-6185-41B6-A715-4C70F0AA2631", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8:*:*:*:*:*:*:*", "matchCriteriaId": "B10A7E3C-07CD-48A6-9075-5314B4E1EEAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "319955A4-27A8-46FF-ACE7-97E6DF27B2DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "925CF3DD-682B-40E6-900C-23F784CD9239", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "16366780-611E-4217-A614-EBA01421D148", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "43AEA36F-E730-4305-9CB6-738A7152F02E", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.5:*:*:*:*:*:*:*", "matchCriteriaId": "2B9536BA-6334-4957-9632-6D64365B88AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.6:*:*:*:*:*:*:*", "matchCriteriaId": "F52FA32B-8048-4FD7-9D20-20DC5E52098B", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.11:*:*:*:*:*:*:*", "matchCriteriaId": "9FA92DF1-3AAD-46AC-A9E4-E9386C977818", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.13:*:*:*:*:*:*:*", "matchCriteriaId": "837D66DB-F9CB-41F1-A091-BCFBAC2F45B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.14:*:*:*:*:*:*:*", "matchCriteriaId": "74D12B67-6E66-419A-A28F-6306402931EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.17:*:*:*:*:*:*:*", "matchCriteriaId": "A71FCBED-B25D-48E3-916C-FBA9E0DE8D12", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "1A17995E-DCAF-465A-8ABD-F1EA0D538784", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "93D03D78-C56E-4189-97FC-916C918EDFEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "19A66C77-041F-4A12-8A36-233A6B50641C", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C945059C-EF39-486D-A804-FBB8704AB927", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "1258CA65-FBC1-4848-A9E5-A8F5E5D6FBD5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.11:*:*:*:*:*:*:*", "matchCriteriaId": "A91C6418-41F0-46EB-ACFC-FCE907F5AA87", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.13:*:*:*:*:*:*:*", "matchCriteriaId": "0C020534-7596-496C-B9B0-739F58F6F4EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "0A77D40C-6FF5-42BD-9EFB-B532824D7606", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "F04C6A76-2718-4DBA-8972-A3EECDDB1A17", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "38ACD96E-5582-4ED0-BBB1-C891094D8217", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "264386DA-747F-492C-B660-D49BE9DB7139", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "DC4066AC-BE10-4189-86F6-BF94443738DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "1C25A146-50D5-4BA2-ABA2-20BF8784D7DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "72E76256-997F-4229-9B03-7BC3074F359D", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "7A717C50-2C5A-4CD1-B2E6-8CDF450940CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "61F908FF-9986-4F71-B0B6-D6A86555EF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "B0C1F99C-A246-40D3-B84A-5D11FF24AC1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "028F7F83-AF15-443B-A7DB-4E695E62EAFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "B418C3CE-E6E6-401D-AD83-5BB181009A7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.6:pre4:*:*:*:*:*:*", "matchCriteriaId": "8BF06FD2-0A4C-4557-B8EF-F0F021179498", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.6:pre8:*:*:*:*:*:*", "matchCriteriaId": "38C949C2-07A0-4FE4-8FBF-86215CB999CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.6:pre9:*:*:*:*:*:*", "matchCriteriaId": "88B23630-79DD-4B69-BB01-286193BA562E", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc10:*:*:*:*:*:*", "matchCriteriaId": "5FE21564-68C0-4765-BA40-9D3046C4CB14", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc3:*:*:*:*:*:*", "matchCriteriaId": "208102ED-6F22-44C5-BAF1-FD85EACF208F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc4:*:*:*:*:*:*", "matchCriteriaId": "C1CF7767-EB24-44E2-8E59-B4DBC99AFD23", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc5:*:*:*:*:*:*", "matchCriteriaId": "CF3D6D4C-5FD8-4EE1-A34A-99D397F09E85", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc7:*:*:*:*:*:*", "matchCriteriaId": "D63D88C1-B201-4D48-9659-5802DC4FD3EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc8:*:*:*:*:*:*", "matchCriteriaId": "16463B23-E884-467E-9F63-6B57EED39856", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc9:*:*:*:*:*:*", "matchCriteriaId": "9F2C03AF-666D-4AF6-BC69-F8B081EB41AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "84F90AFA-4B13-46A0-89D7-4065300C94C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "5DAD0F05-8B55-43ED-89D5-61A19F41EDFF", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "99053698-7F8B-4E71-8647-1A8B0DF7CEB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "9314F22D-22A8-4374-A2BF-3C64CF1F69BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "816E9640-A932-4E2F-9793-689F80D2AA89", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "5D09BB43-6CBA-499B-91D1-BA256A65E40D", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "ABE76611-08CE-4D85-B57A-021909835A81", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc1:*:*:*:*:*:*", "matchCriteriaId": "B98AFEDF-2BAB-4588-94E0-35AEA5F1B514", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc2:*:*:*:*:*:*", "matchCriteriaId": "4E8BAB5B-4DBC-4D05-B5E2-591573BC05FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc3:*:*:*:*:*:*", "matchCriteriaId": "02F6E729-A2F2-42AC-A941-F57A0A4E84A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc4:*:*:*:*:*:*", "matchCriteriaId": "4143D519-4B49-4E71-8686-FC6A095F0999", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc5:*:*:*:*:*:*", "matchCriteriaId": "387ADB82-4FAD-44DA-ABF2-2F4645C4F1E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "CED4FBCB-B6DF-429D-871D-2A9F7F59E63B", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "237F86BD-82CD-4A37-BF64-F103B1304F0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.9:*:*:*:*:*:*:*", "matchCriteriaId": "667847D9-58DD-4693-B544-593AC6D7746D", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "C44EA07A-D8A9-4E43-AE2D-B9E41944CB07", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.11:*:*:*:*:*:*:*", "matchCriteriaId": "F9882EBF-72D0-4C4F-99BA-929418B5D86B", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.12:*:*:*:*:*:*:*", "matchCriteriaId": "EE474E7E-EEE8-45E4-A995-A437CE7C08CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.13:*:*:*:*:*:*:*", "matchCriteriaId": "2F96F2F2-B6CC-4138-8F9C-4CB906EDACDD", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "22D580D8-FE6D-40E9-88A5-751A9C8CBAA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.15:*:*:*:*:*:*:*", "matchCriteriaId": "7C7E909A-F8F7-4FB1-8659-41A47C9B7C5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.16:*:*:*:*:*:*:*", "matchCriteriaId": "FDBC29B9-EC76-4F2C-BD00-A57C0D4B99EB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "fetchmail 4.6.3 through 6.3.16, when debug mode is enabled, does not properly handle invalid characters in a multi-character locale, which allows remote attackers to cause a denial of service (memory consumption and application crash) via a crafted (1) message header or (2) POP3 UIDL list." }, { "lang": "es", "value": "fetchmail v4.6.3 hasta v6.3.16, cuando el modo depuraci\u00f3n est\u00e1 activo, no maneja de forma adecuada los caracteres inv\u00e1lidos en un multicaracter locale, lo que permite a atacantes provocar una denegaci\u00f3n de servicio (consumo de memoria y ca\u00edda de aplicaci\u00f3n) a trav\u00e9s de (1) cabecera de mensaje manipulada o (2) lista POP3 UIDL manipulada." } ], "id": "CVE-2010-1167", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-05-07T18:24:15.780", "references": [ { "source": "secalert@redhat.com", "url": "http://developer.berlios.de/project/shownotes.php?group_id=1824\u0026release_id=17512" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://www.fetchmail.info/fetchmail-SA-2010-02.txt" }, { "source": "secalert@redhat.com", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:107" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/archive/1/511140/100/0/threaded" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/39556" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://developer.berlios.de/project/shownotes.php?group_id=1824\u0026release_id=17512" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.fetchmail.info/fetchmail-SA-2010-02.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:107" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/511140/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/39556" } ], "sourceIdentifier": "secalert@redhat.com", "vendorComments": [ { "comment": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-1167\n\nThe Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw.", "lastModified": "2010-05-10T00:00:00", "organization": "Red Hat" } ], "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-12-31 05:00
Modified
2025-04-09 00:30
Severity ?
Summary
fetchmail before 6.3.6-rc4 does not properly enforce TLS and may transmit cleartext passwords over unsecured links if certain circumstances occur, which allows remote attackers to obtain sensitive information via man-in-the-middle (MITM) attacks.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc | ||
cve@mitre.org | http://docs.info.apple.com/article.html?artnum=305391 | ||
cve@mitre.org | http://fedoranews.org/cms/node/2429 | ||
cve@mitre.org | http://fetchmail.berlios.de/fetchmail-SA-2006-02.txt | ||
cve@mitre.org | http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html | ||
cve@mitre.org | http://osvdb.org/31580 | ||
cve@mitre.org | http://secunia.com/advisories/23631 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/23695 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/23714 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/23781 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/23804 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/23838 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/23923 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/24007 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/24151 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/24174 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/24284 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/24966 | Vendor Advisory | |
cve@mitre.org | http://security.gentoo.org/glsa/glsa-200701-13.xml | ||
cve@mitre.org | http://securitytracker.com/id?1017478 | ||
cve@mitre.org | http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.517995 | ||
cve@mitre.org | http://www.debian.org/security/2007/dsa-1259 | ||
cve@mitre.org | http://www.mandriva.com/security/advisories?name=MDKSA-2007:016 | ||
cve@mitre.org | http://www.novell.com/linux/security/advisories/2007_4_sr.html | ||
cve@mitre.org | http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.004.html | ||
cve@mitre.org | http://www.redhat.com/support/errata/RHSA-2007-0018.html | ||
cve@mitre.org | http://www.securityfocus.com/archive/1/456115/100/0/threaded | ||
cve@mitre.org | http://www.securityfocus.com/archive/1/460528/100/0/threaded | ||
cve@mitre.org | http://www.securityfocus.com/bid/21903 | Patch | |
cve@mitre.org | http://www.trustix.org/errata/2007/0007 | ||
cve@mitre.org | http://www.ubuntu.com/usn/usn-405-1 | ||
cve@mitre.org | http://www.us-cert.gov/cas/techalerts/TA07-109A.html | US Government Resource | |
cve@mitre.org | http://www.vupen.com/english/advisories/2007/0087 | ||
cve@mitre.org | http://www.vupen.com/english/advisories/2007/0088 | ||
cve@mitre.org | http://www.vupen.com/english/advisories/2007/1470 | ||
cve@mitre.org | https://issues.rpath.com/browse/RPL-919 | ||
cve@mitre.org | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10566 | ||
af854a3a-2127-422b-91ae-364da2661108 | ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc | ||
af854a3a-2127-422b-91ae-364da2661108 | http://docs.info.apple.com/article.html?artnum=305391 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://fedoranews.org/cms/node/2429 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://fetchmail.berlios.de/fetchmail-SA-2006-02.txt | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/31580 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/23631 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/23695 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/23714 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/23781 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/23804 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/23838 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/23923 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/24007 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/24151 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/24174 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/24284 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/24966 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-200701-13.xml | ||
af854a3a-2127-422b-91ae-364da2661108 | http://securitytracker.com/id?1017478 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.517995 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2007/dsa-1259 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDKSA-2007:016 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.novell.com/linux/security/advisories/2007_4_sr.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.004.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2007-0018.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/456115/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/460528/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/21903 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.trustix.org/errata/2007/0007 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/usn-405-1 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA07-109A.html | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2007/0087 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2007/0088 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2007/1470 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://issues.rpath.com/browse/RPL-919 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10566 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
fetchmail | fetchmail | * | |
fetchmail | fetchmail | 4.5.1 | |
fetchmail | fetchmail | 4.5.2 | |
fetchmail | fetchmail | 4.5.3 | |
fetchmail | fetchmail | 4.5.4 | |
fetchmail | fetchmail | 4.5.5 | |
fetchmail | fetchmail | 4.5.6 | |
fetchmail | fetchmail | 4.5.7 | |
fetchmail | fetchmail | 4.5.8 | |
fetchmail | fetchmail | 4.6.0 | |
fetchmail | fetchmail | 4.6.1 | |
fetchmail | fetchmail | 4.6.2 | |
fetchmail | fetchmail | 4.6.3 | |
fetchmail | fetchmail | 4.6.4 | |
fetchmail | fetchmail | 4.6.5 | |
fetchmail | fetchmail | 4.6.6 | |
fetchmail | fetchmail | 4.6.7 | |
fetchmail | fetchmail | 4.6.8 | |
fetchmail | fetchmail | 4.6.9 | |
fetchmail | fetchmail | 4.7.0 | |
fetchmail | fetchmail | 4.7.1 | |
fetchmail | fetchmail | 4.7.2 | |
fetchmail | fetchmail | 4.7.3 | |
fetchmail | fetchmail | 4.7.4 | |
fetchmail | fetchmail | 4.7.5 | |
fetchmail | fetchmail | 4.7.6 | |
fetchmail | fetchmail | 4.7.7 | |
fetchmail | fetchmail | 5.0.0 | |
fetchmail | fetchmail | 5.0.1 | |
fetchmail | fetchmail | 5.0.2 | |
fetchmail | fetchmail | 5.0.3 | |
fetchmail | fetchmail | 5.0.4 | |
fetchmail | fetchmail | 5.0.5 | |
fetchmail | fetchmail | 5.0.6 | |
fetchmail | fetchmail | 5.0.7 | |
fetchmail | fetchmail | 5.0.8 | |
fetchmail | fetchmail | 5.1.0 | |
fetchmail | fetchmail | 5.1.4 | |
fetchmail | fetchmail | 5.2.0 | |
fetchmail | fetchmail | 5.2.1 | |
fetchmail | fetchmail | 5.2.3 | |
fetchmail | fetchmail | 5.2.4 | |
fetchmail | fetchmail | 5.2.7 | |
fetchmail | fetchmail | 5.2.8 | |
fetchmail | fetchmail | 5.3.0 | |
fetchmail | fetchmail | 5.3.1 | |
fetchmail | fetchmail | 5.3.3 | |
fetchmail | fetchmail | 5.3.8 | |
fetchmail | fetchmail | 5.4.0 | |
fetchmail | fetchmail | 5.4.3 | |
fetchmail | fetchmail | 5.4.4 | |
fetchmail | fetchmail | 5.4.5 | |
fetchmail | fetchmail | 5.5.0 | |
fetchmail | fetchmail | 5.5.2 | |
fetchmail | fetchmail | 5.5.3 | |
fetchmail | fetchmail | 5.5.5 | |
fetchmail | fetchmail | 5.5.6 | |
fetchmail | fetchmail | 5.6.0 | |
fetchmail | fetchmail | 5.7.0 | |
fetchmail | fetchmail | 5.7.2 | |
fetchmail | fetchmail | 5.7.4 | |
fetchmail | fetchmail | 5.8 | |
fetchmail | fetchmail | 5.8.1 | |
fetchmail | fetchmail | 5.8.2 | |
fetchmail | fetchmail | 5.8.3 | |
fetchmail | fetchmail | 5.8.4 | |
fetchmail | fetchmail | 5.8.5 | |
fetchmail | fetchmail | 5.8.6 | |
fetchmail | fetchmail | 5.8.11 | |
fetchmail | fetchmail | 5.8.13 | |
fetchmail | fetchmail | 5.8.14 | |
fetchmail | fetchmail | 5.8.17 | |
fetchmail | fetchmail | 5.9.0 | |
fetchmail | fetchmail | 5.9.4 | |
fetchmail | fetchmail | 5.9.5 | |
fetchmail | fetchmail | 5.9.8 | |
fetchmail | fetchmail | 5.9.10 | |
fetchmail | fetchmail | 5.9.11 | |
fetchmail | fetchmail | 5.9.13 | |
fetchmail | fetchmail | 6.0.0 | |
fetchmail | fetchmail | 6.1.0 | |
fetchmail | fetchmail | 6.1.3 | |
fetchmail | fetchmail | 6.2.0 | |
fetchmail | fetchmail | 6.2.1 | |
fetchmail | fetchmail | 6.2.2 | |
fetchmail | fetchmail | 6.2.3 | |
fetchmail | fetchmail | 6.2.4 | |
fetchmail | fetchmail | 6.2.5 | |
fetchmail | fetchmail | 6.2.5.1 | |
fetchmail | fetchmail | 6.2.5.2 | |
fetchmail | fetchmail | 6.2.5.4 | |
fetchmail | fetchmail | 6.2.6 | |
fetchmail | fetchmail | 6.2.6 | |
fetchmail | fetchmail | 6.2.6 | |
fetchmail | fetchmail | 6.2.9 | |
fetchmail | fetchmail | 6.2.9 | |
fetchmail | fetchmail | 6.2.9 | |
fetchmail | fetchmail | 6.2.9 | |
fetchmail | fetchmail | 6.2.9 | |
fetchmail | fetchmail | 6.2.9 | |
fetchmail | fetchmail | 6.2.9 | |
fetchmail | fetchmail | 6.3.0 | |
fetchmail | fetchmail | 6.3.1 | |
fetchmail | fetchmail | 6.3.2 | |
fetchmail | fetchmail | 6.3.3 | |
fetchmail | fetchmail | 6.3.4 | |
fetchmail | fetchmail | 6.3.5 | |
fetchmail | fetchmail | 6.3.6 | |
fetchmail | fetchmail | 6.3.6 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fetchmail:fetchmail:*:rc3:*:*:*:*:*:*", "matchCriteriaId": "66F9758A-147C-4CB3-B54F-43EC86B9D344", "versionEndIncluding": "6.3.6", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "BF519D04-7596-42C6-A1D8-FC1018D1A414", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "9AFEC739-BDFA-4D14-9A04-96FFB71AE330", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "E1923712-7B88-483E-B38A-0EA6FB38EB38", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "C9608A96-D131-401B-B041-09ADEEB59354", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "F4555DBB-B63B-4637-86A9-399B34B27D14", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "D8AB8504-8CD1-4013-9413-1378F3BAE0AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "3DC47DA9-D110-4E6B-9F5B-D17ECB942B40", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.8:*:*:*:*:*:*:*", "matchCriteriaId": "345D0848-958F-4B44-8F31-0793C36A5ADD", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "7E179061-FB6A-44AA-8EAC-4916719D9A28", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "58A6B5F4-C799-45C4-9EAD-A55023767033", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "54FDB8B9-5537-4E08-8FA0-931D4BED43E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "E7EB9B1D-C6B0-494B-8A8C-752E5659EA1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "CC13DE1B-1428-4842-9567-BBE5EEF7042F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "215ED879-1E26-4FF4-8857-18499C5DE3A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "72604F3D-2DE8-4BFF-97D5-4AFA64399201", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "8792F7FF-9E56-4201-89FD-F0146D4F0DF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "B12812E8-1C5B-46CF-A266-EE19C5CD3B12", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.9:*:*:*:*:*:*:*", "matchCriteriaId": "4DEAA0E8-746D-446D-AAEA-0ED287766332", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "7D3E14C3-82AE-4D4A-8963-438BECBA5678", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "4DCFB7BB-2879-4EB7-BE1D-163238E313C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "6ED223B6-1864-415C-96D6-64E1EDE4C840", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "14CBC8ED-CC10-40B6-8AA7-9F1342432ECB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "D3417C2E-1117-4FE7-B2FA-74CAB57235B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.5:*:*:*:*:*:*:*", "matchCriteriaId": "07C61DC4-50D5-44B2-92F8-A59C65144108", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.6:*:*:*:*:*:*:*", "matchCriteriaId": "31A37E19-1E07-4FD0-AC6D-6AC3ED954787", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.7:*:*:*:*:*:*:*", "matchCriteriaId": "570C9443-81CE-42AC-B4A6-3B2ABAD97EC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "853DD3E0-668F-4FAC-BA0B-D4E9C416D646", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "CEF70FCA-5DA4-4C0B-B876-0345FA077D44", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "BF0C4F7C-0003-4C77-AE22-A9C2FCBFAF3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "78D12F53-07DE-447D-8403-40EB75B91955", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "19ECB844-F378-4A94-B9FC-A731B8186013", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "3169AA63-79F6-4B89-9405-8F6A2FB6FD64", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "88D1D54C-81A4-44CE-BE12-798CF7DD2CC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "D6615C7D-09B5-4943-A124-2FF9A0F4B927", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "EF18219F-0406-4D46-90DE-EA2A17C8EFF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "87B56DFD-BDA9-4D8B-BE54-BF59B762D574", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "33EA0CA8-468F-4A94-8DA3-5D820AB65973", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA21C847-57ED-4E7D-9366-6038467D9080", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "0450BD04-15D2-4122-A210-6225B89BDA7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "18428805-AEB2-4BA4-9762-906B59CE74D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "AFCCBB15-DFFE-4A57-A029-E57707D15E04", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "0427B5C8-265C-47C3-9BAB-B2A0EAA1DEE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "89A4B962-BE5B-471C-83EF-674525C5AE83", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "7166ECCB-54FB-44EA-BA80-4D2AAF494AF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "6B309C89-99E2-4F0B-976C-95E44A45ADC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "A3DE7EE7-F627-4955-8D95-1F00F1F85C7D", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "D549098D-FE16-4BCB-91C4-D71A8C8D2E9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "57BFA165-6E2E-49AF-9E2D-3D8923CF36C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "F5C67DFF-A1BE-4486-A11F-CD3729927220", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "1D365E6E-8777-4084-BEC8-7CBF4997D976", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "20C4FF28-0DBA-4995-8252-2D62FF896BC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "F80C6B9B-AFCE-46A1-8DEF-51C1B526EB18", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "BF667DB5-F41E-4E73-A01F-4EC3F60BAD0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "D2B144FA-A901-4CDF-AC3D-7F5E820B7A4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "96774635-9A12-4DAB-BCF6-2D678F244CE9", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "EFD2EE7A-36CB-4A26-8EEB-DACA2864D921", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "C3898EBC-75A9-4DDD-A0AF-2CDEC72DAE4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "4267DCE8-985C-416D-A6B7-536585E5A573", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "50E63EDF-FF0A-447C-A3FC-7BA2414C15CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "61DDD4A1-6185-41B6-A715-4C70F0AA2631", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8:*:*:*:*:*:*:*", "matchCriteriaId": "B10A7E3C-07CD-48A6-9075-5314B4E1EEAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "319955A4-27A8-46FF-ACE7-97E6DF27B2DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "925CF3DD-682B-40E6-900C-23F784CD9239", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "16366780-611E-4217-A614-EBA01421D148", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "43AEA36F-E730-4305-9CB6-738A7152F02E", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.5:*:*:*:*:*:*:*", "matchCriteriaId": "2B9536BA-6334-4957-9632-6D64365B88AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.6:*:*:*:*:*:*:*", "matchCriteriaId": "F52FA32B-8048-4FD7-9D20-20DC5E52098B", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.11:*:*:*:*:*:*:*", "matchCriteriaId": "9FA92DF1-3AAD-46AC-A9E4-E9386C977818", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.13:*:*:*:*:*:*:*", "matchCriteriaId": "837D66DB-F9CB-41F1-A091-BCFBAC2F45B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.14:*:*:*:*:*:*:*", "matchCriteriaId": "74D12B67-6E66-419A-A28F-6306402931EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.17:*:*:*:*:*:*:*", "matchCriteriaId": "A71FCBED-B25D-48E3-916C-FBA9E0DE8D12", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "1A17995E-DCAF-465A-8ABD-F1EA0D538784", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "93D03D78-C56E-4189-97FC-916C918EDFEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "19A66C77-041F-4A12-8A36-233A6B50641C", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C945059C-EF39-486D-A804-FBB8704AB927", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "1258CA65-FBC1-4848-A9E5-A8F5E5D6FBD5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.11:*:*:*:*:*:*:*", "matchCriteriaId": "A91C6418-41F0-46EB-ACFC-FCE907F5AA87", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.13:*:*:*:*:*:*:*", "matchCriteriaId": "0C020534-7596-496C-B9B0-739F58F6F4EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "0A77D40C-6FF5-42BD-9EFB-B532824D7606", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "F04C6A76-2718-4DBA-8972-A3EECDDB1A17", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "38ACD96E-5582-4ED0-BBB1-C891094D8217", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "264386DA-747F-492C-B660-D49BE9DB7139", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "DC4066AC-BE10-4189-86F6-BF94443738DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "1C25A146-50D5-4BA2-ABA2-20BF8784D7DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "72E76256-997F-4229-9B03-7BC3074F359D", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "7A717C50-2C5A-4CD1-B2E6-8CDF450940CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "61F908FF-9986-4F71-B0B6-D6A86555EF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "B0C1F99C-A246-40D3-B84A-5D11FF24AC1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "028F7F83-AF15-443B-A7DB-4E695E62EAFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "B418C3CE-E6E6-401D-AD83-5BB181009A7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.6:pre4:*:*:*:*:*:*", "matchCriteriaId": "8BF06FD2-0A4C-4557-B8EF-F0F021179498", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.6:pre8:*:*:*:*:*:*", "matchCriteriaId": "38C949C2-07A0-4FE4-8FBF-86215CB999CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.6:pre9:*:*:*:*:*:*", "matchCriteriaId": "88B23630-79DD-4B69-BB01-286193BA562E", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc10:*:*:*:*:*:*", "matchCriteriaId": "5FE21564-68C0-4765-BA40-9D3046C4CB14", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc3:*:*:*:*:*:*", "matchCriteriaId": "208102ED-6F22-44C5-BAF1-FD85EACF208F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc4:*:*:*:*:*:*", "matchCriteriaId": "C1CF7767-EB24-44E2-8E59-B4DBC99AFD23", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc5:*:*:*:*:*:*", "matchCriteriaId": "CF3D6D4C-5FD8-4EE1-A34A-99D397F09E85", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc7:*:*:*:*:*:*", "matchCriteriaId": "D63D88C1-B201-4D48-9659-5802DC4FD3EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc8:*:*:*:*:*:*", "matchCriteriaId": "16463B23-E884-467E-9F63-6B57EED39856", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc9:*:*:*:*:*:*", "matchCriteriaId": "9F2C03AF-666D-4AF6-BC69-F8B081EB41AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "84F90AFA-4B13-46A0-89D7-4065300C94C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "5DAD0F05-8B55-43ED-89D5-61A19F41EDFF", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "99053698-7F8B-4E71-8647-1A8B0DF7CEB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "9314F22D-22A8-4374-A2BF-3C64CF1F69BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "816E9640-A932-4E2F-9793-689F80D2AA89", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "5D09BB43-6CBA-499B-91D1-BA256A65E40D", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc1:*:*:*:*:*:*", "matchCriteriaId": "B98AFEDF-2BAB-4588-94E0-35AEA5F1B514", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc2:*:*:*:*:*:*", "matchCriteriaId": "4E8BAB5B-4DBC-4D05-B5E2-591573BC05FF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "fetchmail before 6.3.6-rc4 does not properly enforce TLS and may transmit cleartext passwords over unsecured links if certain circumstances occur, which allows remote attackers to obtain sensitive information via man-in-the-middle (MITM) attacks." }, { "lang": "es", "value": "fetchmail anetrior a 6.3.6-rc4 no fuerza TLS adecuadamente y puede transmitir contrase\u00f1as en texto en claro sobre enlaces inseguros si se producen determinadas circunstancias, lo cual permite a atacantes remotos obtener informaci\u00f3n sensible mediante ataques de hombre-en-medio (man-in-the-middle o MITM)." } ], "id": "CVE-2006-5867", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 7.8, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc" }, { "source": "cve@mitre.org", "url": "http://docs.info.apple.com/article.html?artnum=305391" }, { "source": "cve@mitre.org", "url": "http://fedoranews.org/cms/node/2429" }, { "source": "cve@mitre.org", "url": "http://fetchmail.berlios.de/fetchmail-SA-2006-02.txt" }, { "source": "cve@mitre.org", "url": "http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/31580" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/23631" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/23695" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/23714" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/23781" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/23804" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/23838" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/23923" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/24007" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/24151" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/24174" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/24284" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/24966" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200701-13.xml" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1017478" }, { "source": "cve@mitre.org", "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.517995" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2007/dsa-1259" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:016" }, { "source": "cve@mitre.org", "url": "http://www.novell.com/linux/security/advisories/2007_4_sr.html" }, { "source": "cve@mitre.org", "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.004.html" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2007-0018.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/456115/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/460528/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/21903" }, { "source": "cve@mitre.org", "url": "http://www.trustix.org/errata/2007/0007" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/usn-405-1" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-109A.html" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/0087" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/0088" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/1470" }, { "source": "cve@mitre.org", "url": "https://issues.rpath.com/browse/RPL-919" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10566" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://docs.info.apple.com/article.html?artnum=305391" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://fedoranews.org/cms/node/2429" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://fetchmail.berlios.de/fetchmail-SA-2006-02.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/31580" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/23631" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/23695" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/23714" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/23781" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/23804" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/23838" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/23923" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/24007" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/24151" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/24174" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/24284" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/24966" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200701-13.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1017478" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.517995" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2007/dsa-1259" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:016" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.novell.com/linux/security/advisories/2007_4_sr.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.004.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2007-0018.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/456115/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/460528/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/21903" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.trustix.org/errata/2007/0007" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/usn-405-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-109A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/0087" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/0088" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/1470" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://issues.rpath.com/browse/RPL-919" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10566" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2002-10-11 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Buffer overflows in Fetchmail 6.0.0 and earlier allow remote attackers to cause a denial of service (crash) or execute arbitrary code via (1) long headers that are not properly processed by the readheaders function, or (2) via long Received: headers, which are not properly parsed by the parse_received function.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000531 | ||
cve@mitre.org | http://marc.info/?l=bugtraq&m=103340148625187&w=2 | ||
cve@mitre.org | http://rhn.redhat.com/errata/RHSA-2002-215.html | ||
cve@mitre.org | http://www.debian.org/security/2002/dsa-171 | Patch, Vendor Advisory | |
cve@mitre.org | http://www.iss.net/security_center/static/10203.php | Vendor Advisory | |
cve@mitre.org | http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-063.php | Patch, Vendor Advisory | |
cve@mitre.org | http://www.linuxsecurity.com/advisories/other_advisory-2402.html | ||
cve@mitre.org | http://www.securityfocus.com/bid/5825 | ||
cve@mitre.org | http://www.securityfocus.com/bid/5827 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000531 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=103340148625187&w=2 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2002-215.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2002/dsa-171 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.iss.net/security_center/static/10203.php | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-063.php | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.linuxsecurity.com/advisories/other_advisory-2402.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/5825 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/5827 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
fetchmail | fetchmail | * | |
fetchmail | fetchmail | 4.5.1 | |
fetchmail | fetchmail | 4.5.2 | |
fetchmail | fetchmail | 4.5.3 | |
fetchmail | fetchmail | 4.5.4 | |
fetchmail | fetchmail | 4.5.5 | |
fetchmail | fetchmail | 4.5.6 | |
fetchmail | fetchmail | 4.5.7 | |
fetchmail | fetchmail | 4.5.8 | |
fetchmail | fetchmail | 4.6.0 | |
fetchmail | fetchmail | 4.6.1 | |
fetchmail | fetchmail | 4.6.2 | |
fetchmail | fetchmail | 4.6.3 | |
fetchmail | fetchmail | 4.6.4 | |
fetchmail | fetchmail | 4.6.5 | |
fetchmail | fetchmail | 4.6.6 | |
fetchmail | fetchmail | 4.6.7 | |
fetchmail | fetchmail | 4.6.8 | |
fetchmail | fetchmail | 4.6.9 | |
fetchmail | fetchmail | 4.7.0 | |
fetchmail | fetchmail | 4.7.1 | |
fetchmail | fetchmail | 4.7.2 | |
fetchmail | fetchmail | 4.7.3 | |
fetchmail | fetchmail | 4.7.4 | |
fetchmail | fetchmail | 4.7.5 | |
fetchmail | fetchmail | 4.7.6 | |
fetchmail | fetchmail | 4.7.7 | |
fetchmail | fetchmail | 5.0.0 | |
fetchmail | fetchmail | 5.0.1 | |
fetchmail | fetchmail | 5.0.2 | |
fetchmail | fetchmail | 5.0.3 | |
fetchmail | fetchmail | 5.0.4 | |
fetchmail | fetchmail | 5.0.5 | |
fetchmail | fetchmail | 5.0.6 | |
fetchmail | fetchmail | 5.0.7 | |
fetchmail | fetchmail | 5.0.8 | |
fetchmail | fetchmail | 5.1.0 | |
fetchmail | fetchmail | 5.1.4 | |
fetchmail | fetchmail | 5.2.0 | |
fetchmail | fetchmail | 5.2.1 | |
fetchmail | fetchmail | 5.2.3 | |
fetchmail | fetchmail | 5.2.4 | |
fetchmail | fetchmail | 5.2.7 | |
fetchmail | fetchmail | 5.2.8 | |
fetchmail | fetchmail | 5.3.0 | |
fetchmail | fetchmail | 5.3.1 | |
fetchmail | fetchmail | 5.3.3 | |
fetchmail | fetchmail | 5.3.8 | |
fetchmail | fetchmail | 5.4.0 | |
fetchmail | fetchmail | 5.4.3 | |
fetchmail | fetchmail | 5.4.4 | |
fetchmail | fetchmail | 5.4.5 | |
fetchmail | fetchmail | 5.5.0 | |
fetchmail | fetchmail | 5.5.2 | |
fetchmail | fetchmail | 5.5.3 | |
fetchmail | fetchmail | 5.5.5 | |
fetchmail | fetchmail | 5.5.6 | |
fetchmail | fetchmail | 5.6.0 | |
fetchmail | fetchmail | 5.7.0 | |
fetchmail | fetchmail | 5.7.2 | |
fetchmail | fetchmail | 5.7.4 | |
fetchmail | fetchmail | 5.8 | |
fetchmail | fetchmail | 5.8.1 | |
fetchmail | fetchmail | 5.8.2 | |
fetchmail | fetchmail | 5.8.3 | |
fetchmail | fetchmail | 5.8.4 | |
fetchmail | fetchmail | 5.8.5 | |
fetchmail | fetchmail | 5.8.6 | |
fetchmail | fetchmail | 5.8.11 | |
fetchmail | fetchmail | 5.8.13 | |
fetchmail | fetchmail | 5.8.14 | |
fetchmail | fetchmail | 5.8.17 | |
fetchmail | fetchmail | 5.9.0 | |
fetchmail | fetchmail | 5.9.4 | |
fetchmail | fetchmail | 5.9.5 | |
fetchmail | fetchmail | 5.9.8 | |
fetchmail | fetchmail | 5.9.10 | |
fetchmail | fetchmail | 5.9.11 | |
fetchmail | fetchmail | 5.9.13 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fetchmail:fetchmail:*:*:*:*:*:*:*:*", "matchCriteriaId": "39C26905-0EB8-4141-B3EC-6C30FC34452E", "versionEndIncluding": "6.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "BF519D04-7596-42C6-A1D8-FC1018D1A414", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "9AFEC739-BDFA-4D14-9A04-96FFB71AE330", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "E1923712-7B88-483E-B38A-0EA6FB38EB38", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "C9608A96-D131-401B-B041-09ADEEB59354", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "F4555DBB-B63B-4637-86A9-399B34B27D14", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "D8AB8504-8CD1-4013-9413-1378F3BAE0AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "3DC47DA9-D110-4E6B-9F5B-D17ECB942B40", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.8:*:*:*:*:*:*:*", "matchCriteriaId": "345D0848-958F-4B44-8F31-0793C36A5ADD", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "7E179061-FB6A-44AA-8EAC-4916719D9A28", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "58A6B5F4-C799-45C4-9EAD-A55023767033", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "54FDB8B9-5537-4E08-8FA0-931D4BED43E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "E7EB9B1D-C6B0-494B-8A8C-752E5659EA1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "CC13DE1B-1428-4842-9567-BBE5EEF7042F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "215ED879-1E26-4FF4-8857-18499C5DE3A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "72604F3D-2DE8-4BFF-97D5-4AFA64399201", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "8792F7FF-9E56-4201-89FD-F0146D4F0DF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "B12812E8-1C5B-46CF-A266-EE19C5CD3B12", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.9:*:*:*:*:*:*:*", "matchCriteriaId": "4DEAA0E8-746D-446D-AAEA-0ED287766332", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "7D3E14C3-82AE-4D4A-8963-438BECBA5678", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "4DCFB7BB-2879-4EB7-BE1D-163238E313C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "6ED223B6-1864-415C-96D6-64E1EDE4C840", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "14CBC8ED-CC10-40B6-8AA7-9F1342432ECB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "D3417C2E-1117-4FE7-B2FA-74CAB57235B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.5:*:*:*:*:*:*:*", "matchCriteriaId": "07C61DC4-50D5-44B2-92F8-A59C65144108", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.6:*:*:*:*:*:*:*", "matchCriteriaId": "31A37E19-1E07-4FD0-AC6D-6AC3ED954787", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.7:*:*:*:*:*:*:*", "matchCriteriaId": "570C9443-81CE-42AC-B4A6-3B2ABAD97EC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "853DD3E0-668F-4FAC-BA0B-D4E9C416D646", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "CEF70FCA-5DA4-4C0B-B876-0345FA077D44", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "BF0C4F7C-0003-4C77-AE22-A9C2FCBFAF3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "78D12F53-07DE-447D-8403-40EB75B91955", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "19ECB844-F378-4A94-B9FC-A731B8186013", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "3169AA63-79F6-4B89-9405-8F6A2FB6FD64", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "88D1D54C-81A4-44CE-BE12-798CF7DD2CC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "D6615C7D-09B5-4943-A124-2FF9A0F4B927", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "EF18219F-0406-4D46-90DE-EA2A17C8EFF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "87B56DFD-BDA9-4D8B-BE54-BF59B762D574", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "33EA0CA8-468F-4A94-8DA3-5D820AB65973", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA21C847-57ED-4E7D-9366-6038467D9080", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "0450BD04-15D2-4122-A210-6225B89BDA7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "18428805-AEB2-4BA4-9762-906B59CE74D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "AFCCBB15-DFFE-4A57-A029-E57707D15E04", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "0427B5C8-265C-47C3-9BAB-B2A0EAA1DEE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "89A4B962-BE5B-471C-83EF-674525C5AE83", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "7166ECCB-54FB-44EA-BA80-4D2AAF494AF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "6B309C89-99E2-4F0B-976C-95E44A45ADC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "A3DE7EE7-F627-4955-8D95-1F00F1F85C7D", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "D549098D-FE16-4BCB-91C4-D71A8C8D2E9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "57BFA165-6E2E-49AF-9E2D-3D8923CF36C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "F5C67DFF-A1BE-4486-A11F-CD3729927220", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "1D365E6E-8777-4084-BEC8-7CBF4997D976", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "20C4FF28-0DBA-4995-8252-2D62FF896BC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "F80C6B9B-AFCE-46A1-8DEF-51C1B526EB18", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "BF667DB5-F41E-4E73-A01F-4EC3F60BAD0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "D2B144FA-A901-4CDF-AC3D-7F5E820B7A4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "96774635-9A12-4DAB-BCF6-2D678F244CE9", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "EFD2EE7A-36CB-4A26-8EEB-DACA2864D921", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "C3898EBC-75A9-4DDD-A0AF-2CDEC72DAE4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "4267DCE8-985C-416D-A6B7-536585E5A573", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "50E63EDF-FF0A-447C-A3FC-7BA2414C15CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "61DDD4A1-6185-41B6-A715-4C70F0AA2631", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8:*:*:*:*:*:*:*", "matchCriteriaId": "B10A7E3C-07CD-48A6-9075-5314B4E1EEAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "319955A4-27A8-46FF-ACE7-97E6DF27B2DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "925CF3DD-682B-40E6-900C-23F784CD9239", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "16366780-611E-4217-A614-EBA01421D148", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "43AEA36F-E730-4305-9CB6-738A7152F02E", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.5:*:*:*:*:*:*:*", "matchCriteriaId": "2B9536BA-6334-4957-9632-6D64365B88AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.6:*:*:*:*:*:*:*", "matchCriteriaId": "F52FA32B-8048-4FD7-9D20-20DC5E52098B", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.11:*:*:*:*:*:*:*", "matchCriteriaId": "9FA92DF1-3AAD-46AC-A9E4-E9386C977818", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.13:*:*:*:*:*:*:*", "matchCriteriaId": "837D66DB-F9CB-41F1-A091-BCFBAC2F45B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.14:*:*:*:*:*:*:*", "matchCriteriaId": "74D12B67-6E66-419A-A28F-6306402931EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.17:*:*:*:*:*:*:*", "matchCriteriaId": "A71FCBED-B25D-48E3-916C-FBA9E0DE8D12", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "1A17995E-DCAF-465A-8ABD-F1EA0D538784", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "93D03D78-C56E-4189-97FC-916C918EDFEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "19A66C77-041F-4A12-8A36-233A6B50641C", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C945059C-EF39-486D-A804-FBB8704AB927", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "1258CA65-FBC1-4848-A9E5-A8F5E5D6FBD5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.11:*:*:*:*:*:*:*", "matchCriteriaId": "A91C6418-41F0-46EB-ACFC-FCE907F5AA87", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.13:*:*:*:*:*:*:*", "matchCriteriaId": "0C020534-7596-496C-B9B0-739F58F6F4EF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflows in Fetchmail 6.0.0 and earlier allow remote attackers to cause a denial of service (crash) or execute arbitrary code via (1) long headers that are not properly processed by the readheaders function, or (2) via long Received: headers, which are not properly parsed by the parse_received function." }, { "lang": "es", "value": "Desbordamientos de b\u00fafer en Fetchmail 6.0.0 y anteriores permiten a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda) o ejecutar c\u00f3digo arbitrario mediante\r\ncabeceras largas que no son adecuadamente procesadas por la funci\u00f3n readheadesrs, o \r\nmediante cabeceras largas Received:, que no son procesadas adecuadamente por la funci\u00f3n parse_received" } ], "id": "CVE-2002-1174", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2002-10-11T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000531" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=103340148625187\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://rhn.redhat.com/errata/RHSA-2002-215.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.debian.org/security/2002/dsa-171" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.iss.net/security_center/static/10203.php" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-063.php" }, { "source": "cve@mitre.org", "url": "http://www.linuxsecurity.com/advisories/other_advisory-2402.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/5825" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/5827" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000531" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=103340148625187\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2002-215.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.debian.org/security/2002/dsa-171" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.iss.net/security_center/static/10203.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-063.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.linuxsecurity.com/advisories/other_advisory-2402.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/5825" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/5827" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-01-24 00:03
Modified
2025-04-03 01:03
Severity ?
Summary
fetchmail 6.3.0 and other versions before 6.3.2 allows remote attackers to cause a denial of service (crash) via crafted e-mail messages that cause a free of an invalid pointer when fetchmail bounces the message to the originator or local postmaster.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=348747 | ||
cve@mitre.org | http://developer.berlios.de/project/shownotes.php?release_id=8784 | ||
cve@mitre.org | http://fetchmail.berlios.de/fetchmail-SA-2006-01.txt | Patch, Vendor Advisory | |
cve@mitre.org | http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html | ||
cve@mitre.org | http://secunia.com/advisories/18571 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/18895 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/21253 | Vendor Advisory | |
cve@mitre.org | http://securitytracker.com/id?1015527 | ||
cve@mitre.org | http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.443499 | ||
cve@mitre.org | http://www.osvdb.org/22691 | ||
cve@mitre.org | http://www.securityfocus.com/archive/1/422936/100/0/threaded | ||
cve@mitre.org | http://www.securityfocus.com/bid/16365 | ||
cve@mitre.org | http://www.securityfocus.com/bid/19289 | ||
cve@mitre.org | http://www.us-cert.gov/cas/techalerts/TA06-214A.html | US Government Resource | |
cve@mitre.org | http://www.vupen.com/english/advisories/2006/0300 | ||
cve@mitre.org | http://www.vupen.com/english/advisories/2006/3101 | ||
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/24265 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=348747 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://developer.berlios.de/project/shownotes.php?release_id=8784 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://fetchmail.berlios.de/fetchmail-SA-2006-01.txt | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/18571 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/18895 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/21253 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://securitytracker.com/id?1015527 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.443499 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.osvdb.org/22691 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/422936/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/16365 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/19289 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA06-214A.html | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2006/0300 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2006/3101 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/24265 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "84F90AFA-4B13-46A0-89D7-4065300C94C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "5DAD0F05-8B55-43ED-89D5-61A19F41EDFF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "fetchmail 6.3.0 and other versions before 6.3.2 allows remote attackers to cause a denial of service (crash) via crafted e-mail messages that cause a free of an invalid pointer when fetchmail bounces the message to the originator or local postmaster." } ], "id": "CVE-2006-0321", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-01-24T00:03:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=348747" }, { "source": "cve@mitre.org", "url": "http://developer.berlios.de/project/shownotes.php?release_id=8784" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://fetchmail.berlios.de/fetchmail-SA-2006-01.txt" }, { "source": "cve@mitre.org", "url": "http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/18571" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/18895" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21253" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1015527" }, { "source": "cve@mitre.org", "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.443499" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/22691" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/422936/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/16365" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/19289" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA06-214A.html" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2006/0300" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2006/3101" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24265" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=348747" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://developer.berlios.de/project/shownotes.php?release_id=8784" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://fetchmail.berlios.de/fetchmail-SA-2006-01.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/18571" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/18895" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21253" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1015527" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.443499" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/22691" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/422936/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/16365" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/19289" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA06-214A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/0300" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/3101" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24265" } ], "sourceIdentifier": "cve@mitre.org", "vendorComments": [ { "comment": "This issue did not affect the versions of Fetchmail as distributed with Red Hat Enterprise Linux 2.1, 3, or 4.", "lastModified": "2006-08-30T00:00:00", "organization": "Red Hat" } ], "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2001-09-06 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
fetchmailconf in fetchmail before 5.7.4 allows local users to overwrite files of other users via a symlink attack on temporary files.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://lists.ccil.org/pipermail/fetchmail-announce/2001-March/000015.html | ||
cve@mitre.org | http://www.redhat.com/support/errata/RHSA-2001-103.html | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.ccil.org/pipermail/fetchmail-announce/2001-March/000015.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2001-103.html | Patch |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
fetchmail | fetchmail | * | |
fetchmail | fetchmail | 4.5.1 | |
fetchmail | fetchmail | 4.5.2 | |
fetchmail | fetchmail | 4.5.3 | |
fetchmail | fetchmail | 4.5.4 | |
fetchmail | fetchmail | 4.5.5 | |
fetchmail | fetchmail | 4.5.6 | |
fetchmail | fetchmail | 4.5.7 | |
fetchmail | fetchmail | 4.5.8 | |
fetchmail | fetchmail | 4.6.0 | |
fetchmail | fetchmail | 4.6.1 | |
fetchmail | fetchmail | 4.6.2 | |
fetchmail | fetchmail | 4.6.3 | |
fetchmail | fetchmail | 4.6.4 | |
fetchmail | fetchmail | 4.6.5 | |
fetchmail | fetchmail | 4.6.6 | |
fetchmail | fetchmail | 4.6.7 | |
fetchmail | fetchmail | 4.6.8 | |
fetchmail | fetchmail | 4.6.9 | |
fetchmail | fetchmail | 4.7.0 | |
fetchmail | fetchmail | 4.7.1 | |
fetchmail | fetchmail | 4.7.2 | |
fetchmail | fetchmail | 4.7.3 | |
fetchmail | fetchmail | 4.7.4 | |
fetchmail | fetchmail | 4.7.5 | |
fetchmail | fetchmail | 4.7.6 | |
fetchmail | fetchmail | 4.7.7 | |
fetchmail | fetchmail | 5.0.0 | |
fetchmail | fetchmail | 5.0.1 | |
fetchmail | fetchmail | 5.0.2 | |
fetchmail | fetchmail | 5.0.3 | |
fetchmail | fetchmail | 5.0.4 | |
fetchmail | fetchmail | 5.0.5 | |
fetchmail | fetchmail | 5.0.6 | |
fetchmail | fetchmail | 5.0.7 | |
fetchmail | fetchmail | 5.0.8 | |
fetchmail | fetchmail | 5.1.0 | |
fetchmail | fetchmail | 5.1.4 | |
fetchmail | fetchmail | 5.2.0 | |
fetchmail | fetchmail | 5.2.1 | |
fetchmail | fetchmail | 5.2.3 | |
fetchmail | fetchmail | 5.2.4 | |
fetchmail | fetchmail | 5.2.7 | |
fetchmail | fetchmail | 5.2.8 | |
fetchmail | fetchmail | 5.3.0 | |
fetchmail | fetchmail | 5.3.1 | |
fetchmail | fetchmail | 5.3.3 | |
fetchmail | fetchmail | 5.3.8 | |
fetchmail | fetchmail | 5.4.0 | |
fetchmail | fetchmail | 5.4.3 | |
fetchmail | fetchmail | 5.4.4 | |
fetchmail | fetchmail | 5.4.5 | |
fetchmail | fetchmail | 5.5.0 | |
fetchmail | fetchmail | 5.5.2 | |
fetchmail | fetchmail | 5.5.3 | |
fetchmail | fetchmail | 5.5.5 | |
fetchmail | fetchmail | 5.5.6 | |
fetchmail | fetchmail | 5.6.0 | |
fetchmail | fetchmail | 5.7.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fetchmail:fetchmail:*:*:*:*:*:*:*:*", "matchCriteriaId": "90833323-1385-45AB-946D-ABD73B1FF15C", "versionEndIncluding": "5.7.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "BF519D04-7596-42C6-A1D8-FC1018D1A414", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "9AFEC739-BDFA-4D14-9A04-96FFB71AE330", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "E1923712-7B88-483E-B38A-0EA6FB38EB38", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "C9608A96-D131-401B-B041-09ADEEB59354", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "F4555DBB-B63B-4637-86A9-399B34B27D14", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "D8AB8504-8CD1-4013-9413-1378F3BAE0AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "3DC47DA9-D110-4E6B-9F5B-D17ECB942B40", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.8:*:*:*:*:*:*:*", "matchCriteriaId": "345D0848-958F-4B44-8F31-0793C36A5ADD", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "7E179061-FB6A-44AA-8EAC-4916719D9A28", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "58A6B5F4-C799-45C4-9EAD-A55023767033", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "54FDB8B9-5537-4E08-8FA0-931D4BED43E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "E7EB9B1D-C6B0-494B-8A8C-752E5659EA1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "CC13DE1B-1428-4842-9567-BBE5EEF7042F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "215ED879-1E26-4FF4-8857-18499C5DE3A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "72604F3D-2DE8-4BFF-97D5-4AFA64399201", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "8792F7FF-9E56-4201-89FD-F0146D4F0DF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "B12812E8-1C5B-46CF-A266-EE19C5CD3B12", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.9:*:*:*:*:*:*:*", "matchCriteriaId": "4DEAA0E8-746D-446D-AAEA-0ED287766332", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "7D3E14C3-82AE-4D4A-8963-438BECBA5678", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "4DCFB7BB-2879-4EB7-BE1D-163238E313C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "6ED223B6-1864-415C-96D6-64E1EDE4C840", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "14CBC8ED-CC10-40B6-8AA7-9F1342432ECB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "D3417C2E-1117-4FE7-B2FA-74CAB57235B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.5:*:*:*:*:*:*:*", "matchCriteriaId": "07C61DC4-50D5-44B2-92F8-A59C65144108", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.6:*:*:*:*:*:*:*", "matchCriteriaId": "31A37E19-1E07-4FD0-AC6D-6AC3ED954787", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.7:*:*:*:*:*:*:*", "matchCriteriaId": "570C9443-81CE-42AC-B4A6-3B2ABAD97EC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "853DD3E0-668F-4FAC-BA0B-D4E9C416D646", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "CEF70FCA-5DA4-4C0B-B876-0345FA077D44", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "BF0C4F7C-0003-4C77-AE22-A9C2FCBFAF3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "78D12F53-07DE-447D-8403-40EB75B91955", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "19ECB844-F378-4A94-B9FC-A731B8186013", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "3169AA63-79F6-4B89-9405-8F6A2FB6FD64", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "88D1D54C-81A4-44CE-BE12-798CF7DD2CC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "D6615C7D-09B5-4943-A124-2FF9A0F4B927", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "EF18219F-0406-4D46-90DE-EA2A17C8EFF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "87B56DFD-BDA9-4D8B-BE54-BF59B762D574", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "33EA0CA8-468F-4A94-8DA3-5D820AB65973", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA21C847-57ED-4E7D-9366-6038467D9080", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "0450BD04-15D2-4122-A210-6225B89BDA7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "18428805-AEB2-4BA4-9762-906B59CE74D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "AFCCBB15-DFFE-4A57-A029-E57707D15E04", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "0427B5C8-265C-47C3-9BAB-B2A0EAA1DEE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "89A4B962-BE5B-471C-83EF-674525C5AE83", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "7166ECCB-54FB-44EA-BA80-4D2AAF494AF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "6B309C89-99E2-4F0B-976C-95E44A45ADC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "A3DE7EE7-F627-4955-8D95-1F00F1F85C7D", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "D549098D-FE16-4BCB-91C4-D71A8C8D2E9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "57BFA165-6E2E-49AF-9E2D-3D8923CF36C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "F5C67DFF-A1BE-4486-A11F-CD3729927220", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "1D365E6E-8777-4084-BEC8-7CBF4997D976", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "20C4FF28-0DBA-4995-8252-2D62FF896BC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "F80C6B9B-AFCE-46A1-8DEF-51C1B526EB18", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "BF667DB5-F41E-4E73-A01F-4EC3F60BAD0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "D2B144FA-A901-4CDF-AC3D-7F5E820B7A4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "96774635-9A12-4DAB-BCF6-2D678F244CE9", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "EFD2EE7A-36CB-4A26-8EEB-DACA2864D921", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "C3898EBC-75A9-4DDD-A0AF-2CDEC72DAE4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "4267DCE8-985C-416D-A6B7-536585E5A573", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "fetchmailconf in fetchmail before 5.7.4 allows local users to overwrite files of other users via a symlink attack on temporary files." } ], "id": "CVE-2001-1378", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2001-09-06T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://lists.ccil.org/pipermail/fetchmail-announce/2001-March/000015.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.redhat.com/support/errata/RHSA-2001-103.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.ccil.org/pipermail/fetchmail-announce/2001-March/000015.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.redhat.com/support/errata/RHSA-2001-103.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-59" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2005-12-21 00:03
Modified
2025-04-03 01:03
Severity ?
Summary
fetchmail before 6.3.1 and before 6.2.5.5, when configured for multidrop mode, allows remote attackers to cause a denial of service (application crash) by sending messages without headers from upstream mail servers.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc | Broken Link | |
cve@mitre.org | http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=343836 | Issue Tracking, Mailing List, Third Party Advisory | |
cve@mitre.org | http://fetchmail.berlios.de/fetchmail-SA-2005-03.txt | Broken Link | |
cve@mitre.org | http://secunia.com/advisories/17891 | Third Party Advisory | |
cve@mitre.org | http://secunia.com/advisories/18172 | Third Party Advisory | |
cve@mitre.org | http://secunia.com/advisories/18231 | Third Party Advisory | |
cve@mitre.org | http://secunia.com/advisories/18266 | Third Party Advisory | |
cve@mitre.org | http://secunia.com/advisories/18433 | Third Party Advisory | |
cve@mitre.org | http://secunia.com/advisories/18463 | Third Party Advisory | |
cve@mitre.org | http://secunia.com/advisories/18895 | Third Party Advisory | |
cve@mitre.org | http://secunia.com/advisories/21253 | Third Party Advisory | |
cve@mitre.org | http://secunia.com/advisories/24007 | Third Party Advisory | |
cve@mitre.org | http://secunia.com/advisories/24284 | Third Party Advisory | |
cve@mitre.org | http://securitytracker.com/id?1015383 | Third Party Advisory, VDB Entry | |
cve@mitre.org | http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.443499 | Third Party Advisory | |
cve@mitre.org | http://www.debian.org/security/2005/dsa-939 | Third Party Advisory | |
cve@mitre.org | http://www.novell.com/linux/security/advisories/2007_4_sr.html | Broken Link | |
cve@mitre.org | http://www.osvdb.org/21906 | Broken Link | |
cve@mitre.org | http://www.redhat.com/support/errata/RHSA-2007-0018.html | Third Party Advisory | |
cve@mitre.org | http://www.securityfocus.com/archive/1/420098/100/0/threaded | ||
cve@mitre.org | http://www.securityfocus.com/archive/1/435197/100/0/threaded | ||
cve@mitre.org | http://www.securityfocus.com/bid/15987 | Third Party Advisory, VDB Entry | |
cve@mitre.org | http://www.securityfocus.com/bid/19289 | Third Party Advisory, VDB Entry | |
cve@mitre.org | http://www.trustix.org/errata/2006/0002/ | Broken Link | |
cve@mitre.org | http://www.vupen.com/english/advisories/2005/2996 | Permissions Required, Third Party Advisory | |
cve@mitre.org | http://www.vupen.com/english/advisories/2006/3101 | Permissions Required, Third Party Advisory | |
cve@mitre.org | http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:236 | Third Party Advisory | |
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/23713 | Third Party Advisory, VDB Entry | |
cve@mitre.org | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9659 | Third Party Advisory | |
cve@mitre.org | https://usn.ubuntu.com/233-1/ | ||
af854a3a-2127-422b-91ae-364da2661108 | ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc | Broken Link | |
af854a3a-2127-422b-91ae-364da2661108 | http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=343836 | Issue Tracking, Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://fetchmail.berlios.de/fetchmail-SA-2005-03.txt | Broken Link | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/17891 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/18172 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/18231 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/18266 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/18433 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/18463 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/18895 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/21253 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/24007 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/24284 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://securitytracker.com/id?1015383 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.443499 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2005/dsa-939 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.novell.com/linux/security/advisories/2007_4_sr.html | Broken Link | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.osvdb.org/21906 | Broken Link | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2007-0018.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/420098/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/435197/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/15987 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/19289 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.trustix.org/errata/2006/0002/ | Broken Link | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2005/2996 | Permissions Required, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2006/3101 | Permissions Required, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:236 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/23713 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9659 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/233-1/ |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fetchmail:fetchmail:*:*:*:*:*:*:*:*", "matchCriteriaId": "64605C37-5FF4-4926-84BD-39041A01780B", "versionEndExcluding": "6.2.5.5", "versionStartIncluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:*:*:*:*:*:*:*:*", "matchCriteriaId": "54D97A80-767B-4B3E-B908-52A595AA0FA7", "versionEndExcluding": "6.3.1", "versionStartIncluding": "6.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "fetchmail before 6.3.1 and before 6.2.5.5, when configured for multidrop mode, allows remote attackers to cause a denial of service (application crash) by sending messages without headers from upstream mail servers." } ], "id": "CVE-2005-4348", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-12-21T00:03:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Mailing List", "Third Party Advisory" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=343836" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://fetchmail.berlios.de/fetchmail-SA-2005-03.txt" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/17891" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/18172" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/18231" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/18266" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/18433" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/18463" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/18895" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/21253" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/24007" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/24284" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://securitytracker.com/id?1015383" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.443499" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2005/dsa-939" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.novell.com/linux/security/advisories/2007_4_sr.html" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.osvdb.org/21906" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0018.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/420098/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/435197/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/15987" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/19289" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.trustix.org/errata/2006/0002/" }, { "source": "cve@mitre.org", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "http://www.vupen.com/english/advisories/2005/2996" }, { "source": "cve@mitre.org", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "http://www.vupen.com/english/advisories/2006/3101" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:236" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23713" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9659" }, { "source": "cve@mitre.org", "url": "https://usn.ubuntu.com/233-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Mailing List", "Third Party Advisory" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=343836" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://fetchmail.berlios.de/fetchmail-SA-2005-03.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/17891" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/18172" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/18231" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/18266" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/18433" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/18463" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/18895" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/21253" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/24007" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/24284" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://securitytracker.com/id?1015383" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.443499" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2005/dsa-939" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.novell.com/linux/security/advisories/2007_4_sr.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.osvdb.org/21906" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0018.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/420098/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/435197/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/15987" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/19289" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.trustix.org/errata/2006/0002/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "http://www.vupen.com/english/advisories/2005/2996" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "http://www.vupen.com/english/advisories/2006/3101" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:236" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23713" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9659" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://usn.ubuntu.com/233-1/" } ], "sourceIdentifier": "cve@mitre.org", "vendorComments": [ { "comment": "The Red Hat Security Response Team has rated this issue as having low security impact. An update is available for Red Hat Enterprise Linux 4 to correct this issue:\nhttp://rhn.redhat.com/errata/RHSA-2007-0018.html\n\nThis issue did not affect Red Hat Enterprise Linux 2.1 and 3.", "lastModified": "2007-01-31T00:00:00", "organization": "Red Hat" } ], "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2002-10-11 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
The getmxrecord function in Fetchmail 6.0.0 and earlier does not properly check the boundary of a particular malformed DNS packet from a malicious DNS server, which allows remote attackers to cause a denial of service (crash) when Fetchmail attempts to read data beyond the expected boundary.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000531 | ||
cve@mitre.org | http://marc.info/?l=bugtraq&m=103340148625187&w=2 | ||
cve@mitre.org | http://rhn.redhat.com/errata/RHSA-2002-215.html | ||
cve@mitre.org | http://www.debian.org/security/2002/dsa-171 | ||
cve@mitre.org | http://www.iss.net/security_center/static/10203.php | Vendor Advisory | |
cve@mitre.org | http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-063.php | Patch, Vendor Advisory | |
cve@mitre.org | http://www.linuxsecurity.com/advisories/other_advisory-2402.html | ||
cve@mitre.org | http://www.securityfocus.com/bid/5826 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000531 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=103340148625187&w=2 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2002-215.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2002/dsa-171 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.iss.net/security_center/static/10203.php | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-063.php | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.linuxsecurity.com/advisories/other_advisory-2402.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/5826 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
fetchmail | fetchmail | * | |
fetchmail | fetchmail | 4.5.1 | |
fetchmail | fetchmail | 4.5.2 | |
fetchmail | fetchmail | 4.5.3 | |
fetchmail | fetchmail | 4.5.4 | |
fetchmail | fetchmail | 4.5.5 | |
fetchmail | fetchmail | 4.5.6 | |
fetchmail | fetchmail | 4.5.7 | |
fetchmail | fetchmail | 4.5.8 | |
fetchmail | fetchmail | 4.6.0 | |
fetchmail | fetchmail | 4.6.1 | |
fetchmail | fetchmail | 4.6.2 | |
fetchmail | fetchmail | 4.6.3 | |
fetchmail | fetchmail | 4.6.4 | |
fetchmail | fetchmail | 4.6.5 | |
fetchmail | fetchmail | 4.6.6 | |
fetchmail | fetchmail | 4.6.7 | |
fetchmail | fetchmail | 4.6.8 | |
fetchmail | fetchmail | 4.6.9 | |
fetchmail | fetchmail | 4.7.0 | |
fetchmail | fetchmail | 4.7.1 | |
fetchmail | fetchmail | 4.7.2 | |
fetchmail | fetchmail | 4.7.3 | |
fetchmail | fetchmail | 4.7.4 | |
fetchmail | fetchmail | 4.7.5 | |
fetchmail | fetchmail | 4.7.6 | |
fetchmail | fetchmail | 4.7.7 | |
fetchmail | fetchmail | 5.0.0 | |
fetchmail | fetchmail | 5.0.1 | |
fetchmail | fetchmail | 5.0.2 | |
fetchmail | fetchmail | 5.0.3 | |
fetchmail | fetchmail | 5.0.4 | |
fetchmail | fetchmail | 5.0.5 | |
fetchmail | fetchmail | 5.0.6 | |
fetchmail | fetchmail | 5.0.7 | |
fetchmail | fetchmail | 5.0.8 | |
fetchmail | fetchmail | 5.1.0 | |
fetchmail | fetchmail | 5.1.4 | |
fetchmail | fetchmail | 5.2.0 | |
fetchmail | fetchmail | 5.2.1 | |
fetchmail | fetchmail | 5.2.3 | |
fetchmail | fetchmail | 5.2.4 | |
fetchmail | fetchmail | 5.2.7 | |
fetchmail | fetchmail | 5.2.8 | |
fetchmail | fetchmail | 5.3.0 | |
fetchmail | fetchmail | 5.3.1 | |
fetchmail | fetchmail | 5.3.3 | |
fetchmail | fetchmail | 5.3.8 | |
fetchmail | fetchmail | 5.4.0 | |
fetchmail | fetchmail | 5.4.3 | |
fetchmail | fetchmail | 5.4.4 | |
fetchmail | fetchmail | 5.4.5 | |
fetchmail | fetchmail | 5.5.0 | |
fetchmail | fetchmail | 5.5.2 | |
fetchmail | fetchmail | 5.5.3 | |
fetchmail | fetchmail | 5.5.5 | |
fetchmail | fetchmail | 5.5.6 | |
fetchmail | fetchmail | 5.6.0 | |
fetchmail | fetchmail | 5.7.0 | |
fetchmail | fetchmail | 5.7.2 | |
fetchmail | fetchmail | 5.7.4 | |
fetchmail | fetchmail | 5.8 | |
fetchmail | fetchmail | 5.8.1 | |
fetchmail | fetchmail | 5.8.2 | |
fetchmail | fetchmail | 5.8.3 | |
fetchmail | fetchmail | 5.8.4 | |
fetchmail | fetchmail | 5.8.5 | |
fetchmail | fetchmail | 5.8.6 | |
fetchmail | fetchmail | 5.8.11 | |
fetchmail | fetchmail | 5.8.13 | |
fetchmail | fetchmail | 5.8.14 | |
fetchmail | fetchmail | 5.8.17 | |
fetchmail | fetchmail | 5.9.0 | |
fetchmail | fetchmail | 5.9.4 | |
fetchmail | fetchmail | 5.9.5 | |
fetchmail | fetchmail | 5.9.8 | |
fetchmail | fetchmail | 5.9.10 | |
fetchmail | fetchmail | 5.9.11 | |
fetchmail | fetchmail | 5.9.13 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fetchmail:fetchmail:*:*:*:*:*:*:*:*", "matchCriteriaId": "39C26905-0EB8-4141-B3EC-6C30FC34452E", "versionEndIncluding": "6.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "BF519D04-7596-42C6-A1D8-FC1018D1A414", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "9AFEC739-BDFA-4D14-9A04-96FFB71AE330", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "E1923712-7B88-483E-B38A-0EA6FB38EB38", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "C9608A96-D131-401B-B041-09ADEEB59354", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "F4555DBB-B63B-4637-86A9-399B34B27D14", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "D8AB8504-8CD1-4013-9413-1378F3BAE0AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "3DC47DA9-D110-4E6B-9F5B-D17ECB942B40", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.8:*:*:*:*:*:*:*", "matchCriteriaId": "345D0848-958F-4B44-8F31-0793C36A5ADD", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "7E179061-FB6A-44AA-8EAC-4916719D9A28", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "58A6B5F4-C799-45C4-9EAD-A55023767033", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "54FDB8B9-5537-4E08-8FA0-931D4BED43E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "E7EB9B1D-C6B0-494B-8A8C-752E5659EA1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "CC13DE1B-1428-4842-9567-BBE5EEF7042F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "215ED879-1E26-4FF4-8857-18499C5DE3A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "72604F3D-2DE8-4BFF-97D5-4AFA64399201", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "8792F7FF-9E56-4201-89FD-F0146D4F0DF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "B12812E8-1C5B-46CF-A266-EE19C5CD3B12", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.9:*:*:*:*:*:*:*", "matchCriteriaId": "4DEAA0E8-746D-446D-AAEA-0ED287766332", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "7D3E14C3-82AE-4D4A-8963-438BECBA5678", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "4DCFB7BB-2879-4EB7-BE1D-163238E313C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "6ED223B6-1864-415C-96D6-64E1EDE4C840", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "14CBC8ED-CC10-40B6-8AA7-9F1342432ECB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "D3417C2E-1117-4FE7-B2FA-74CAB57235B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.5:*:*:*:*:*:*:*", "matchCriteriaId": "07C61DC4-50D5-44B2-92F8-A59C65144108", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.6:*:*:*:*:*:*:*", "matchCriteriaId": "31A37E19-1E07-4FD0-AC6D-6AC3ED954787", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.7:*:*:*:*:*:*:*", "matchCriteriaId": "570C9443-81CE-42AC-B4A6-3B2ABAD97EC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "853DD3E0-668F-4FAC-BA0B-D4E9C416D646", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "CEF70FCA-5DA4-4C0B-B876-0345FA077D44", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "BF0C4F7C-0003-4C77-AE22-A9C2FCBFAF3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "78D12F53-07DE-447D-8403-40EB75B91955", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "19ECB844-F378-4A94-B9FC-A731B8186013", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "3169AA63-79F6-4B89-9405-8F6A2FB6FD64", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "88D1D54C-81A4-44CE-BE12-798CF7DD2CC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "D6615C7D-09B5-4943-A124-2FF9A0F4B927", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "EF18219F-0406-4D46-90DE-EA2A17C8EFF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "87B56DFD-BDA9-4D8B-BE54-BF59B762D574", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "33EA0CA8-468F-4A94-8DA3-5D820AB65973", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA21C847-57ED-4E7D-9366-6038467D9080", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "0450BD04-15D2-4122-A210-6225B89BDA7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "18428805-AEB2-4BA4-9762-906B59CE74D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "AFCCBB15-DFFE-4A57-A029-E57707D15E04", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "0427B5C8-265C-47C3-9BAB-B2A0EAA1DEE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "89A4B962-BE5B-471C-83EF-674525C5AE83", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "7166ECCB-54FB-44EA-BA80-4D2AAF494AF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "6B309C89-99E2-4F0B-976C-95E44A45ADC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "A3DE7EE7-F627-4955-8D95-1F00F1F85C7D", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "D549098D-FE16-4BCB-91C4-D71A8C8D2E9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "57BFA165-6E2E-49AF-9E2D-3D8923CF36C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "F5C67DFF-A1BE-4486-A11F-CD3729927220", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "1D365E6E-8777-4084-BEC8-7CBF4997D976", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "20C4FF28-0DBA-4995-8252-2D62FF896BC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "F80C6B9B-AFCE-46A1-8DEF-51C1B526EB18", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "BF667DB5-F41E-4E73-A01F-4EC3F60BAD0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "D2B144FA-A901-4CDF-AC3D-7F5E820B7A4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "96774635-9A12-4DAB-BCF6-2D678F244CE9", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "EFD2EE7A-36CB-4A26-8EEB-DACA2864D921", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "C3898EBC-75A9-4DDD-A0AF-2CDEC72DAE4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "4267DCE8-985C-416D-A6B7-536585E5A573", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "50E63EDF-FF0A-447C-A3FC-7BA2414C15CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "61DDD4A1-6185-41B6-A715-4C70F0AA2631", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8:*:*:*:*:*:*:*", "matchCriteriaId": "B10A7E3C-07CD-48A6-9075-5314B4E1EEAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "319955A4-27A8-46FF-ACE7-97E6DF27B2DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "925CF3DD-682B-40E6-900C-23F784CD9239", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "16366780-611E-4217-A614-EBA01421D148", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "43AEA36F-E730-4305-9CB6-738A7152F02E", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.5:*:*:*:*:*:*:*", "matchCriteriaId": "2B9536BA-6334-4957-9632-6D64365B88AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.6:*:*:*:*:*:*:*", "matchCriteriaId": "F52FA32B-8048-4FD7-9D20-20DC5E52098B", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.11:*:*:*:*:*:*:*", "matchCriteriaId": "9FA92DF1-3AAD-46AC-A9E4-E9386C977818", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.13:*:*:*:*:*:*:*", "matchCriteriaId": "837D66DB-F9CB-41F1-A091-BCFBAC2F45B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.14:*:*:*:*:*:*:*", "matchCriteriaId": "74D12B67-6E66-419A-A28F-6306402931EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.17:*:*:*:*:*:*:*", "matchCriteriaId": "A71FCBED-B25D-48E3-916C-FBA9E0DE8D12", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "1A17995E-DCAF-465A-8ABD-F1EA0D538784", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "93D03D78-C56E-4189-97FC-916C918EDFEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "19A66C77-041F-4A12-8A36-233A6B50641C", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C945059C-EF39-486D-A804-FBB8704AB927", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "1258CA65-FBC1-4848-A9E5-A8F5E5D6FBD5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.11:*:*:*:*:*:*:*", "matchCriteriaId": "A91C6418-41F0-46EB-ACFC-FCE907F5AA87", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.13:*:*:*:*:*:*:*", "matchCriteriaId": "0C020534-7596-496C-B9B0-739F58F6F4EF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The getmxrecord function in Fetchmail 6.0.0 and earlier does not properly check the boundary of a particular malformed DNS packet from a malicious DNS server, which allows remote attackers to cause a denial of service (crash) when Fetchmail attempts to read data beyond the expected boundary." }, { "lang": "es", "value": "La funci\u00f3n getmxrecord en Fetchamil 6.0.0 y anteriores no comprueba adecuadamente los l\u00edmites de un paquete DNS particularmente malformado de un servidor DNS malicioso, lo que permite a atacantes remotos causar una denegaci\u00f3n de servicio (caida) cuando Fetchmail intenta leer datos m\u00e1s alla del l\u00edmite esperado." } ], "id": "CVE-2002-1175", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2002-10-11T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000531" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=103340148625187\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://rhn.redhat.com/errata/RHSA-2002-215.html" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2002/dsa-171" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.iss.net/security_center/static/10203.php" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-063.php" }, { "source": "cve@mitre.org", "url": "http://www.linuxsecurity.com/advisories/other_advisory-2402.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/5826" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000531" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=103340148625187\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2002-215.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2002/dsa-171" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.iss.net/security_center/static/10203.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-063.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.linuxsecurity.com/advisories/other_advisory-2402.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/5826" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-08-30 06:15
Modified
2024-11-21 06:19
Severity ?
Summary
Fetchmail before 6.4.22 fails to enforce STARTTLS session encryption in some circumstances, such as a certain situation with IMAP and PREAUTH.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.openwall.com/lists/oss-security/2021/08/27/3 | Mailing List, Third Party Advisory | |
cve@mitre.org | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3XJ6XLEJCEZCAM5LGGD6XBCC522QLG4/ | ||
cve@mitre.org | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VXMKSEHAQSEDCWZMAOJEGX3P3JW6QY6H/ | ||
cve@mitre.org | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZYCYLL73NP7ALJWSDICIVSA47ZIXWSSA/ | ||
cve@mitre.org | https://nostarttls.secvuln.info/ | Third Party Advisory | |
cve@mitre.org | https://security.gentoo.org/glsa/202209-14 | Third Party Advisory | |
cve@mitre.org | https://www.fetchmail.info/security.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2021/08/27/3 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3XJ6XLEJCEZCAM5LGGD6XBCC522QLG4/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VXMKSEHAQSEDCWZMAOJEGX3P3JW6QY6H/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZYCYLL73NP7ALJWSDICIVSA47ZIXWSSA/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://nostarttls.secvuln.info/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/202209-14 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.fetchmail.info/security.html | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
fetchmail | fetchmail | * | |
fedoraproject | fedora | 33 | |
fedoraproject | fedora | 34 | |
fedoraproject | fedora | 35 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fetchmail:fetchmail:*:*:*:*:*:*:*:*", "matchCriteriaId": "4AD13C43-606A-433C-98D9-1A24397CD739", "versionEndExcluding": "6.4.22", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Fetchmail before 6.4.22 fails to enforce STARTTLS session encryption in some circumstances, such as a certain situation with IMAP and PREAUTH." }, { "lang": "es", "value": "Fetchmail versiones anteriores a 6.4.22, no puede aplicar el cifrado de sesi\u00f3n STARTTLS en determinadas circunstancias, como una situaci\u00f3n con IMAP y PREAUTH." } ], "id": "CVE-2021-39272", "lastModified": "2024-11-21T06:19:05.287", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-08-30T06:15:06.450", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2021/08/27/3" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3XJ6XLEJCEZCAM5LGGD6XBCC522QLG4/" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VXMKSEHAQSEDCWZMAOJEGX3P3JW6QY6H/" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZYCYLL73NP7ALJWSDICIVSA47ZIXWSSA/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://nostarttls.secvuln.info/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202209-14" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.fetchmail.info/security.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2021/08/27/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3XJ6XLEJCEZCAM5LGGD6XBCC522QLG4/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VXMKSEHAQSEDCWZMAOJEGX3P3JW6QY6H/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZYCYLL73NP7ALJWSDICIVSA47ZIXWSSA/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://nostarttls.secvuln.info/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202209-14" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.fetchmail.info/security.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-319" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2005-07-27 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Buffer overflow in the POP3 client in Fetchmail before 6.2.5.2 allows remote POP3 servers to cause a denial of service and possibly execute arbitrary code via long UIDL responses. NOTE: a typo in an advisory accidentally used the wrong CVE identifier for the Fetchmail issue. This is the correct identifier.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://developer.berlios.de/project/shownotes.php?release_id=6617 | Patch | |
cve@mitre.org | http://fetchmail.berlios.de/fetchmail-SA-2005-01.txt | Patch, Vendor Advisory | |
cve@mitre.org | http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html | ||
cve@mitre.org | http://secunia.com/advisories/16176 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/21253 | Vendor Advisory | |
cve@mitre.org | http://www.debian.org/security/2005/dsa-774 | ||
cve@mitre.org | http://www.novell.com/linux/security/advisories/2005_18_sr.html | ||
cve@mitre.org | http://www.osvdb.org/18174 | ||
cve@mitre.org | http://www.redhat.com/archives/fedora-announce-list/2005-July/msg00088.html | ||
cve@mitre.org | http://www.redhat.com/archives/fedora-announce-list/2005-July/msg00089.html | Patch | |
cve@mitre.org | http://www.redhat.com/archives/fedora-announce-list/2005-July/msg00104.html | ||
cve@mitre.org | http://www.redhat.com/support/errata/RHSA-2005-640.html | ||
cve@mitre.org | http://www.securityfocus.com/archive/1/435197/100/0/threaded | ||
cve@mitre.org | http://www.securityfocus.com/archive/1/441856/100/200/threaded | ||
cve@mitre.org | http://www.securityfocus.com/bid/14349 | Patch | |
cve@mitre.org | http://www.securityfocus.com/bid/19289 | ||
cve@mitre.org | http://www.us-cert.gov/cas/techalerts/TA06-214A.html | US Government Resource | |
cve@mitre.org | http://www.vupen.com/english/advisories/2005/1171 | ||
cve@mitre.org | http://www.vupen.com/english/advisories/2006/3101 | ||
cve@mitre.org | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1038 | ||
cve@mitre.org | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1124 | ||
cve@mitre.org | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8833 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://developer.berlios.de/project/shownotes.php?release_id=6617 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://fetchmail.berlios.de/fetchmail-SA-2005-01.txt | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/16176 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/21253 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2005/dsa-774 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.novell.com/linux/security/advisories/2005_18_sr.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.osvdb.org/18174 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/archives/fedora-announce-list/2005-July/msg00088.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/archives/fedora-announce-list/2005-July/msg00089.html | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/archives/fedora-announce-list/2005-July/msg00104.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2005-640.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/435197/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/441856/100/200/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/14349 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/19289 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA06-214A.html | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2005/1171 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2006/3101 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1038 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1124 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8833 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
fetchmail | fetchmail | * | |
fetchmail | fetchmail | 4.5.1 | |
fetchmail | fetchmail | 4.5.2 | |
fetchmail | fetchmail | 4.5.3 | |
fetchmail | fetchmail | 4.5.4 | |
fetchmail | fetchmail | 4.5.5 | |
fetchmail | fetchmail | 4.5.6 | |
fetchmail | fetchmail | 4.5.7 | |
fetchmail | fetchmail | 4.5.8 | |
fetchmail | fetchmail | 4.6.0 | |
fetchmail | fetchmail | 4.6.1 | |
fetchmail | fetchmail | 4.6.2 | |
fetchmail | fetchmail | 4.6.3 | |
fetchmail | fetchmail | 4.6.4 | |
fetchmail | fetchmail | 4.6.5 | |
fetchmail | fetchmail | 4.6.6 | |
fetchmail | fetchmail | 4.6.7 | |
fetchmail | fetchmail | 4.6.8 | |
fetchmail | fetchmail | 4.6.9 | |
fetchmail | fetchmail | 4.7.0 | |
fetchmail | fetchmail | 4.7.1 | |
fetchmail | fetchmail | 4.7.2 | |
fetchmail | fetchmail | 4.7.3 | |
fetchmail | fetchmail | 4.7.4 | |
fetchmail | fetchmail | 4.7.5 | |
fetchmail | fetchmail | 4.7.6 | |
fetchmail | fetchmail | 4.7.7 | |
fetchmail | fetchmail | 5.0.0 | |
fetchmail | fetchmail | 5.0.1 | |
fetchmail | fetchmail | 5.0.2 | |
fetchmail | fetchmail | 5.0.3 | |
fetchmail | fetchmail | 5.0.4 | |
fetchmail | fetchmail | 5.0.5 | |
fetchmail | fetchmail | 5.0.6 | |
fetchmail | fetchmail | 5.0.7 | |
fetchmail | fetchmail | 5.0.8 | |
fetchmail | fetchmail | 5.1.0 | |
fetchmail | fetchmail | 5.1.4 | |
fetchmail | fetchmail | 5.2.0 | |
fetchmail | fetchmail | 5.2.1 | |
fetchmail | fetchmail | 5.2.3 | |
fetchmail | fetchmail | 5.2.4 | |
fetchmail | fetchmail | 5.2.7 | |
fetchmail | fetchmail | 5.2.8 | |
fetchmail | fetchmail | 5.3.0 | |
fetchmail | fetchmail | 5.3.1 | |
fetchmail | fetchmail | 5.3.3 | |
fetchmail | fetchmail | 5.3.8 | |
fetchmail | fetchmail | 5.4.0 | |
fetchmail | fetchmail | 5.4.3 | |
fetchmail | fetchmail | 5.4.4 | |
fetchmail | fetchmail | 5.4.5 | |
fetchmail | fetchmail | 5.5.0 | |
fetchmail | fetchmail | 5.5.2 | |
fetchmail | fetchmail | 5.5.3 | |
fetchmail | fetchmail | 5.5.5 | |
fetchmail | fetchmail | 5.5.6 | |
fetchmail | fetchmail | 5.6.0 | |
fetchmail | fetchmail | 5.7.0 | |
fetchmail | fetchmail | 5.7.2 | |
fetchmail | fetchmail | 5.7.4 | |
fetchmail | fetchmail | 5.8 | |
fetchmail | fetchmail | 5.8.1 | |
fetchmail | fetchmail | 5.8.2 | |
fetchmail | fetchmail | 5.8.3 | |
fetchmail | fetchmail | 5.8.4 | |
fetchmail | fetchmail | 5.8.5 | |
fetchmail | fetchmail | 5.8.6 | |
fetchmail | fetchmail | 5.8.11 | |
fetchmail | fetchmail | 5.8.13 | |
fetchmail | fetchmail | 5.8.14 | |
fetchmail | fetchmail | 5.8.17 | |
fetchmail | fetchmail | 5.9.0 | |
fetchmail | fetchmail | 5.9.4 | |
fetchmail | fetchmail | 5.9.5 | |
fetchmail | fetchmail | 5.9.8 | |
fetchmail | fetchmail | 5.9.10 | |
fetchmail | fetchmail | 5.9.11 | |
fetchmail | fetchmail | 5.9.13 | |
fetchmail | fetchmail | 6.0.0 | |
fetchmail | fetchmail | 6.1.0 | |
fetchmail | fetchmail | 6.1.3 | |
fetchmail | fetchmail | 6.2.0 | |
fetchmail | fetchmail | 6.2.1 | |
fetchmail | fetchmail | 6.2.2 | |
fetchmail | fetchmail | 6.2.3 | |
fetchmail | fetchmail | 6.2.4 | |
fetchmail | fetchmail | 6.2.5 | |
fetchmail | fetchmail | 6.3.4 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fetchmail:fetchmail:*:*:*:*:*:*:*:*", "matchCriteriaId": "B61F7795-769B-45F4-A178-5D307C23B5DE", "versionEndIncluding": "6.2.5.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "BF519D04-7596-42C6-A1D8-FC1018D1A414", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "9AFEC739-BDFA-4D14-9A04-96FFB71AE330", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "E1923712-7B88-483E-B38A-0EA6FB38EB38", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "C9608A96-D131-401B-B041-09ADEEB59354", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "F4555DBB-B63B-4637-86A9-399B34B27D14", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "D8AB8504-8CD1-4013-9413-1378F3BAE0AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "3DC47DA9-D110-4E6B-9F5B-D17ECB942B40", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.8:*:*:*:*:*:*:*", "matchCriteriaId": "345D0848-958F-4B44-8F31-0793C36A5ADD", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "7E179061-FB6A-44AA-8EAC-4916719D9A28", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "58A6B5F4-C799-45C4-9EAD-A55023767033", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "54FDB8B9-5537-4E08-8FA0-931D4BED43E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "E7EB9B1D-C6B0-494B-8A8C-752E5659EA1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "CC13DE1B-1428-4842-9567-BBE5EEF7042F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "215ED879-1E26-4FF4-8857-18499C5DE3A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "72604F3D-2DE8-4BFF-97D5-4AFA64399201", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "8792F7FF-9E56-4201-89FD-F0146D4F0DF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "B12812E8-1C5B-46CF-A266-EE19C5CD3B12", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.9:*:*:*:*:*:*:*", "matchCriteriaId": "4DEAA0E8-746D-446D-AAEA-0ED287766332", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "7D3E14C3-82AE-4D4A-8963-438BECBA5678", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "4DCFB7BB-2879-4EB7-BE1D-163238E313C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "6ED223B6-1864-415C-96D6-64E1EDE4C840", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "14CBC8ED-CC10-40B6-8AA7-9F1342432ECB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "D3417C2E-1117-4FE7-B2FA-74CAB57235B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.5:*:*:*:*:*:*:*", "matchCriteriaId": "07C61DC4-50D5-44B2-92F8-A59C65144108", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.6:*:*:*:*:*:*:*", "matchCriteriaId": "31A37E19-1E07-4FD0-AC6D-6AC3ED954787", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.7:*:*:*:*:*:*:*", "matchCriteriaId": "570C9443-81CE-42AC-B4A6-3B2ABAD97EC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "853DD3E0-668F-4FAC-BA0B-D4E9C416D646", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "CEF70FCA-5DA4-4C0B-B876-0345FA077D44", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "BF0C4F7C-0003-4C77-AE22-A9C2FCBFAF3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "78D12F53-07DE-447D-8403-40EB75B91955", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "19ECB844-F378-4A94-B9FC-A731B8186013", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "3169AA63-79F6-4B89-9405-8F6A2FB6FD64", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "88D1D54C-81A4-44CE-BE12-798CF7DD2CC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "D6615C7D-09B5-4943-A124-2FF9A0F4B927", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "EF18219F-0406-4D46-90DE-EA2A17C8EFF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "87B56DFD-BDA9-4D8B-BE54-BF59B762D574", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "33EA0CA8-468F-4A94-8DA3-5D820AB65973", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA21C847-57ED-4E7D-9366-6038467D9080", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "0450BD04-15D2-4122-A210-6225B89BDA7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "18428805-AEB2-4BA4-9762-906B59CE74D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "AFCCBB15-DFFE-4A57-A029-E57707D15E04", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "0427B5C8-265C-47C3-9BAB-B2A0EAA1DEE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "89A4B962-BE5B-471C-83EF-674525C5AE83", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "7166ECCB-54FB-44EA-BA80-4D2AAF494AF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "6B309C89-99E2-4F0B-976C-95E44A45ADC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "A3DE7EE7-F627-4955-8D95-1F00F1F85C7D", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "D549098D-FE16-4BCB-91C4-D71A8C8D2E9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "57BFA165-6E2E-49AF-9E2D-3D8923CF36C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "F5C67DFF-A1BE-4486-A11F-CD3729927220", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "1D365E6E-8777-4084-BEC8-7CBF4997D976", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "20C4FF28-0DBA-4995-8252-2D62FF896BC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "F80C6B9B-AFCE-46A1-8DEF-51C1B526EB18", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "BF667DB5-F41E-4E73-A01F-4EC3F60BAD0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "D2B144FA-A901-4CDF-AC3D-7F5E820B7A4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "96774635-9A12-4DAB-BCF6-2D678F244CE9", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "EFD2EE7A-36CB-4A26-8EEB-DACA2864D921", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "C3898EBC-75A9-4DDD-A0AF-2CDEC72DAE4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "4267DCE8-985C-416D-A6B7-536585E5A573", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "50E63EDF-FF0A-447C-A3FC-7BA2414C15CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "61DDD4A1-6185-41B6-A715-4C70F0AA2631", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8:*:*:*:*:*:*:*", "matchCriteriaId": "B10A7E3C-07CD-48A6-9075-5314B4E1EEAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "319955A4-27A8-46FF-ACE7-97E6DF27B2DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "925CF3DD-682B-40E6-900C-23F784CD9239", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "16366780-611E-4217-A614-EBA01421D148", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "43AEA36F-E730-4305-9CB6-738A7152F02E", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.5:*:*:*:*:*:*:*", "matchCriteriaId": "2B9536BA-6334-4957-9632-6D64365B88AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.6:*:*:*:*:*:*:*", "matchCriteriaId": "F52FA32B-8048-4FD7-9D20-20DC5E52098B", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.11:*:*:*:*:*:*:*", "matchCriteriaId": "9FA92DF1-3AAD-46AC-A9E4-E9386C977818", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.13:*:*:*:*:*:*:*", "matchCriteriaId": "837D66DB-F9CB-41F1-A091-BCFBAC2F45B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.14:*:*:*:*:*:*:*", "matchCriteriaId": "74D12B67-6E66-419A-A28F-6306402931EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.17:*:*:*:*:*:*:*", "matchCriteriaId": "A71FCBED-B25D-48E3-916C-FBA9E0DE8D12", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "1A17995E-DCAF-465A-8ABD-F1EA0D538784", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "93D03D78-C56E-4189-97FC-916C918EDFEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "19A66C77-041F-4A12-8A36-233A6B50641C", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C945059C-EF39-486D-A804-FBB8704AB927", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "1258CA65-FBC1-4848-A9E5-A8F5E5D6FBD5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.11:*:*:*:*:*:*:*", "matchCriteriaId": "A91C6418-41F0-46EB-ACFC-FCE907F5AA87", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.13:*:*:*:*:*:*:*", "matchCriteriaId": "0C020534-7596-496C-B9B0-739F58F6F4EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "0A77D40C-6FF5-42BD-9EFB-B532824D7606", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "F04C6A76-2718-4DBA-8972-A3EECDDB1A17", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "38ACD96E-5582-4ED0-BBB1-C891094D8217", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "264386DA-747F-492C-B660-D49BE9DB7139", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "DC4066AC-BE10-4189-86F6-BF94443738DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "1C25A146-50D5-4BA2-ABA2-20BF8784D7DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "72E76256-997F-4229-9B03-7BC3074F359D", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "7A717C50-2C5A-4CD1-B2E6-8CDF450940CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "61F908FF-9986-4F71-B0B6-D6A86555EF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "816E9640-A932-4E2F-9793-689F80D2AA89", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in the POP3 client in Fetchmail before 6.2.5.2 allows remote POP3 servers to cause a denial of service and possibly execute arbitrary code via long UIDL responses. NOTE: a typo in an advisory accidentally used the wrong CVE identifier for the Fetchmail issue. This is the correct identifier." } ], "id": "CVE-2005-2335", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-07-27T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://developer.berlios.de/project/shownotes.php?release_id=6617" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://fetchmail.berlios.de/fetchmail-SA-2005-01.txt" }, { "source": "cve@mitre.org", "url": "http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/16176" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21253" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2005/dsa-774" }, { "source": "cve@mitre.org", "url": "http://www.novell.com/linux/security/advisories/2005_18_sr.html" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/18174" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/archives/fedora-announce-list/2005-July/msg00088.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.redhat.com/archives/fedora-announce-list/2005-July/msg00089.html" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/archives/fedora-announce-list/2005-July/msg00104.html" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2005-640.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/435197/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/441856/100/200/threaded" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/14349" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/19289" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA06-214A.html" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2005/1171" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2006/3101" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1038" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1124" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8833" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://developer.berlios.de/project/shownotes.php?release_id=6617" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://fetchmail.berlios.de/fetchmail-SA-2005-01.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/16176" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21253" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2005/dsa-774" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.novell.com/linux/security/advisories/2005_18_sr.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/18174" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/archives/fedora-announce-list/2005-July/msg00088.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.redhat.com/archives/fedora-announce-list/2005-July/msg00089.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/archives/fedora-announce-list/2005-July/msg00104.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2005-640.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/435197/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/441856/100/200/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/14349" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/19289" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA06-214A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2005/1171" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/3101" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1038" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1124" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8833" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-02-08 21:30
Modified
2025-04-11 00:51
Severity ?
Summary
The sdump function in sdump.c in fetchmail 6.3.11, 6.3.12, and 6.3.13, when running in verbose mode on platforms for which char is signed, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an SSL X.509 certificate containing non-printable characters with the high bit set, which triggers a heap-based buffer overflow during escaping.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://mknod.org/svn/fetchmail/branches/BRANCH_6-3/fetchmail-SA-2010-01.txt | ||
cve@mitre.org | http://osvdb.org/62114 | ||
cve@mitre.org | http://secunia.com/advisories/38391 | Vendor Advisory | |
cve@mitre.org | http://www.fetchmail.info/fetchmail-SA-2010-01.txt | Vendor Advisory | |
cve@mitre.org | http://www.mandriva.com/security/advisories?name=MDVSA-2010:037 | ||
cve@mitre.org | http://www.securityfocus.com/bid/38088 | ||
cve@mitre.org | http://www.securitytracker.com/id?1023543 | ||
cve@mitre.org | http://www.vupen.com/english/advisories/2010/0296 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://mknod.org/svn/fetchmail/branches/BRANCH_6-3/fetchmail-SA-2010-01.txt | ||
af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/62114 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/38391 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.fetchmail.info/fetchmail-SA-2010-01.txt | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2010:037 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/38088 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1023543 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/0296 | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.11:*:*:*:*:*:*:*", "matchCriteriaId": "F9882EBF-72D0-4C4F-99BA-929418B5D86B", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.12:*:*:*:*:*:*:*", "matchCriteriaId": "EE474E7E-EEE8-45E4-A995-A437CE7C08CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.13:*:*:*:*:*:*:*", "matchCriteriaId": "2F96F2F2-B6CC-4138-8F9C-4CB906EDACDD", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The sdump function in sdump.c in fetchmail 6.3.11, 6.3.12, and 6.3.13, when running in verbose mode on platforms for which char is signed, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an SSL X.509 certificate containing non-printable characters with the high bit set, which triggers a heap-based buffer overflow during escaping." }, { "lang": "es", "value": "La funci\u00f3n sdump en sdum.c en fetchmail v6.3.11, v6.3.12 y v6.3.13, cuando est\u00e1 ejecutado en modo verbose sobre plataformas para las que los caracteres van firmados, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda de aplicaci\u00f3n) o posiblemente la ejecuci\u00f3n de c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un certificado X.509 que contiene caracteres no imprimibles con el bit m\u00e1s alto asignado, lo que provoca un desbordamiento de b\u00fafer basado en memoria din\u00e1mica (heap) durante el escape." } ], "id": "CVE-2010-0562", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-02-08T21:30:00.483", "references": [ { "source": "cve@mitre.org", "url": "http://mknod.org/svn/fetchmail/branches/BRANCH_6-3/fetchmail-SA-2010-01.txt" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/62114" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/38391" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.fetchmail.info/fetchmail-SA-2010-01.txt" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:037" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/38088" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1023543" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/0296" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://mknod.org/svn/fetchmail/branches/BRANCH_6-3/fetchmail-SA-2010-01.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/62114" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/38391" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.fetchmail.info/fetchmail-SA-2010-01.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:037" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/38088" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1023543" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/0296" } ], "sourceIdentifier": "cve@mitre.org", "vendorComments": [ { "comment": "Not vulnerable. This issue did not affect the versions of fetchmail as shipped with Red Hat Enterprise Linux 3, 4, or 5.", "lastModified": "2010-02-09T00:00:00", "organization": "Red Hat" } ], "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-06-02 19:55
Modified
2025-04-11 00:51
Severity ?
Summary
fetchmail 5.9.9 through 6.3.19 does not properly limit the wait time after issuing a (1) STARTTLS or (2) STLS request, which allows remote servers to cause a denial of service (application hang) by acknowledging the request but not sending additional packets.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://gitorious.org/fetchmail/fetchmail/blobs/legacy_63/fetchmail-SA-2011-01.txt | ||
secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061634.html | ||
secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061672.html | ||
secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061735.html | ||
secalert@redhat.com | http://openwall.com/lists/oss-security/2011/05/30/1 | ||
secalert@redhat.com | http://openwall.com/lists/oss-security/2011/05/31/12 | ||
secalert@redhat.com | http://openwall.com/lists/oss-security/2011/05/31/17 | ||
secalert@redhat.com | http://openwall.com/lists/oss-security/2011/06/01/2 | ||
secalert@redhat.com | http://www.fetchmail.info/fetchmail-SA-2011-01.txt | ||
secalert@redhat.com | http://www.mandriva.com/security/advisories?name=MDVSA-2011:107 | ||
secalert@redhat.com | http://www.securityfocus.com/archive/1/518251/100/0/threaded | ||
secalert@redhat.com | http://www.securityfocus.com/bid/48043 | ||
secalert@redhat.com | http://www.securitytracker.com/id?1025605 | ||
secalert@redhat.com | https://exchange.xforce.ibmcloud.com/vulnerabilities/67700 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://gitorious.org/fetchmail/fetchmail/blobs/legacy_63/fetchmail-SA-2011-01.txt | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061634.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061672.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061735.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://openwall.com/lists/oss-security/2011/05/30/1 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://openwall.com/lists/oss-security/2011/05/31/12 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://openwall.com/lists/oss-security/2011/05/31/17 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://openwall.com/lists/oss-security/2011/06/01/2 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.fetchmail.info/fetchmail-SA-2011-01.txt | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2011:107 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/518251/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/48043 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1025605 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/67700 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
fetchmail | fetchmail | 5.9.9 | |
fetchmail | fetchmail | 5.9.10 | |
fetchmail | fetchmail | 5.9.11 | |
fetchmail | fetchmail | 5.9.13 | |
fetchmail | fetchmail | 6.0.0 | |
fetchmail | fetchmail | 6.1.0 | |
fetchmail | fetchmail | 6.1.3 | |
fetchmail | fetchmail | 6.2.0 | |
fetchmail | fetchmail | 6.2.1 | |
fetchmail | fetchmail | 6.2.2 | |
fetchmail | fetchmail | 6.2.3 | |
fetchmail | fetchmail | 6.2.4 | |
fetchmail | fetchmail | 6.2.5 | |
fetchmail | fetchmail | 6.2.5.1 | |
fetchmail | fetchmail | 6.2.5.2 | |
fetchmail | fetchmail | 6.2.5.4 | |
fetchmail | fetchmail | 6.2.6 | |
fetchmail | fetchmail | 6.2.6 | |
fetchmail | fetchmail | 6.2.6 | |
fetchmail | fetchmail | 6.2.9 | |
fetchmail | fetchmail | 6.2.9 | |
fetchmail | fetchmail | 6.2.9 | |
fetchmail | fetchmail | 6.2.9 | |
fetchmail | fetchmail | 6.2.9 | |
fetchmail | fetchmail | 6.2.9 | |
fetchmail | fetchmail | 6.2.9 | |
fetchmail | fetchmail | 6.3.0 | |
fetchmail | fetchmail | 6.3.1 | |
fetchmail | fetchmail | 6.3.2 | |
fetchmail | fetchmail | 6.3.3 | |
fetchmail | fetchmail | 6.3.4 | |
fetchmail | fetchmail | 6.3.5 | |
fetchmail | fetchmail | 6.3.6 | |
fetchmail | fetchmail | 6.3.6 | |
fetchmail | fetchmail | 6.3.6 | |
fetchmail | fetchmail | 6.3.6 | |
fetchmail | fetchmail | 6.3.6 | |
fetchmail | fetchmail | 6.3.6 | |
fetchmail | fetchmail | 6.3.7 | |
fetchmail | fetchmail | 6.3.8 | |
fetchmail | fetchmail | 6.3.9 | |
fetchmail | fetchmail | 6.3.9 | |
fetchmail | fetchmail | 6.3.10 | |
fetchmail | fetchmail | 6.3.11 | |
fetchmail | fetchmail | 6.3.12 | |
fetchmail | fetchmail | 6.3.13 | |
fetchmail | fetchmail | 6.3.14 | |
fetchmail | fetchmail | 6.3.15 | |
fetchmail | fetchmail | 6.3.16 | |
fetchmail | fetchmail | 6.3.17 | |
fetchmail | fetchmail | 6.3.18 | |
fetchmail | fetchmail | 6.3.19 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "6163235A-1041-40D2-A5FA-1D4B80F40347", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "1258CA65-FBC1-4848-A9E5-A8F5E5D6FBD5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.11:*:*:*:*:*:*:*", "matchCriteriaId": "A91C6418-41F0-46EB-ACFC-FCE907F5AA87", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.13:*:*:*:*:*:*:*", "matchCriteriaId": "0C020534-7596-496C-B9B0-739F58F6F4EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "0A77D40C-6FF5-42BD-9EFB-B532824D7606", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "F04C6A76-2718-4DBA-8972-A3EECDDB1A17", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "38ACD96E-5582-4ED0-BBB1-C891094D8217", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "264386DA-747F-492C-B660-D49BE9DB7139", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "DC4066AC-BE10-4189-86F6-BF94443738DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "1C25A146-50D5-4BA2-ABA2-20BF8784D7DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "72E76256-997F-4229-9B03-7BC3074F359D", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "7A717C50-2C5A-4CD1-B2E6-8CDF450940CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "61F908FF-9986-4F71-B0B6-D6A86555EF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "B0C1F99C-A246-40D3-B84A-5D11FF24AC1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "028F7F83-AF15-443B-A7DB-4E695E62EAFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "B418C3CE-E6E6-401D-AD83-5BB181009A7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.6:pre4:*:*:*:*:*:*", "matchCriteriaId": "8BF06FD2-0A4C-4557-B8EF-F0F021179498", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.6:pre8:*:*:*:*:*:*", "matchCriteriaId": "38C949C2-07A0-4FE4-8FBF-86215CB999CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.6:pre9:*:*:*:*:*:*", "matchCriteriaId": "88B23630-79DD-4B69-BB01-286193BA562E", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc10:*:*:*:*:*:*", "matchCriteriaId": "5FE21564-68C0-4765-BA40-9D3046C4CB14", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc3:*:*:*:*:*:*", "matchCriteriaId": "208102ED-6F22-44C5-BAF1-FD85EACF208F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc4:*:*:*:*:*:*", "matchCriteriaId": "C1CF7767-EB24-44E2-8E59-B4DBC99AFD23", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc5:*:*:*:*:*:*", "matchCriteriaId": "CF3D6D4C-5FD8-4EE1-A34A-99D397F09E85", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc7:*:*:*:*:*:*", "matchCriteriaId": "D63D88C1-B201-4D48-9659-5802DC4FD3EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc8:*:*:*:*:*:*", "matchCriteriaId": "16463B23-E884-467E-9F63-6B57EED39856", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc9:*:*:*:*:*:*", "matchCriteriaId": "9F2C03AF-666D-4AF6-BC69-F8B081EB41AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "84F90AFA-4B13-46A0-89D7-4065300C94C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "5DAD0F05-8B55-43ED-89D5-61A19F41EDFF", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "99053698-7F8B-4E71-8647-1A8B0DF7CEB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "9314F22D-22A8-4374-A2BF-3C64CF1F69BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "816E9640-A932-4E2F-9793-689F80D2AA89", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "5D09BB43-6CBA-499B-91D1-BA256A65E40D", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "ABE76611-08CE-4D85-B57A-021909835A81", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc1:*:*:*:*:*:*", "matchCriteriaId": "B98AFEDF-2BAB-4588-94E0-35AEA5F1B514", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc2:*:*:*:*:*:*", "matchCriteriaId": "4E8BAB5B-4DBC-4D05-B5E2-591573BC05FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc3:*:*:*:*:*:*", "matchCriteriaId": "02F6E729-A2F2-42AC-A941-F57A0A4E84A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc4:*:*:*:*:*:*", "matchCriteriaId": "4143D519-4B49-4E71-8686-FC6A095F0999", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc5:*:*:*:*:*:*", "matchCriteriaId": "387ADB82-4FAD-44DA-ABF2-2F4645C4F1E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "CED4FBCB-B6DF-429D-871D-2A9F7F59E63B", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "237F86BD-82CD-4A37-BF64-F103B1304F0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.9:*:*:*:*:*:*:*", "matchCriteriaId": "667847D9-58DD-4693-B544-593AC6D7746D", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.9:rc2:*:*:*:*:*:*", "matchCriteriaId": "12BA2E29-5547-45F5-BC46-1A7B4A222055", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "C44EA07A-D8A9-4E43-AE2D-B9E41944CB07", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.11:*:*:*:*:*:*:*", "matchCriteriaId": "F9882EBF-72D0-4C4F-99BA-929418B5D86B", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.12:*:*:*:*:*:*:*", "matchCriteriaId": "EE474E7E-EEE8-45E4-A995-A437CE7C08CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.13:*:*:*:*:*:*:*", "matchCriteriaId": "2F96F2F2-B6CC-4138-8F9C-4CB906EDACDD", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "22D580D8-FE6D-40E9-88A5-751A9C8CBAA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.15:*:*:*:*:*:*:*", "matchCriteriaId": "7C7E909A-F8F7-4FB1-8659-41A47C9B7C5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.16:*:*:*:*:*:*:*", "matchCriteriaId": "FDBC29B9-EC76-4F2C-BD00-A57C0D4B99EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.17:*:*:*:*:*:*:*", "matchCriteriaId": "4C8896BE-EF89-4F2C-9356-96745005E3AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.18:*:*:*:*:*:*:*", "matchCriteriaId": "39E249FA-4A13-4945-A632-0A8D24CE594A", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.19:*:*:*:*:*:*:*", "matchCriteriaId": "6126F184-8470-49B7-A801-F671DEF24247", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "fetchmail 5.9.9 through 6.3.19 does not properly limit the wait time after issuing a (1) STARTTLS or (2) STLS request, which allows remote servers to cause a denial of service (application hang) by acknowledging the request but not sending additional packets." }, { "lang": "es", "value": "fetchmail v5.9.9 a la v6.3.19 no limita correctamente el tiempo de espera despu\u00e9s de la emisi\u00f3n de una solicitud (1) STARTTLS o (2) STLS, lo que permite a los servidores remotos provocar una denegaci\u00f3n de servicio (bloqueo de la aplicaci\u00f3n) al hacer un ACK de la solicitud y no enviando posteriormente paquetes adicionales." } ], "id": "CVE-2011-1947", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-06-02T19:55:03.903", "references": [ { "source": "secalert@redhat.com", "url": "http://gitorious.org/fetchmail/fetchmail/blobs/legacy_63/fetchmail-SA-2011-01.txt" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061634.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061672.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061735.html" }, { "source": "secalert@redhat.com", "url": "http://openwall.com/lists/oss-security/2011/05/30/1" }, { "source": "secalert@redhat.com", "url": "http://openwall.com/lists/oss-security/2011/05/31/12" }, { "source": "secalert@redhat.com", "url": "http://openwall.com/lists/oss-security/2011/05/31/17" }, { "source": "secalert@redhat.com", "url": "http://openwall.com/lists/oss-security/2011/06/01/2" }, { "source": "secalert@redhat.com", "url": "http://www.fetchmail.info/fetchmail-SA-2011-01.txt" }, { "source": "secalert@redhat.com", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:107" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/archive/1/518251/100/0/threaded" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/48043" }, { "source": "secalert@redhat.com", "url": "http://www.securitytracker.com/id?1025605" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67700" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://gitorious.org/fetchmail/fetchmail/blobs/legacy_63/fetchmail-SA-2011-01.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061634.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061672.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061735.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://openwall.com/lists/oss-security/2011/05/30/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://openwall.com/lists/oss-security/2011/05/31/12" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://openwall.com/lists/oss-security/2011/05/31/17" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://openwall.com/lists/oss-security/2011/06/01/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.fetchmail.info/fetchmail-SA-2011-01.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:107" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/518251/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/48043" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025605" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67700" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-12-21 05:46
Modified
2025-04-11 00:51
Severity ?
Summary
Fetchmail 5.0.8 through 6.3.21, when using NTLM authentication in debug mode, allows remote NTLM servers to (1) cause a denial of service (crash and delayed delivery of inbound mail) via a crafted NTLM response that triggers an out-of-bounds read in the base64 decoder, or (2) obtain sensitive information from memory via an NTLM Type 2 message with a crafted Target Name structure, which triggers an out-of-bounds read.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2012-October/088836.html | ||
secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2012-October/088871.html | ||
secalert@redhat.com | http://seclists.org/oss-sec/2012/q3/230 | ||
secalert@redhat.com | http://seclists.org/oss-sec/2012/q3/232 | ||
secalert@redhat.com | http://www.fetchmail.info/fetchmail-SA-2012-02.txt | Patch, Vendor Advisory | |
secalert@redhat.com | http://www.securityfocus.com/bid/54987 | ||
secalert@redhat.com | https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2012-October/088836.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2012-October/088871.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/oss-sec/2012/q3/230 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/oss-sec/2012/q3/232 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.fetchmail.info/fetchmail-SA-2012-02.txt | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/54987 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
fetchmail | fetchmail | 5.0.8 | |
fetchmail | fetchmail | 5.1.0 | |
fetchmail | fetchmail | 5.1.4 | |
fetchmail | fetchmail | 5.2.0 | |
fetchmail | fetchmail | 5.2.1 | |
fetchmail | fetchmail | 5.2.3 | |
fetchmail | fetchmail | 5.2.4 | |
fetchmail | fetchmail | 5.2.7 | |
fetchmail | fetchmail | 5.2.8 | |
fetchmail | fetchmail | 5.3.0 | |
fetchmail | fetchmail | 5.3.1 | |
fetchmail | fetchmail | 5.3.3 | |
fetchmail | fetchmail | 5.3.8 | |
fetchmail | fetchmail | 5.4.0 | |
fetchmail | fetchmail | 5.4.3 | |
fetchmail | fetchmail | 5.4.4 | |
fetchmail | fetchmail | 5.4.5 | |
fetchmail | fetchmail | 5.5.0 | |
fetchmail | fetchmail | 5.5.2 | |
fetchmail | fetchmail | 5.5.3 | |
fetchmail | fetchmail | 5.5.5 | |
fetchmail | fetchmail | 5.5.6 | |
fetchmail | fetchmail | 5.6.0 | |
fetchmail | fetchmail | 5.7.0 | |
fetchmail | fetchmail | 5.7.2 | |
fetchmail | fetchmail | 5.7.4 | |
fetchmail | fetchmail | 5.8 | |
fetchmail | fetchmail | 5.8.1 | |
fetchmail | fetchmail | 5.8.2 | |
fetchmail | fetchmail | 5.8.3 | |
fetchmail | fetchmail | 5.8.4 | |
fetchmail | fetchmail | 5.8.5 | |
fetchmail | fetchmail | 5.8.6 | |
fetchmail | fetchmail | 5.8.11 | |
fetchmail | fetchmail | 5.8.13 | |
fetchmail | fetchmail | 5.8.14 | |
fetchmail | fetchmail | 5.8.17 | |
fetchmail | fetchmail | 5.9.0 | |
fetchmail | fetchmail | 5.9.4 | |
fetchmail | fetchmail | 5.9.5 | |
fetchmail | fetchmail | 5.9.8 | |
fetchmail | fetchmail | 5.9.10 | |
fetchmail | fetchmail | 5.9.11 | |
fetchmail | fetchmail | 5.9.13 | |
fetchmail | fetchmail | 6.0.0 | |
fetchmail | fetchmail | 6.1.0 | |
fetchmail | fetchmail | 6.1.3 | |
fetchmail | fetchmail | 6.2.0 | |
fetchmail | fetchmail | 6.2.1 | |
fetchmail | fetchmail | 6.2.2 | |
fetchmail | fetchmail | 6.2.3 | |
fetchmail | fetchmail | 6.2.4 | |
fetchmail | fetchmail | 6.2.5 | |
fetchmail | fetchmail | 6.2.5.1 | |
fetchmail | fetchmail | 6.2.5.2 | |
fetchmail | fetchmail | 6.2.5.4 | |
fetchmail | fetchmail | 6.2.6 | |
fetchmail | fetchmail | 6.2.6 | |
fetchmail | fetchmail | 6.2.6 | |
fetchmail | fetchmail | 6.2.9 | |
fetchmail | fetchmail | 6.2.9 | |
fetchmail | fetchmail | 6.2.9 | |
fetchmail | fetchmail | 6.2.9 | |
fetchmail | fetchmail | 6.2.9 | |
fetchmail | fetchmail | 6.2.9 | |
fetchmail | fetchmail | 6.2.9 | |
fetchmail | fetchmail | 6.3.0 | |
fetchmail | fetchmail | 6.3.1 | |
fetchmail | fetchmail | 6.3.2 | |
fetchmail | fetchmail | 6.3.3 | |
fetchmail | fetchmail | 6.3.4 | |
fetchmail | fetchmail | 6.3.5 | |
fetchmail | fetchmail | 6.3.6 | |
fetchmail | fetchmail | 6.3.6 | |
fetchmail | fetchmail | 6.3.6 | |
fetchmail | fetchmail | 6.3.6 | |
fetchmail | fetchmail | 6.3.6 | |
fetchmail | fetchmail | 6.3.6 | |
fetchmail | fetchmail | 6.3.7 | |
fetchmail | fetchmail | 6.3.8 | |
fetchmail | fetchmail | 6.3.9 | |
fetchmail | fetchmail | 6.3.9 | |
fetchmail | fetchmail | 6.3.10 | |
fetchmail | fetchmail | 6.3.11 | |
fetchmail | fetchmail | 6.3.12 | |
fetchmail | fetchmail | 6.3.13 | |
fetchmail | fetchmail | 6.3.14 | |
fetchmail | fetchmail | 6.3.15 | |
fetchmail | fetchmail | 6.3.16 | |
fetchmail | fetchmail | 6.3.17 | |
fetchmail | fetchmail | 6.3.18 | |
fetchmail | fetchmail | 6.3.19 | |
fetchmail | fetchmail | 6.3.21 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "EF18219F-0406-4D46-90DE-EA2A17C8EFF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "87B56DFD-BDA9-4D8B-BE54-BF59B762D574", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "33EA0CA8-468F-4A94-8DA3-5D820AB65973", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA21C847-57ED-4E7D-9366-6038467D9080", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "0450BD04-15D2-4122-A210-6225B89BDA7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "18428805-AEB2-4BA4-9762-906B59CE74D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "AFCCBB15-DFFE-4A57-A029-E57707D15E04", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "0427B5C8-265C-47C3-9BAB-B2A0EAA1DEE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "89A4B962-BE5B-471C-83EF-674525C5AE83", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "7166ECCB-54FB-44EA-BA80-4D2AAF494AF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "6B309C89-99E2-4F0B-976C-95E44A45ADC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "A3DE7EE7-F627-4955-8D95-1F00F1F85C7D", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "D549098D-FE16-4BCB-91C4-D71A8C8D2E9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "57BFA165-6E2E-49AF-9E2D-3D8923CF36C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "F5C67DFF-A1BE-4486-A11F-CD3729927220", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "1D365E6E-8777-4084-BEC8-7CBF4997D976", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "20C4FF28-0DBA-4995-8252-2D62FF896BC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "F80C6B9B-AFCE-46A1-8DEF-51C1B526EB18", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "BF667DB5-F41E-4E73-A01F-4EC3F60BAD0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "D2B144FA-A901-4CDF-AC3D-7F5E820B7A4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "96774635-9A12-4DAB-BCF6-2D678F244CE9", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "EFD2EE7A-36CB-4A26-8EEB-DACA2864D921", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "C3898EBC-75A9-4DDD-A0AF-2CDEC72DAE4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "4267DCE8-985C-416D-A6B7-536585E5A573", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "50E63EDF-FF0A-447C-A3FC-7BA2414C15CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "61DDD4A1-6185-41B6-A715-4C70F0AA2631", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8:*:*:*:*:*:*:*", "matchCriteriaId": "B10A7E3C-07CD-48A6-9075-5314B4E1EEAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "319955A4-27A8-46FF-ACE7-97E6DF27B2DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "925CF3DD-682B-40E6-900C-23F784CD9239", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "16366780-611E-4217-A614-EBA01421D148", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "43AEA36F-E730-4305-9CB6-738A7152F02E", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.5:*:*:*:*:*:*:*", "matchCriteriaId": "2B9536BA-6334-4957-9632-6D64365B88AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.6:*:*:*:*:*:*:*", "matchCriteriaId": "F52FA32B-8048-4FD7-9D20-20DC5E52098B", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.11:*:*:*:*:*:*:*", "matchCriteriaId": "9FA92DF1-3AAD-46AC-A9E4-E9386C977818", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.13:*:*:*:*:*:*:*", "matchCriteriaId": "837D66DB-F9CB-41F1-A091-BCFBAC2F45B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.14:*:*:*:*:*:*:*", "matchCriteriaId": "74D12B67-6E66-419A-A28F-6306402931EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.17:*:*:*:*:*:*:*", "matchCriteriaId": "A71FCBED-B25D-48E3-916C-FBA9E0DE8D12", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "1A17995E-DCAF-465A-8ABD-F1EA0D538784", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "93D03D78-C56E-4189-97FC-916C918EDFEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "19A66C77-041F-4A12-8A36-233A6B50641C", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C945059C-EF39-486D-A804-FBB8704AB927", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "1258CA65-FBC1-4848-A9E5-A8F5E5D6FBD5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.11:*:*:*:*:*:*:*", "matchCriteriaId": "A91C6418-41F0-46EB-ACFC-FCE907F5AA87", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.13:*:*:*:*:*:*:*", "matchCriteriaId": "0C020534-7596-496C-B9B0-739F58F6F4EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "0A77D40C-6FF5-42BD-9EFB-B532824D7606", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "F04C6A76-2718-4DBA-8972-A3EECDDB1A17", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "38ACD96E-5582-4ED0-BBB1-C891094D8217", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "264386DA-747F-492C-B660-D49BE9DB7139", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "DC4066AC-BE10-4189-86F6-BF94443738DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "1C25A146-50D5-4BA2-ABA2-20BF8784D7DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "72E76256-997F-4229-9B03-7BC3074F359D", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "7A717C50-2C5A-4CD1-B2E6-8CDF450940CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "61F908FF-9986-4F71-B0B6-D6A86555EF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "B0C1F99C-A246-40D3-B84A-5D11FF24AC1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "028F7F83-AF15-443B-A7DB-4E695E62EAFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "B418C3CE-E6E6-401D-AD83-5BB181009A7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.6:pre4:*:*:*:*:*:*", "matchCriteriaId": "8BF06FD2-0A4C-4557-B8EF-F0F021179498", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.6:pre8:*:*:*:*:*:*", "matchCriteriaId": "38C949C2-07A0-4FE4-8FBF-86215CB999CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.6:pre9:*:*:*:*:*:*", "matchCriteriaId": "88B23630-79DD-4B69-BB01-286193BA562E", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc10:*:*:*:*:*:*", "matchCriteriaId": "5FE21564-68C0-4765-BA40-9D3046C4CB14", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc3:*:*:*:*:*:*", "matchCriteriaId": "208102ED-6F22-44C5-BAF1-FD85EACF208F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc4:*:*:*:*:*:*", "matchCriteriaId": "C1CF7767-EB24-44E2-8E59-B4DBC99AFD23", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc5:*:*:*:*:*:*", "matchCriteriaId": "CF3D6D4C-5FD8-4EE1-A34A-99D397F09E85", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc7:*:*:*:*:*:*", "matchCriteriaId": "D63D88C1-B201-4D48-9659-5802DC4FD3EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc8:*:*:*:*:*:*", "matchCriteriaId": "16463B23-E884-467E-9F63-6B57EED39856", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc9:*:*:*:*:*:*", "matchCriteriaId": "9F2C03AF-666D-4AF6-BC69-F8B081EB41AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "84F90AFA-4B13-46A0-89D7-4065300C94C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "5DAD0F05-8B55-43ED-89D5-61A19F41EDFF", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "99053698-7F8B-4E71-8647-1A8B0DF7CEB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "9314F22D-22A8-4374-A2BF-3C64CF1F69BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "816E9640-A932-4E2F-9793-689F80D2AA89", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "5D09BB43-6CBA-499B-91D1-BA256A65E40D", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "ABE76611-08CE-4D85-B57A-021909835A81", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc1:*:*:*:*:*:*", "matchCriteriaId": "B98AFEDF-2BAB-4588-94E0-35AEA5F1B514", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc2:*:*:*:*:*:*", "matchCriteriaId": "4E8BAB5B-4DBC-4D05-B5E2-591573BC05FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc3:*:*:*:*:*:*", "matchCriteriaId": "02F6E729-A2F2-42AC-A941-F57A0A4E84A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc4:*:*:*:*:*:*", "matchCriteriaId": "4143D519-4B49-4E71-8686-FC6A095F0999", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc5:*:*:*:*:*:*", "matchCriteriaId": "387ADB82-4FAD-44DA-ABF2-2F4645C4F1E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "CED4FBCB-B6DF-429D-871D-2A9F7F59E63B", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "237F86BD-82CD-4A37-BF64-F103B1304F0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.9:*:*:*:*:*:*:*", "matchCriteriaId": "667847D9-58DD-4693-B544-593AC6D7746D", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.9:rc2:*:*:*:*:*:*", "matchCriteriaId": "12BA2E29-5547-45F5-BC46-1A7B4A222055", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "C44EA07A-D8A9-4E43-AE2D-B9E41944CB07", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.11:*:*:*:*:*:*:*", "matchCriteriaId": "F9882EBF-72D0-4C4F-99BA-929418B5D86B", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.12:*:*:*:*:*:*:*", "matchCriteriaId": "EE474E7E-EEE8-45E4-A995-A437CE7C08CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.13:*:*:*:*:*:*:*", "matchCriteriaId": "2F96F2F2-B6CC-4138-8F9C-4CB906EDACDD", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "22D580D8-FE6D-40E9-88A5-751A9C8CBAA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.15:*:*:*:*:*:*:*", "matchCriteriaId": "7C7E909A-F8F7-4FB1-8659-41A47C9B7C5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.16:*:*:*:*:*:*:*", "matchCriteriaId": "FDBC29B9-EC76-4F2C-BD00-A57C0D4B99EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.17:*:*:*:*:*:*:*", "matchCriteriaId": "4C8896BE-EF89-4F2C-9356-96745005E3AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.18:*:*:*:*:*:*:*", "matchCriteriaId": "39E249FA-4A13-4945-A632-0A8D24CE594A", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.19:*:*:*:*:*:*:*", "matchCriteriaId": "6126F184-8470-49B7-A801-F671DEF24247", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.21:*:*:*:*:*:*:*", "matchCriteriaId": "66992896-2958-47CA-A70A-A8B0B9B5FBA6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Fetchmail 5.0.8 through 6.3.21, when using NTLM authentication in debug mode, allows remote NTLM servers to (1) cause a denial of service (crash and delayed delivery of inbound mail) via a crafted NTLM response that triggers an out-of-bounds read in the base64 decoder, or (2) obtain sensitive information from memory via an NTLM Type 2 message with a crafted Target Name structure, which triggers an out-of-bounds read." }, { "lang": "es", "value": "Fetchmail v5.0.8 hasta v6.3.21, cuando se utiliza la autenticaci\u00f3n NTLM en modo de depuraci\u00f3n, permite a servidores remotos NTLM (1) causar una denegaci\u00f3n de servicio (ca\u00edda y retraso en la entrega de correo entrante) a trav\u00e9s de una respuesta NTLM manipulada que desencadena una lectura fuera de limites en el decodificador base64, o (2) obtener informaci\u00f3n confidencial de la memoria a trav\u00e9s de un mensaje tipo NTLM 2 con una estructura Target Name modificada, lo que desencadena una lectura fuera de limites." } ], "id": "CVE-2012-3482", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-12-21T05:46:16.167", "references": [ { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-October/088836.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-October/088871.html" }, { "source": "secalert@redhat.com", "url": "http://seclists.org/oss-sec/2012/q3/230" }, { "source": "secalert@redhat.com", "url": "http://seclists.org/oss-sec/2012/q3/232" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.fetchmail.info/fetchmail-SA-2012-02.txt" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/54987" }, { "source": "secalert@redhat.com", "url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-October/088836.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-October/088871.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/oss-sec/2012/q3/230" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/oss-sec/2012/q3/232" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.fetchmail.info/fetchmail-SA-2012-02.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/54987" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2003-11-17 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Fetchmail 6.2.4 and earlier does not properly allocate memory for long lines, which allows remote attackers to cause a denial of service (crash) via a certain email.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | ftp://ftp.sco.com/pub/updates/OpenLinux/3.1.1/Server/CSSA-2004-004.0/CSSA-2004-004.0.txt | ||
cve@mitre.org | http://marc.info/?l=bugtraq&m=107731542827401&w=2 | ||
cve@mitre.org | http://security.gentoo.org/glsa/glsa-200403-10.xml | Vendor Advisory | |
cve@mitre.org | http://www.mandriva.com/security/advisories?name=MDKSA-2003:101 | ||
cve@mitre.org | http://www.securityfocus.com/advisories/5987 | ||
cve@mitre.org | http://www.securityfocus.com/bid/8843 | Patch, Vendor Advisory | |
cve@mitre.org | http://www.turbolinux.com/security/TLSA-2003-61.txt | ||
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/13450 | ||
af854a3a-2127-422b-91ae-364da2661108 | ftp://ftp.sco.com/pub/updates/OpenLinux/3.1.1/Server/CSSA-2004-004.0/CSSA-2004-004.0.txt | ||
af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=107731542827401&w=2 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-200403-10.xml | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDKSA-2003:101 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/advisories/5987 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/8843 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.turbolinux.com/security/TLSA-2003-61.txt | ||
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/13450 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
fetchmail | fetchmail | * | |
fetchmail | fetchmail | 4.5.1 | |
fetchmail | fetchmail | 4.5.2 | |
fetchmail | fetchmail | 4.5.3 | |
fetchmail | fetchmail | 4.5.4 | |
fetchmail | fetchmail | 4.5.5 | |
fetchmail | fetchmail | 4.5.6 | |
fetchmail | fetchmail | 4.5.7 | |
fetchmail | fetchmail | 4.5.8 | |
fetchmail | fetchmail | 4.6.0 | |
fetchmail | fetchmail | 4.6.1 | |
fetchmail | fetchmail | 4.6.2 | |
fetchmail | fetchmail | 4.6.3 | |
fetchmail | fetchmail | 4.6.4 | |
fetchmail | fetchmail | 4.6.5 | |
fetchmail | fetchmail | 4.6.6 | |
fetchmail | fetchmail | 4.6.7 | |
fetchmail | fetchmail | 4.6.8 | |
fetchmail | fetchmail | 4.6.9 | |
fetchmail | fetchmail | 4.7.0 | |
fetchmail | fetchmail | 4.7.1 | |
fetchmail | fetchmail | 4.7.2 | |
fetchmail | fetchmail | 4.7.3 | |
fetchmail | fetchmail | 4.7.4 | |
fetchmail | fetchmail | 4.7.5 | |
fetchmail | fetchmail | 4.7.6 | |
fetchmail | fetchmail | 4.7.7 | |
fetchmail | fetchmail | 5.0.0 | |
fetchmail | fetchmail | 5.0.1 | |
fetchmail | fetchmail | 5.0.2 | |
fetchmail | fetchmail | 5.0.3 | |
fetchmail | fetchmail | 5.0.4 | |
fetchmail | fetchmail | 5.0.5 | |
fetchmail | fetchmail | 5.0.6 | |
fetchmail | fetchmail | 5.0.7 | |
fetchmail | fetchmail | 5.0.8 | |
fetchmail | fetchmail | 5.1.0 | |
fetchmail | fetchmail | 5.1.4 | |
fetchmail | fetchmail | 5.2.0 | |
fetchmail | fetchmail | 5.2.1 | |
fetchmail | fetchmail | 5.2.3 | |
fetchmail | fetchmail | 5.2.4 | |
fetchmail | fetchmail | 5.2.7 | |
fetchmail | fetchmail | 5.2.8 | |
fetchmail | fetchmail | 5.3.0 | |
fetchmail | fetchmail | 5.3.1 | |
fetchmail | fetchmail | 5.3.3 | |
fetchmail | fetchmail | 5.3.8 | |
fetchmail | fetchmail | 5.4.0 | |
fetchmail | fetchmail | 5.4.3 | |
fetchmail | fetchmail | 5.4.4 | |
fetchmail | fetchmail | 5.4.5 | |
fetchmail | fetchmail | 5.5.0 | |
fetchmail | fetchmail | 5.5.2 | |
fetchmail | fetchmail | 5.5.3 | |
fetchmail | fetchmail | 5.5.5 | |
fetchmail | fetchmail | 5.5.6 | |
fetchmail | fetchmail | 5.6.0 | |
fetchmail | fetchmail | 5.7.0 | |
fetchmail | fetchmail | 5.7.2 | |
fetchmail | fetchmail | 5.7.4 | |
fetchmail | fetchmail | 5.8 | |
fetchmail | fetchmail | 5.8.1 | |
fetchmail | fetchmail | 5.8.2 | |
fetchmail | fetchmail | 5.8.3 | |
fetchmail | fetchmail | 5.8.4 | |
fetchmail | fetchmail | 5.8.5 | |
fetchmail | fetchmail | 5.8.6 | |
fetchmail | fetchmail | 5.8.11 | |
fetchmail | fetchmail | 5.8.13 | |
fetchmail | fetchmail | 5.8.14 | |
fetchmail | fetchmail | 5.8.17 | |
fetchmail | fetchmail | 5.9.0 | |
fetchmail | fetchmail | 5.9.4 | |
fetchmail | fetchmail | 5.9.5 | |
fetchmail | fetchmail | 5.9.8 | |
fetchmail | fetchmail | 5.9.10 | |
fetchmail | fetchmail | 5.9.11 | |
fetchmail | fetchmail | 5.9.13 | |
fetchmail | fetchmail | 6.0.0 | |
fetchmail | fetchmail | 6.1.0 | |
fetchmail | fetchmail | 6.1.3 | |
fetchmail | fetchmail | 6.2.0 | |
fetchmail | fetchmail | 6.2.1 | |
fetchmail | fetchmail | 6.2.2 | |
fetchmail | fetchmail | 6.2.3 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fetchmail:fetchmail:*:*:*:*:*:*:*:*", "matchCriteriaId": "B0759E61-47F6-402E-A452-C017B947696A", "versionEndIncluding": "6.2.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "BF519D04-7596-42C6-A1D8-FC1018D1A414", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "9AFEC739-BDFA-4D14-9A04-96FFB71AE330", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "E1923712-7B88-483E-B38A-0EA6FB38EB38", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "C9608A96-D131-401B-B041-09ADEEB59354", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "F4555DBB-B63B-4637-86A9-399B34B27D14", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "D8AB8504-8CD1-4013-9413-1378F3BAE0AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "3DC47DA9-D110-4E6B-9F5B-D17ECB942B40", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.8:*:*:*:*:*:*:*", "matchCriteriaId": "345D0848-958F-4B44-8F31-0793C36A5ADD", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "7E179061-FB6A-44AA-8EAC-4916719D9A28", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "58A6B5F4-C799-45C4-9EAD-A55023767033", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "54FDB8B9-5537-4E08-8FA0-931D4BED43E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "E7EB9B1D-C6B0-494B-8A8C-752E5659EA1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "CC13DE1B-1428-4842-9567-BBE5EEF7042F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "215ED879-1E26-4FF4-8857-18499C5DE3A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "72604F3D-2DE8-4BFF-97D5-4AFA64399201", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "8792F7FF-9E56-4201-89FD-F0146D4F0DF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "B12812E8-1C5B-46CF-A266-EE19C5CD3B12", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.9:*:*:*:*:*:*:*", "matchCriteriaId": "4DEAA0E8-746D-446D-AAEA-0ED287766332", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "7D3E14C3-82AE-4D4A-8963-438BECBA5678", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "4DCFB7BB-2879-4EB7-BE1D-163238E313C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "6ED223B6-1864-415C-96D6-64E1EDE4C840", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "14CBC8ED-CC10-40B6-8AA7-9F1342432ECB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "D3417C2E-1117-4FE7-B2FA-74CAB57235B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.5:*:*:*:*:*:*:*", "matchCriteriaId": "07C61DC4-50D5-44B2-92F8-A59C65144108", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.6:*:*:*:*:*:*:*", "matchCriteriaId": "31A37E19-1E07-4FD0-AC6D-6AC3ED954787", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.7:*:*:*:*:*:*:*", "matchCriteriaId": "570C9443-81CE-42AC-B4A6-3B2ABAD97EC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "853DD3E0-668F-4FAC-BA0B-D4E9C416D646", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "CEF70FCA-5DA4-4C0B-B876-0345FA077D44", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "BF0C4F7C-0003-4C77-AE22-A9C2FCBFAF3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "78D12F53-07DE-447D-8403-40EB75B91955", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "19ECB844-F378-4A94-B9FC-A731B8186013", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "3169AA63-79F6-4B89-9405-8F6A2FB6FD64", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "88D1D54C-81A4-44CE-BE12-798CF7DD2CC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "D6615C7D-09B5-4943-A124-2FF9A0F4B927", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "EF18219F-0406-4D46-90DE-EA2A17C8EFF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "87B56DFD-BDA9-4D8B-BE54-BF59B762D574", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "33EA0CA8-468F-4A94-8DA3-5D820AB65973", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA21C847-57ED-4E7D-9366-6038467D9080", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "0450BD04-15D2-4122-A210-6225B89BDA7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "18428805-AEB2-4BA4-9762-906B59CE74D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "AFCCBB15-DFFE-4A57-A029-E57707D15E04", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "0427B5C8-265C-47C3-9BAB-B2A0EAA1DEE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "89A4B962-BE5B-471C-83EF-674525C5AE83", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "7166ECCB-54FB-44EA-BA80-4D2AAF494AF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "6B309C89-99E2-4F0B-976C-95E44A45ADC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "A3DE7EE7-F627-4955-8D95-1F00F1F85C7D", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "D549098D-FE16-4BCB-91C4-D71A8C8D2E9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "57BFA165-6E2E-49AF-9E2D-3D8923CF36C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "F5C67DFF-A1BE-4486-A11F-CD3729927220", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "1D365E6E-8777-4084-BEC8-7CBF4997D976", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "20C4FF28-0DBA-4995-8252-2D62FF896BC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "F80C6B9B-AFCE-46A1-8DEF-51C1B526EB18", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "BF667DB5-F41E-4E73-A01F-4EC3F60BAD0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "D2B144FA-A901-4CDF-AC3D-7F5E820B7A4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "96774635-9A12-4DAB-BCF6-2D678F244CE9", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "EFD2EE7A-36CB-4A26-8EEB-DACA2864D921", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "C3898EBC-75A9-4DDD-A0AF-2CDEC72DAE4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "4267DCE8-985C-416D-A6B7-536585E5A573", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "50E63EDF-FF0A-447C-A3FC-7BA2414C15CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "61DDD4A1-6185-41B6-A715-4C70F0AA2631", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8:*:*:*:*:*:*:*", "matchCriteriaId": "B10A7E3C-07CD-48A6-9075-5314B4E1EEAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "319955A4-27A8-46FF-ACE7-97E6DF27B2DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "925CF3DD-682B-40E6-900C-23F784CD9239", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "16366780-611E-4217-A614-EBA01421D148", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "43AEA36F-E730-4305-9CB6-738A7152F02E", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.5:*:*:*:*:*:*:*", "matchCriteriaId": "2B9536BA-6334-4957-9632-6D64365B88AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.6:*:*:*:*:*:*:*", "matchCriteriaId": "F52FA32B-8048-4FD7-9D20-20DC5E52098B", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.11:*:*:*:*:*:*:*", "matchCriteriaId": "9FA92DF1-3AAD-46AC-A9E4-E9386C977818", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.13:*:*:*:*:*:*:*", "matchCriteriaId": "837D66DB-F9CB-41F1-A091-BCFBAC2F45B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.14:*:*:*:*:*:*:*", "matchCriteriaId": "74D12B67-6E66-419A-A28F-6306402931EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.17:*:*:*:*:*:*:*", "matchCriteriaId": "A71FCBED-B25D-48E3-916C-FBA9E0DE8D12", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "1A17995E-DCAF-465A-8ABD-F1EA0D538784", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "93D03D78-C56E-4189-97FC-916C918EDFEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "19A66C77-041F-4A12-8A36-233A6B50641C", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C945059C-EF39-486D-A804-FBB8704AB927", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "1258CA65-FBC1-4848-A9E5-A8F5E5D6FBD5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.11:*:*:*:*:*:*:*", "matchCriteriaId": "A91C6418-41F0-46EB-ACFC-FCE907F5AA87", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.13:*:*:*:*:*:*:*", "matchCriteriaId": "0C020534-7596-496C-B9B0-739F58F6F4EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "0A77D40C-6FF5-42BD-9EFB-B532824D7606", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "F04C6A76-2718-4DBA-8972-A3EECDDB1A17", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "38ACD96E-5582-4ED0-BBB1-C891094D8217", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "264386DA-747F-492C-B660-D49BE9DB7139", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "DC4066AC-BE10-4189-86F6-BF94443738DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "1C25A146-50D5-4BA2-ABA2-20BF8784D7DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "72E76256-997F-4229-9B03-7BC3074F359D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Fetchmail 6.2.4 and earlier does not properly allocate memory for long lines, which allows remote attackers to cause a denial of service (crash) via a certain email." }, { "lang": "es", "value": "Fetchmail 6.2.4 y anteriores no asigna memoria para lineas largas adecuadamente, lo que permite a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda) mediante cierto correo electr\u00f3nico." } ], "id": "CVE-2003-0792", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2003-11-17T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "ftp://ftp.sco.com/pub/updates/OpenLinux/3.1.1/Server/CSSA-2004-004.0/CSSA-2004-004.0.txt" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=107731542827401\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://security.gentoo.org/glsa/glsa-200403-10.xml" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:101" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/advisories/5987" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/8843" }, { "source": "cve@mitre.org", "url": "http://www.turbolinux.com/security/TLSA-2003-61.txt" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/13450" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "ftp://ftp.sco.com/pub/updates/OpenLinux/3.1.1/Server/CSSA-2004-004.0/CSSA-2004-004.0.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=107731542827401\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://security.gentoo.org/glsa/glsa-200403-10.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:101" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/advisories/5987" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/8843" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.turbolinux.com/security/TLSA-2003-61.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/13450" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-12-31 05:00
Modified
2025-04-09 00:30
Severity ?
Summary
fetchmail 6.3.5 and 6.3.6 before 6.3.6-rc4, when refusing a message delivered via the mda option, allows remote attackers to cause a denial of service (crash) via unknown vectors that trigger a NULL pointer dereference when calling the (1) ferror or (2) fflush functions.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://fedoranews.org/cms/node/2429 | ||
cve@mitre.org | http://fetchmail.berlios.de/fetchmail-SA-2006-03.txt | ||
cve@mitre.org | http://osvdb.org/31836 | ||
cve@mitre.org | http://secunia.com/advisories/23631 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/23804 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/23838 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/23923 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/24151 | Vendor Advisory | |
cve@mitre.org | http://security.gentoo.org/glsa/glsa-200701-13.xml | ||
cve@mitre.org | http://securitytracker.com/id?1017479 | ||
cve@mitre.org | http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.517995 | ||
cve@mitre.org | http://www.novell.com/linux/security/advisories/2007_4_sr.html | ||
cve@mitre.org | http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.004.html | ||
cve@mitre.org | http://www.securityfocus.com/archive/1/456114/100/0/threaded | ||
cve@mitre.org | http://www.securityfocus.com/bid/21902 | Patch | |
cve@mitre.org | http://www.trustix.org/errata/2007/0007 | ||
cve@mitre.org | http://www.vupen.com/english/advisories/2007/0087 | ||
cve@mitre.org | http://www.vupen.com/english/advisories/2007/0088 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://fedoranews.org/cms/node/2429 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://fetchmail.berlios.de/fetchmail-SA-2006-03.txt | ||
af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/31836 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/23631 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/23804 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/23838 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/23923 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/24151 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-200701-13.xml | ||
af854a3a-2127-422b-91ae-364da2661108 | http://securitytracker.com/id?1017479 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.517995 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.novell.com/linux/security/advisories/2007_4_sr.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.004.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/456114/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/21902 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.trustix.org/errata/2007/0007 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2007/0087 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2007/0088 |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "5D09BB43-6CBA-499B-91D1-BA256A65E40D", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc1:*:*:*:*:*:*", "matchCriteriaId": "B98AFEDF-2BAB-4588-94E0-35AEA5F1B514", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc2:*:*:*:*:*:*", "matchCriteriaId": "4E8BAB5B-4DBC-4D05-B5E2-591573BC05FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc3:*:*:*:*:*:*", "matchCriteriaId": "02F6E729-A2F2-42AC-A941-F57A0A4E84A0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "fetchmail 6.3.5 and 6.3.6 before 6.3.6-rc4, when refusing a message delivered via the mda option, allows remote attackers to cause a denial of service (crash) via unknown vectors that trigger a NULL pointer dereference when calling the (1) ferror or (2) fflush functions." }, { "lang": "es", "value": "fetchmail 6.3.5 y 6.3.6-rc4, cuando rechazan un mensaje entregado mediante la opci\u00f3n mda, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) mediante vectores desconocidos que disparan una referencia a puntero nulo cuando se llama a las funciones (1) ferror o (2) fflush." } ], "id": "CVE-2006-5974", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://fedoranews.org/cms/node/2429" }, { "source": "cve@mitre.org", "url": "http://fetchmail.berlios.de/fetchmail-SA-2006-03.txt" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/31836" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/23631" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/23804" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/23838" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/23923" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/24151" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200701-13.xml" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1017479" }, { "source": "cve@mitre.org", "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.517995" }, { "source": "cve@mitre.org", "url": "http://www.novell.com/linux/security/advisories/2007_4_sr.html" }, { "source": "cve@mitre.org", "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.004.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/456114/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/21902" }, { "source": "cve@mitre.org", "url": "http://www.trustix.org/errata/2007/0007" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/0087" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/0088" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://fedoranews.org/cms/node/2429" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://fetchmail.berlios.de/fetchmail-SA-2006-03.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/31836" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/23631" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/23804" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/23838" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/23923" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/24151" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200701-13.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1017479" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.517995" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.novell.com/linux/security/advisories/2007_4_sr.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.004.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/456114/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/21902" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.trustix.org/errata/2007/0007" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/0087" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/0088" } ], "sourceIdentifier": "cve@mitre.org", "vendorComments": [ { "comment": "Not vulnerable. This issue does not affect the versions of fetchmail distributed with Red Hat Enterprise Linux 2.1, 3, or 4.", "lastModified": "2007-01-11T00:00:00", "organization": "Red Hat" } ], "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2008-06-16 21:41
Modified
2025-04-09 00:30
Severity ?
Summary
fetchmail 6.3.8 and earlier, when running in -v -v (aka verbose) mode, allows remote attackers to cause a denial of service (crash and persistent mail failure) via a malformed mail message with long headers, which triggers an erroneous dereference when using vsnprintf to format log messages.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html | ||
cve@mitre.org | http://secunia.com/advisories/30742 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/30895 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/31262 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/31287 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/33937 | Vendor Advisory | |
cve@mitre.org | http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.495740 | ||
cve@mitre.org | http://support.apple.com/kb/HT3438 | ||
cve@mitre.org | http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0235 | ||
cve@mitre.org | http://www.fetchmail.info/fetchmail-SA-2008-01.txt | ||
cve@mitre.org | http://www.mandriva.com/security/advisories?name=MDVSA-2008:117 | ||
cve@mitre.org | http://www.openwall.com/lists/oss-security/2008/06/13/1 | ||
cve@mitre.org | http://www.openwall.com/lists/oss-security/2021/08/09/1 | ||
cve@mitre.org | http://www.securityfocus.com/archive/1/493391/100/0/threaded | ||
cve@mitre.org | http://www.securityfocus.com/archive/1/494865/100/0/threaded | ||
cve@mitre.org | http://www.securityfocus.com/bid/29705 | ||
cve@mitre.org | http://www.securitytracker.com/id?1020298 | ||
cve@mitre.org | http://www.vupen.com/english/advisories/2008/1860/references | ||
cve@mitre.org | http://www.vupen.com/english/advisories/2009/0422 | ||
cve@mitre.org | https://bugzilla.novell.com/show_bug.cgi?id=354291 | ||
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/43121 | ||
cve@mitre.org | https://issues.rpath.com/browse/RPL-2623 | ||
cve@mitre.org | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10950 | ||
cve@mitre.org | https://www.redhat.com/archives/fedora-package-announce/2008-June/msg01091.html | ||
cve@mitre.org | https://www.redhat.com/archives/fedora-package-announce/2008-June/msg01095.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/30742 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/30895 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/31262 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/31287 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/33937 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.495740 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://support.apple.com/kb/HT3438 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0235 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.fetchmail.info/fetchmail-SA-2008-01.txt | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2008:117 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2008/06/13/1 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2021/08/09/1 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/493391/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/494865/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/29705 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1020298 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/1860/references | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2009/0422 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.novell.com/show_bug.cgi?id=354291 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/43121 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://issues.rpath.com/browse/RPL-2623 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10950 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.redhat.com/archives/fedora-package-announce/2008-June/msg01091.html | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.redhat.com/archives/fedora-package-announce/2008-June/msg01095.html |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
fetchmail | fetchmail | * | |
fetchmail | fetchmail | 4.5.1 | |
fetchmail | fetchmail | 4.5.2 | |
fetchmail | fetchmail | 4.5.3 | |
fetchmail | fetchmail | 4.5.4 | |
fetchmail | fetchmail | 4.5.5 | |
fetchmail | fetchmail | 4.5.6 | |
fetchmail | fetchmail | 4.5.7 | |
fetchmail | fetchmail | 4.5.8 | |
fetchmail | fetchmail | 4.6.0 | |
fetchmail | fetchmail | 4.6.1 | |
fetchmail | fetchmail | 4.6.2 | |
fetchmail | fetchmail | 4.6.3 | |
fetchmail | fetchmail | 4.6.4 | |
fetchmail | fetchmail | 4.6.5 | |
fetchmail | fetchmail | 4.6.6 | |
fetchmail | fetchmail | 4.6.7 | |
fetchmail | fetchmail | 4.6.8 | |
fetchmail | fetchmail | 4.6.9 | |
fetchmail | fetchmail | 4.7.0 | |
fetchmail | fetchmail | 4.7.1 | |
fetchmail | fetchmail | 4.7.2 | |
fetchmail | fetchmail | 4.7.3 | |
fetchmail | fetchmail | 4.7.4 | |
fetchmail | fetchmail | 4.7.5 | |
fetchmail | fetchmail | 4.7.6 | |
fetchmail | fetchmail | 4.7.7 | |
fetchmail | fetchmail | 5.0.0 | |
fetchmail | fetchmail | 5.0.1 | |
fetchmail | fetchmail | 5.0.2 | |
fetchmail | fetchmail | 5.0.3 | |
fetchmail | fetchmail | 5.0.4 | |
fetchmail | fetchmail | 5.0.5 | |
fetchmail | fetchmail | 5.0.6 | |
fetchmail | fetchmail | 5.0.7 | |
fetchmail | fetchmail | 5.0.8 | |
fetchmail | fetchmail | 5.1.0 | |
fetchmail | fetchmail | 5.1.4 | |
fetchmail | fetchmail | 5.2.0 | |
fetchmail | fetchmail | 5.2.1 | |
fetchmail | fetchmail | 5.2.3 | |
fetchmail | fetchmail | 5.2.4 | |
fetchmail | fetchmail | 5.2.7 | |
fetchmail | fetchmail | 5.2.8 | |
fetchmail | fetchmail | 5.3.0 | |
fetchmail | fetchmail | 5.3.1 | |
fetchmail | fetchmail | 5.3.3 | |
fetchmail | fetchmail | 5.3.8 | |
fetchmail | fetchmail | 5.4.0 | |
fetchmail | fetchmail | 5.4.3 | |
fetchmail | fetchmail | 5.4.4 | |
fetchmail | fetchmail | 5.4.5 | |
fetchmail | fetchmail | 5.5.0 | |
fetchmail | fetchmail | 5.5.2 | |
fetchmail | fetchmail | 5.5.3 | |
fetchmail | fetchmail | 5.5.5 | |
fetchmail | fetchmail | 5.5.6 | |
fetchmail | fetchmail | 5.6.0 | |
fetchmail | fetchmail | 5.7.0 | |
fetchmail | fetchmail | 5.7.2 | |
fetchmail | fetchmail | 5.7.4 | |
fetchmail | fetchmail | 5.8 | |
fetchmail | fetchmail | 5.8.1 | |
fetchmail | fetchmail | 5.8.2 | |
fetchmail | fetchmail | 5.8.3 | |
fetchmail | fetchmail | 5.8.4 | |
fetchmail | fetchmail | 5.8.5 | |
fetchmail | fetchmail | 5.8.6 | |
fetchmail | fetchmail | 5.8.11 | |
fetchmail | fetchmail | 5.8.13 | |
fetchmail | fetchmail | 5.8.14 | |
fetchmail | fetchmail | 5.8.17 | |
fetchmail | fetchmail | 5.9.0 | |
fetchmail | fetchmail | 5.9.4 | |
fetchmail | fetchmail | 5.9.5 | |
fetchmail | fetchmail | 5.9.8 | |
fetchmail | fetchmail | 5.9.10 | |
fetchmail | fetchmail | 5.9.11 | |
fetchmail | fetchmail | 5.9.13 | |
fetchmail | fetchmail | 6.0.0 | |
fetchmail | fetchmail | 6.1.0 | |
fetchmail | fetchmail | 6.1.3 | |
fetchmail | fetchmail | 6.2.0 | |
fetchmail | fetchmail | 6.2.1 | |
fetchmail | fetchmail | 6.2.2 | |
fetchmail | fetchmail | 6.2.3 | |
fetchmail | fetchmail | 6.2.4 | |
fetchmail | fetchmail | 6.2.5 | |
fetchmail | fetchmail | 6.2.5.1 | |
fetchmail | fetchmail | 6.2.5.2 | |
fetchmail | fetchmail | 6.2.5.4 | |
fetchmail | fetchmail | 6.2.6 | |
fetchmail | fetchmail | 6.2.6 | |
fetchmail | fetchmail | 6.2.6 | |
fetchmail | fetchmail | 6.2.9 | |
fetchmail | fetchmail | 6.2.9 | |
fetchmail | fetchmail | 6.2.9 | |
fetchmail | fetchmail | 6.2.9 | |
fetchmail | fetchmail | 6.2.9 | |
fetchmail | fetchmail | 6.2.9 | |
fetchmail | fetchmail | 6.2.9 | |
fetchmail | fetchmail | 6.3.0 | |
fetchmail | fetchmail | 6.3.1 | |
fetchmail | fetchmail | 6.3.2 | |
fetchmail | fetchmail | 6.3.3 | |
fetchmail | fetchmail | 6.3.4 | |
fetchmail | fetchmail | 6.3.5 | |
fetchmail | fetchmail | 6.3.6 | |
fetchmail | fetchmail | 6.3.6 | |
fetchmail | fetchmail | 6.3.6 | |
fetchmail | fetchmail | 6.3.6 | |
fetchmail | fetchmail | 6.3.6 | |
fetchmail | fetchmail | 6.3.6 | |
fetchmail | fetchmail | 6.3.7 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fetchmail:fetchmail:*:*:*:*:*:*:*:*", "matchCriteriaId": "BB18D768-33CE-4CB0-84A9-1D8CAF1080E1", "versionEndIncluding": "6.3.8", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "BF519D04-7596-42C6-A1D8-FC1018D1A414", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "9AFEC739-BDFA-4D14-9A04-96FFB71AE330", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "E1923712-7B88-483E-B38A-0EA6FB38EB38", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "C9608A96-D131-401B-B041-09ADEEB59354", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "F4555DBB-B63B-4637-86A9-399B34B27D14", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "D8AB8504-8CD1-4013-9413-1378F3BAE0AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "3DC47DA9-D110-4E6B-9F5B-D17ECB942B40", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.8:*:*:*:*:*:*:*", "matchCriteriaId": "345D0848-958F-4B44-8F31-0793C36A5ADD", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "7E179061-FB6A-44AA-8EAC-4916719D9A28", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "58A6B5F4-C799-45C4-9EAD-A55023767033", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "54FDB8B9-5537-4E08-8FA0-931D4BED43E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "E7EB9B1D-C6B0-494B-8A8C-752E5659EA1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "CC13DE1B-1428-4842-9567-BBE5EEF7042F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "215ED879-1E26-4FF4-8857-18499C5DE3A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "72604F3D-2DE8-4BFF-97D5-4AFA64399201", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "8792F7FF-9E56-4201-89FD-F0146D4F0DF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "B12812E8-1C5B-46CF-A266-EE19C5CD3B12", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.9:*:*:*:*:*:*:*", "matchCriteriaId": "4DEAA0E8-746D-446D-AAEA-0ED287766332", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "7D3E14C3-82AE-4D4A-8963-438BECBA5678", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "4DCFB7BB-2879-4EB7-BE1D-163238E313C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "6ED223B6-1864-415C-96D6-64E1EDE4C840", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "14CBC8ED-CC10-40B6-8AA7-9F1342432ECB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "D3417C2E-1117-4FE7-B2FA-74CAB57235B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.5:*:*:*:*:*:*:*", "matchCriteriaId": "07C61DC4-50D5-44B2-92F8-A59C65144108", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.6:*:*:*:*:*:*:*", "matchCriteriaId": "31A37E19-1E07-4FD0-AC6D-6AC3ED954787", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.7:*:*:*:*:*:*:*", "matchCriteriaId": "570C9443-81CE-42AC-B4A6-3B2ABAD97EC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "853DD3E0-668F-4FAC-BA0B-D4E9C416D646", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "CEF70FCA-5DA4-4C0B-B876-0345FA077D44", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "BF0C4F7C-0003-4C77-AE22-A9C2FCBFAF3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "78D12F53-07DE-447D-8403-40EB75B91955", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "19ECB844-F378-4A94-B9FC-A731B8186013", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "3169AA63-79F6-4B89-9405-8F6A2FB6FD64", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "88D1D54C-81A4-44CE-BE12-798CF7DD2CC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "D6615C7D-09B5-4943-A124-2FF9A0F4B927", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "EF18219F-0406-4D46-90DE-EA2A17C8EFF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "87B56DFD-BDA9-4D8B-BE54-BF59B762D574", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "33EA0CA8-468F-4A94-8DA3-5D820AB65973", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA21C847-57ED-4E7D-9366-6038467D9080", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "0450BD04-15D2-4122-A210-6225B89BDA7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "18428805-AEB2-4BA4-9762-906B59CE74D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "AFCCBB15-DFFE-4A57-A029-E57707D15E04", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "0427B5C8-265C-47C3-9BAB-B2A0EAA1DEE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "89A4B962-BE5B-471C-83EF-674525C5AE83", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "7166ECCB-54FB-44EA-BA80-4D2AAF494AF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "6B309C89-99E2-4F0B-976C-95E44A45ADC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "A3DE7EE7-F627-4955-8D95-1F00F1F85C7D", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "D549098D-FE16-4BCB-91C4-D71A8C8D2E9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "57BFA165-6E2E-49AF-9E2D-3D8923CF36C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "F5C67DFF-A1BE-4486-A11F-CD3729927220", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "1D365E6E-8777-4084-BEC8-7CBF4997D976", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "20C4FF28-0DBA-4995-8252-2D62FF896BC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "F80C6B9B-AFCE-46A1-8DEF-51C1B526EB18", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "BF667DB5-F41E-4E73-A01F-4EC3F60BAD0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "D2B144FA-A901-4CDF-AC3D-7F5E820B7A4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "96774635-9A12-4DAB-BCF6-2D678F244CE9", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "EFD2EE7A-36CB-4A26-8EEB-DACA2864D921", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "C3898EBC-75A9-4DDD-A0AF-2CDEC72DAE4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "4267DCE8-985C-416D-A6B7-536585E5A573", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "50E63EDF-FF0A-447C-A3FC-7BA2414C15CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "61DDD4A1-6185-41B6-A715-4C70F0AA2631", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8:*:*:*:*:*:*:*", "matchCriteriaId": "B10A7E3C-07CD-48A6-9075-5314B4E1EEAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "319955A4-27A8-46FF-ACE7-97E6DF27B2DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "925CF3DD-682B-40E6-900C-23F784CD9239", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "16366780-611E-4217-A614-EBA01421D148", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "43AEA36F-E730-4305-9CB6-738A7152F02E", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.5:*:*:*:*:*:*:*", "matchCriteriaId": "2B9536BA-6334-4957-9632-6D64365B88AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.6:*:*:*:*:*:*:*", "matchCriteriaId": "F52FA32B-8048-4FD7-9D20-20DC5E52098B", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.11:*:*:*:*:*:*:*", "matchCriteriaId": "9FA92DF1-3AAD-46AC-A9E4-E9386C977818", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.13:*:*:*:*:*:*:*", "matchCriteriaId": "837D66DB-F9CB-41F1-A091-BCFBAC2F45B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.14:*:*:*:*:*:*:*", "matchCriteriaId": "74D12B67-6E66-419A-A28F-6306402931EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.17:*:*:*:*:*:*:*", "matchCriteriaId": "A71FCBED-B25D-48E3-916C-FBA9E0DE8D12", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "1A17995E-DCAF-465A-8ABD-F1EA0D538784", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "93D03D78-C56E-4189-97FC-916C918EDFEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "19A66C77-041F-4A12-8A36-233A6B50641C", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C945059C-EF39-486D-A804-FBB8704AB927", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "1258CA65-FBC1-4848-A9E5-A8F5E5D6FBD5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.11:*:*:*:*:*:*:*", "matchCriteriaId": "A91C6418-41F0-46EB-ACFC-FCE907F5AA87", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.13:*:*:*:*:*:*:*", "matchCriteriaId": "0C020534-7596-496C-B9B0-739F58F6F4EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "0A77D40C-6FF5-42BD-9EFB-B532824D7606", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "F04C6A76-2718-4DBA-8972-A3EECDDB1A17", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "38ACD96E-5582-4ED0-BBB1-C891094D8217", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "264386DA-747F-492C-B660-D49BE9DB7139", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "DC4066AC-BE10-4189-86F6-BF94443738DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "1C25A146-50D5-4BA2-ABA2-20BF8784D7DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "72E76256-997F-4229-9B03-7BC3074F359D", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "7A717C50-2C5A-4CD1-B2E6-8CDF450940CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "61F908FF-9986-4F71-B0B6-D6A86555EF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "B0C1F99C-A246-40D3-B84A-5D11FF24AC1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "028F7F83-AF15-443B-A7DB-4E695E62EAFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "B418C3CE-E6E6-401D-AD83-5BB181009A7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.6:pre4:*:*:*:*:*:*", "matchCriteriaId": "8BF06FD2-0A4C-4557-B8EF-F0F021179498", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.6:pre8:*:*:*:*:*:*", "matchCriteriaId": "38C949C2-07A0-4FE4-8FBF-86215CB999CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.6:pre9:*:*:*:*:*:*", "matchCriteriaId": "88B23630-79DD-4B69-BB01-286193BA562E", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc10:*:*:*:*:*:*", "matchCriteriaId": "5FE21564-68C0-4765-BA40-9D3046C4CB14", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc3:*:*:*:*:*:*", "matchCriteriaId": "208102ED-6F22-44C5-BAF1-FD85EACF208F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc4:*:*:*:*:*:*", "matchCriteriaId": "C1CF7767-EB24-44E2-8E59-B4DBC99AFD23", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc5:*:*:*:*:*:*", "matchCriteriaId": "CF3D6D4C-5FD8-4EE1-A34A-99D397F09E85", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc7:*:*:*:*:*:*", "matchCriteriaId": "D63D88C1-B201-4D48-9659-5802DC4FD3EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc8:*:*:*:*:*:*", "matchCriteriaId": "16463B23-E884-467E-9F63-6B57EED39856", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc9:*:*:*:*:*:*", "matchCriteriaId": "9F2C03AF-666D-4AF6-BC69-F8B081EB41AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "84F90AFA-4B13-46A0-89D7-4065300C94C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "5DAD0F05-8B55-43ED-89D5-61A19F41EDFF", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "99053698-7F8B-4E71-8647-1A8B0DF7CEB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "9314F22D-22A8-4374-A2BF-3C64CF1F69BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "816E9640-A932-4E2F-9793-689F80D2AA89", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "5D09BB43-6CBA-499B-91D1-BA256A65E40D", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "ABE76611-08CE-4D85-B57A-021909835A81", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc1:*:*:*:*:*:*", "matchCriteriaId": "B98AFEDF-2BAB-4588-94E0-35AEA5F1B514", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc2:*:*:*:*:*:*", "matchCriteriaId": "4E8BAB5B-4DBC-4D05-B5E2-591573BC05FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc3:*:*:*:*:*:*", "matchCriteriaId": "02F6E729-A2F2-42AC-A941-F57A0A4E84A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc4:*:*:*:*:*:*", "matchCriteriaId": "4143D519-4B49-4E71-8686-FC6A095F0999", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc5:*:*:*:*:*:*", "matchCriteriaId": "387ADB82-4FAD-44DA-ABF2-2F4645C4F1E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "CED4FBCB-B6DF-429D-871D-2A9F7F59E63B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "fetchmail 6.3.8 and earlier, when running in -v -v (aka verbose) mode, allows remote attackers to cause a denial of service (crash and persistent mail failure) via a malformed mail message with long headers, which triggers an erroneous dereference when using vsnprintf to format log messages." }, { "lang": "es", "value": "fetchmail versi\u00f3n 6.3.8 y anteriores, cuando se ejecuta en modo -v -v (tambi\u00e9n se conoce como verbose), permite a los atacantes remotos causar una denegaci\u00f3n de servicio (bloqueo y fallo de correo persistente) por medio de un mensaje de correo malformado con encabezados largos, lo que desencadena unas desreferencias err\u00f3neas cuando se utiliza vsnprintf para dar formato a mensajes de registro." } ], "id": "CVE-2008-2711", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-06-16T21:41:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30742" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30895" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/31262" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/31287" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/33937" }, { "source": "cve@mitre.org", "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.495740" }, { "source": "cve@mitre.org", "url": "http://support.apple.com/kb/HT3438" }, { "source": "cve@mitre.org", "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0235" }, { "source": "cve@mitre.org", "url": "http://www.fetchmail.info/fetchmail-SA-2008-01.txt" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:117" }, { "source": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2008/06/13/1" }, { "source": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2021/08/09/1" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/493391/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/494865/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/29705" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1020298" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2008/1860/references" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2009/0422" }, { "source": "cve@mitre.org", "url": "https://bugzilla.novell.com/show_bug.cgi?id=354291" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43121" }, { "source": "cve@mitre.org", "url": "https://issues.rpath.com/browse/RPL-2623" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10950" }, { "source": "cve@mitre.org", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg01091.html" }, { "source": "cve@mitre.org", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg01095.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30742" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30895" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/31262" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/31287" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/33937" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.495740" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.apple.com/kb/HT3438" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0235" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.fetchmail.info/fetchmail-SA-2008-01.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:117" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2008/06/13/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2021/08/09/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/493391/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/494865/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/29705" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1020298" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/1860/references" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2009/0422" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.novell.com/show_bug.cgi?id=354291" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43121" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://issues.rpath.com/browse/RPL-2623" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10950" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg01091.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg01095.html" } ], "sourceIdentifier": "cve@mitre.org", "vendorComments": [ { "comment": "This issue was addressed in fetchmail packages as shipped in Red Hat Enterprise Linux 3, 4, and 5 via:\n\nhttps://rhn.redhat.com/errata/RHSA-2009-1427.html", "lastModified": "2009-09-09T00:00:00", "organization": "Red Hat" } ], "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2002-12-23 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Heap-based buffer overflow in Fetchmail 6.1.3 and earlier does not account for the "@" character when determining buffer lengths for local addresses, which allows remote attackers to execute arbitrary code via a header with a large number of local addresses.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2003-001.0.txt | ||
cve@mitre.org | http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000554 | ||
cve@mitre.org | http://marc.info/?l=bugtraq&m=103979751818638&w=2 | ||
cve@mitre.org | http://marc.info/?l=bugtraq&m=104004858802000&w=2 | ||
cve@mitre.org | http://security.e-matters.de/advisories/052002.html | ||
cve@mitre.org | http://www.debian.org/security/2002/dsa-216 | ||
cve@mitre.org | http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:011 | ||
cve@mitre.org | http://www.redhat.com/support/errata/RHSA-2002-293.html | Patch, Vendor Advisory | |
cve@mitre.org | http://www.redhat.com/support/errata/RHSA-2002-294.html | ||
cve@mitre.org | http://www.redhat.com/support/errata/RHSA-2003-155.html | ||
cve@mitre.org | http://www.securityfocus.com/bid/6390 | ||
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/10839 | ||
af854a3a-2127-422b-91ae-364da2661108 | ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2003-001.0.txt | ||
af854a3a-2127-422b-91ae-364da2661108 | http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000554 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=103979751818638&w=2 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=104004858802000&w=2 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://security.e-matters.de/advisories/052002.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2002/dsa-216 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:011 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2002-293.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2002-294.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2003-155.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/6390 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/10839 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
fetchmail | fetchmail | * | |
fetchmail | fetchmail | 4.5.1 | |
fetchmail | fetchmail | 4.5.2 | |
fetchmail | fetchmail | 4.5.3 | |
fetchmail | fetchmail | 4.5.4 | |
fetchmail | fetchmail | 4.5.5 | |
fetchmail | fetchmail | 4.5.6 | |
fetchmail | fetchmail | 4.5.7 | |
fetchmail | fetchmail | 4.5.8 | |
fetchmail | fetchmail | 4.6.0 | |
fetchmail | fetchmail | 4.6.1 | |
fetchmail | fetchmail | 4.6.2 | |
fetchmail | fetchmail | 4.6.3 | |
fetchmail | fetchmail | 4.6.4 | |
fetchmail | fetchmail | 4.6.5 | |
fetchmail | fetchmail | 4.6.6 | |
fetchmail | fetchmail | 4.6.7 | |
fetchmail | fetchmail | 4.6.8 | |
fetchmail | fetchmail | 4.6.9 | |
fetchmail | fetchmail | 4.7.0 | |
fetchmail | fetchmail | 4.7.1 | |
fetchmail | fetchmail | 4.7.2 | |
fetchmail | fetchmail | 4.7.3 | |
fetchmail | fetchmail | 4.7.4 | |
fetchmail | fetchmail | 4.7.5 | |
fetchmail | fetchmail | 4.7.6 | |
fetchmail | fetchmail | 4.7.7 | |
fetchmail | fetchmail | 5.0.0 | |
fetchmail | fetchmail | 5.0.1 | |
fetchmail | fetchmail | 5.0.2 | |
fetchmail | fetchmail | 5.0.3 | |
fetchmail | fetchmail | 5.0.4 | |
fetchmail | fetchmail | 5.0.5 | |
fetchmail | fetchmail | 5.0.6 | |
fetchmail | fetchmail | 5.0.7 | |
fetchmail | fetchmail | 5.0.8 | |
fetchmail | fetchmail | 5.1.0 | |
fetchmail | fetchmail | 5.1.4 | |
fetchmail | fetchmail | 5.2.0 | |
fetchmail | fetchmail | 5.2.1 | |
fetchmail | fetchmail | 5.2.3 | |
fetchmail | fetchmail | 5.2.4 | |
fetchmail | fetchmail | 5.2.7 | |
fetchmail | fetchmail | 5.2.8 | |
fetchmail | fetchmail | 5.3.0 | |
fetchmail | fetchmail | 5.3.1 | |
fetchmail | fetchmail | 5.3.3 | |
fetchmail | fetchmail | 5.3.8 | |
fetchmail | fetchmail | 5.4.0 | |
fetchmail | fetchmail | 5.4.3 | |
fetchmail | fetchmail | 5.4.4 | |
fetchmail | fetchmail | 5.4.5 | |
fetchmail | fetchmail | 5.5.0 | |
fetchmail | fetchmail | 5.5.2 | |
fetchmail | fetchmail | 5.5.3 | |
fetchmail | fetchmail | 5.5.5 | |
fetchmail | fetchmail | 5.5.6 | |
fetchmail | fetchmail | 5.6.0 | |
fetchmail | fetchmail | 5.7.0 | |
fetchmail | fetchmail | 5.7.2 | |
fetchmail | fetchmail | 5.7.4 | |
fetchmail | fetchmail | 5.8 | |
fetchmail | fetchmail | 5.8.1 | |
fetchmail | fetchmail | 5.8.2 | |
fetchmail | fetchmail | 5.8.3 | |
fetchmail | fetchmail | 5.8.4 | |
fetchmail | fetchmail | 5.8.5 | |
fetchmail | fetchmail | 5.8.6 | |
fetchmail | fetchmail | 5.8.11 | |
fetchmail | fetchmail | 5.8.13 | |
fetchmail | fetchmail | 5.8.14 | |
fetchmail | fetchmail | 5.8.17 | |
fetchmail | fetchmail | 5.9.0 | |
fetchmail | fetchmail | 5.9.4 | |
fetchmail | fetchmail | 5.9.5 | |
fetchmail | fetchmail | 5.9.8 | |
fetchmail | fetchmail | 5.9.10 | |
fetchmail | fetchmail | 5.9.11 | |
fetchmail | fetchmail | 5.9.13 | |
fetchmail | fetchmail | 6.0.0 | |
fetchmail | fetchmail | 6.1.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fetchmail:fetchmail:*:*:*:*:*:*:*:*", "matchCriteriaId": "07031C7D-31F1-491C-ACA2-5B5289DE36E9", "versionEndIncluding": "6.1.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "BF519D04-7596-42C6-A1D8-FC1018D1A414", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "9AFEC739-BDFA-4D14-9A04-96FFB71AE330", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "E1923712-7B88-483E-B38A-0EA6FB38EB38", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "C9608A96-D131-401B-B041-09ADEEB59354", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "F4555DBB-B63B-4637-86A9-399B34B27D14", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "D8AB8504-8CD1-4013-9413-1378F3BAE0AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "3DC47DA9-D110-4E6B-9F5B-D17ECB942B40", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.8:*:*:*:*:*:*:*", "matchCriteriaId": "345D0848-958F-4B44-8F31-0793C36A5ADD", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "7E179061-FB6A-44AA-8EAC-4916719D9A28", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "58A6B5F4-C799-45C4-9EAD-A55023767033", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "54FDB8B9-5537-4E08-8FA0-931D4BED43E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "E7EB9B1D-C6B0-494B-8A8C-752E5659EA1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "CC13DE1B-1428-4842-9567-BBE5EEF7042F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "215ED879-1E26-4FF4-8857-18499C5DE3A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "72604F3D-2DE8-4BFF-97D5-4AFA64399201", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "8792F7FF-9E56-4201-89FD-F0146D4F0DF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "B12812E8-1C5B-46CF-A266-EE19C5CD3B12", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.9:*:*:*:*:*:*:*", "matchCriteriaId": "4DEAA0E8-746D-446D-AAEA-0ED287766332", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "7D3E14C3-82AE-4D4A-8963-438BECBA5678", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "4DCFB7BB-2879-4EB7-BE1D-163238E313C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "6ED223B6-1864-415C-96D6-64E1EDE4C840", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "14CBC8ED-CC10-40B6-8AA7-9F1342432ECB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "D3417C2E-1117-4FE7-B2FA-74CAB57235B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.5:*:*:*:*:*:*:*", "matchCriteriaId": "07C61DC4-50D5-44B2-92F8-A59C65144108", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.6:*:*:*:*:*:*:*", "matchCriteriaId": "31A37E19-1E07-4FD0-AC6D-6AC3ED954787", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.7:*:*:*:*:*:*:*", "matchCriteriaId": "570C9443-81CE-42AC-B4A6-3B2ABAD97EC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "853DD3E0-668F-4FAC-BA0B-D4E9C416D646", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "CEF70FCA-5DA4-4C0B-B876-0345FA077D44", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "BF0C4F7C-0003-4C77-AE22-A9C2FCBFAF3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "78D12F53-07DE-447D-8403-40EB75B91955", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "19ECB844-F378-4A94-B9FC-A731B8186013", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "3169AA63-79F6-4B89-9405-8F6A2FB6FD64", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "88D1D54C-81A4-44CE-BE12-798CF7DD2CC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "D6615C7D-09B5-4943-A124-2FF9A0F4B927", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "EF18219F-0406-4D46-90DE-EA2A17C8EFF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "87B56DFD-BDA9-4D8B-BE54-BF59B762D574", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "33EA0CA8-468F-4A94-8DA3-5D820AB65973", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA21C847-57ED-4E7D-9366-6038467D9080", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "0450BD04-15D2-4122-A210-6225B89BDA7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "18428805-AEB2-4BA4-9762-906B59CE74D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "AFCCBB15-DFFE-4A57-A029-E57707D15E04", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "0427B5C8-265C-47C3-9BAB-B2A0EAA1DEE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "89A4B962-BE5B-471C-83EF-674525C5AE83", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "7166ECCB-54FB-44EA-BA80-4D2AAF494AF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "6B309C89-99E2-4F0B-976C-95E44A45ADC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "A3DE7EE7-F627-4955-8D95-1F00F1F85C7D", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "D549098D-FE16-4BCB-91C4-D71A8C8D2E9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "57BFA165-6E2E-49AF-9E2D-3D8923CF36C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "F5C67DFF-A1BE-4486-A11F-CD3729927220", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "1D365E6E-8777-4084-BEC8-7CBF4997D976", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "20C4FF28-0DBA-4995-8252-2D62FF896BC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "F80C6B9B-AFCE-46A1-8DEF-51C1B526EB18", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "BF667DB5-F41E-4E73-A01F-4EC3F60BAD0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "D2B144FA-A901-4CDF-AC3D-7F5E820B7A4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "96774635-9A12-4DAB-BCF6-2D678F244CE9", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "EFD2EE7A-36CB-4A26-8EEB-DACA2864D921", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "C3898EBC-75A9-4DDD-A0AF-2CDEC72DAE4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "4267DCE8-985C-416D-A6B7-536585E5A573", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "50E63EDF-FF0A-447C-A3FC-7BA2414C15CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "61DDD4A1-6185-41B6-A715-4C70F0AA2631", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8:*:*:*:*:*:*:*", "matchCriteriaId": "B10A7E3C-07CD-48A6-9075-5314B4E1EEAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "319955A4-27A8-46FF-ACE7-97E6DF27B2DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "925CF3DD-682B-40E6-900C-23F784CD9239", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "16366780-611E-4217-A614-EBA01421D148", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "43AEA36F-E730-4305-9CB6-738A7152F02E", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.5:*:*:*:*:*:*:*", "matchCriteriaId": "2B9536BA-6334-4957-9632-6D64365B88AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.6:*:*:*:*:*:*:*", "matchCriteriaId": "F52FA32B-8048-4FD7-9D20-20DC5E52098B", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.11:*:*:*:*:*:*:*", "matchCriteriaId": "9FA92DF1-3AAD-46AC-A9E4-E9386C977818", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.13:*:*:*:*:*:*:*", "matchCriteriaId": "837D66DB-F9CB-41F1-A091-BCFBAC2F45B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.14:*:*:*:*:*:*:*", "matchCriteriaId": "74D12B67-6E66-419A-A28F-6306402931EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.17:*:*:*:*:*:*:*", "matchCriteriaId": "A71FCBED-B25D-48E3-916C-FBA9E0DE8D12", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "1A17995E-DCAF-465A-8ABD-F1EA0D538784", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "93D03D78-C56E-4189-97FC-916C918EDFEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "19A66C77-041F-4A12-8A36-233A6B50641C", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C945059C-EF39-486D-A804-FBB8704AB927", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "1258CA65-FBC1-4848-A9E5-A8F5E5D6FBD5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.11:*:*:*:*:*:*:*", "matchCriteriaId": "A91C6418-41F0-46EB-ACFC-FCE907F5AA87", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.13:*:*:*:*:*:*:*", "matchCriteriaId": "0C020534-7596-496C-B9B0-739F58F6F4EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "0A77D40C-6FF5-42BD-9EFB-B532824D7606", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "F04C6A76-2718-4DBA-8972-A3EECDDB1A17", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in Fetchmail 6.1.3 and earlier does not account for the \"@\" character when determining buffer lengths for local addresses, which allows remote attackers to execute arbitrary code via a header with a large number of local addresses." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer basado en el mont\u00edculo (heap) en Fetchmail 6.1.3 y anteriores no tiene en cuenta el car\u00e1cter \"@\" cuando determina la longitud del b\u00fafer para direcciones locales, lo que permite a atacantes remotos ejecutar c\u00f3digo arbitrario mediante una cabecera con un n\u00famero largo de direcciones locales." } ], "id": "CVE-2002-1365", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2002-12-23T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2003-001.0.txt" }, { "source": "cve@mitre.org", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000554" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=103979751818638\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=104004858802000\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://security.e-matters.de/advisories/052002.html" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2002/dsa-216" }, { "source": "cve@mitre.org", "url": "http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:011" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2002-293.html" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2002-294.html" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2003-155.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/6390" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10839" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2003-001.0.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000554" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=103979751818638\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=104004858802000\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.e-matters.de/advisories/052002.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2002/dsa-216" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:011" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2002-293.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2002-294.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2003-155.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/6390" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10839" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2001-02-12 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Vulnerability in fetchmail 5.5.0-2 and earlier in the AUTHENTICATE GSSAPI command.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.redhat.com/support/errata/RHBA-2000-106.html | Vendor Advisory | |
cve@mitre.org | http://www.turbolinux.com/pipermail/tl-security-announce/2000-December/000027.html | Patch | |
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/7455 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHBA-2000-106.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.turbolinux.com/pipermail/tl-security-announce/2000-December/000027.html | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/7455 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
fetchmail | fetchmail | * | |
fetchmail | fetchmail | 4.5.1 | |
fetchmail | fetchmail | 4.5.2 | |
fetchmail | fetchmail | 4.5.3 | |
fetchmail | fetchmail | 4.5.4 | |
fetchmail | fetchmail | 4.5.5 | |
fetchmail | fetchmail | 4.5.6 | |
fetchmail | fetchmail | 4.5.7 | |
fetchmail | fetchmail | 4.5.8 | |
fetchmail | fetchmail | 4.6.0 | |
fetchmail | fetchmail | 4.6.1 | |
fetchmail | fetchmail | 4.6.2 | |
fetchmail | fetchmail | 4.6.3 | |
fetchmail | fetchmail | 4.6.4 | |
fetchmail | fetchmail | 4.6.5 | |
fetchmail | fetchmail | 4.6.6 | |
fetchmail | fetchmail | 4.6.7 | |
fetchmail | fetchmail | 4.6.8 | |
fetchmail | fetchmail | 4.6.9 | |
fetchmail | fetchmail | 4.7.0 | |
fetchmail | fetchmail | 4.7.1 | |
fetchmail | fetchmail | 4.7.2 | |
fetchmail | fetchmail | 4.7.3 | |
fetchmail | fetchmail | 4.7.4 | |
fetchmail | fetchmail | 4.7.5 | |
fetchmail | fetchmail | 4.7.6 | |
fetchmail | fetchmail | 4.7.7 | |
fetchmail | fetchmail | 5.0.0 | |
fetchmail | fetchmail | 5.0.1 | |
fetchmail | fetchmail | 5.0.2 | |
fetchmail | fetchmail | 5.0.3 | |
fetchmail | fetchmail | 5.0.4 | |
fetchmail | fetchmail | 5.0.5 | |
fetchmail | fetchmail | 5.0.6 | |
fetchmail | fetchmail | 5.0.7 | |
fetchmail | fetchmail | 5.0.8 | |
fetchmail | fetchmail | 5.1.0 | |
fetchmail | fetchmail | 5.1.4 | |
fetchmail | fetchmail | 5.2.0 | |
fetchmail | fetchmail | 5.2.1 | |
fetchmail | fetchmail | 5.2.3 | |
fetchmail | fetchmail | 5.2.4 | |
fetchmail | fetchmail | 5.2.7 | |
fetchmail | fetchmail | 5.2.8 | |
fetchmail | fetchmail | 5.3.0 | |
fetchmail | fetchmail | 5.3.1 | |
fetchmail | fetchmail | 5.3.3 | |
fetchmail | fetchmail | 5.3.8 | |
fetchmail | fetchmail | 5.4.0 | |
fetchmail | fetchmail | 5.4.3 | |
fetchmail | fetchmail | 5.4.4 | |
fetchmail | fetchmail | 5.4.5 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fetchmail:fetchmail:*:*:*:*:*:*:*:*", "matchCriteriaId": "BD813A12-E14E-46EB-9E25-C7B858EFBB92", "versionEndIncluding": "5.5.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "BF519D04-7596-42C6-A1D8-FC1018D1A414", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "9AFEC739-BDFA-4D14-9A04-96FFB71AE330", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "E1923712-7B88-483E-B38A-0EA6FB38EB38", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "C9608A96-D131-401B-B041-09ADEEB59354", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "F4555DBB-B63B-4637-86A9-399B34B27D14", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "D8AB8504-8CD1-4013-9413-1378F3BAE0AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "3DC47DA9-D110-4E6B-9F5B-D17ECB942B40", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.8:*:*:*:*:*:*:*", "matchCriteriaId": "345D0848-958F-4B44-8F31-0793C36A5ADD", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "7E179061-FB6A-44AA-8EAC-4916719D9A28", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "58A6B5F4-C799-45C4-9EAD-A55023767033", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "54FDB8B9-5537-4E08-8FA0-931D4BED43E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "E7EB9B1D-C6B0-494B-8A8C-752E5659EA1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "CC13DE1B-1428-4842-9567-BBE5EEF7042F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "215ED879-1E26-4FF4-8857-18499C5DE3A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "72604F3D-2DE8-4BFF-97D5-4AFA64399201", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "8792F7FF-9E56-4201-89FD-F0146D4F0DF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "B12812E8-1C5B-46CF-A266-EE19C5CD3B12", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.9:*:*:*:*:*:*:*", "matchCriteriaId": "4DEAA0E8-746D-446D-AAEA-0ED287766332", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "7D3E14C3-82AE-4D4A-8963-438BECBA5678", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "4DCFB7BB-2879-4EB7-BE1D-163238E313C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "6ED223B6-1864-415C-96D6-64E1EDE4C840", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "14CBC8ED-CC10-40B6-8AA7-9F1342432ECB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "D3417C2E-1117-4FE7-B2FA-74CAB57235B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.5:*:*:*:*:*:*:*", "matchCriteriaId": "07C61DC4-50D5-44B2-92F8-A59C65144108", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.6:*:*:*:*:*:*:*", "matchCriteriaId": "31A37E19-1E07-4FD0-AC6D-6AC3ED954787", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.7:*:*:*:*:*:*:*", "matchCriteriaId": "570C9443-81CE-42AC-B4A6-3B2ABAD97EC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "853DD3E0-668F-4FAC-BA0B-D4E9C416D646", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "CEF70FCA-5DA4-4C0B-B876-0345FA077D44", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "BF0C4F7C-0003-4C77-AE22-A9C2FCBFAF3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "78D12F53-07DE-447D-8403-40EB75B91955", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "19ECB844-F378-4A94-B9FC-A731B8186013", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "3169AA63-79F6-4B89-9405-8F6A2FB6FD64", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "88D1D54C-81A4-44CE-BE12-798CF7DD2CC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "D6615C7D-09B5-4943-A124-2FF9A0F4B927", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "EF18219F-0406-4D46-90DE-EA2A17C8EFF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "87B56DFD-BDA9-4D8B-BE54-BF59B762D574", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "33EA0CA8-468F-4A94-8DA3-5D820AB65973", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA21C847-57ED-4E7D-9366-6038467D9080", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "0450BD04-15D2-4122-A210-6225B89BDA7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "18428805-AEB2-4BA4-9762-906B59CE74D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "AFCCBB15-DFFE-4A57-A029-E57707D15E04", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "0427B5C8-265C-47C3-9BAB-B2A0EAA1DEE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "89A4B962-BE5B-471C-83EF-674525C5AE83", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "7166ECCB-54FB-44EA-BA80-4D2AAF494AF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "6B309C89-99E2-4F0B-976C-95E44A45ADC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "A3DE7EE7-F627-4955-8D95-1F00F1F85C7D", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "D549098D-FE16-4BCB-91C4-D71A8C8D2E9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "57BFA165-6E2E-49AF-9E2D-3D8923CF36C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "F5C67DFF-A1BE-4486-A11F-CD3729927220", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "1D365E6E-8777-4084-BEC8-7CBF4997D976", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "20C4FF28-0DBA-4995-8252-2D62FF896BC4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vulnerability in fetchmail 5.5.0-2 and earlier in the AUTHENTICATE GSSAPI command." } ], "id": "CVE-2001-0101", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2001-02-12T05:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHBA-2000-106.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.turbolinux.com/pipermail/tl-security-announce/2000-December/000027.html" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7455" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHBA-2000-106.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.turbolinux.com/pipermail/tl-security-announce/2000-December/000027.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7455" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2002-06-25 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
fetchmail email client before 5.9.10 does not properly limit the maximum number of messages available, which allows a remote IMAP server to overwrite memory via a message count that exceeds the boundaries of an array.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-027.0.txt | ||
cve@mitre.org | http://online.securityfocus.com/advisories/4145 | ||
cve@mitre.org | http://www.iss.net/security_center/static/9133.php | ||
cve@mitre.org | http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-036.php | ||
cve@mitre.org | http://www.redhat.com/support/errata/RHSA-2002-047.html | Patch, Vendor Advisory | |
cve@mitre.org | http://www.securityfocus.com/bid/4788 | ||
af854a3a-2127-422b-91ae-364da2661108 | ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-027.0.txt | ||
af854a3a-2127-422b-91ae-364da2661108 | http://online.securityfocus.com/advisories/4145 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.iss.net/security_center/static/9133.php | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-036.php | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2002-047.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/4788 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
fetchmail | fetchmail | * | |
fetchmail | fetchmail | 4.5.1 | |
fetchmail | fetchmail | 4.5.2 | |
fetchmail | fetchmail | 4.5.3 | |
fetchmail | fetchmail | 4.5.4 | |
fetchmail | fetchmail | 4.5.5 | |
fetchmail | fetchmail | 4.5.6 | |
fetchmail | fetchmail | 4.5.7 | |
fetchmail | fetchmail | 4.5.8 | |
fetchmail | fetchmail | 4.6.0 | |
fetchmail | fetchmail | 4.6.1 | |
fetchmail | fetchmail | 4.6.2 | |
fetchmail | fetchmail | 4.6.3 | |
fetchmail | fetchmail | 4.6.4 | |
fetchmail | fetchmail | 4.6.5 | |
fetchmail | fetchmail | 4.6.6 | |
fetchmail | fetchmail | 4.6.7 | |
fetchmail | fetchmail | 4.6.8 | |
fetchmail | fetchmail | 4.6.9 | |
fetchmail | fetchmail | 4.7.0 | |
fetchmail | fetchmail | 4.7.1 | |
fetchmail | fetchmail | 4.7.2 | |
fetchmail | fetchmail | 4.7.3 | |
fetchmail | fetchmail | 4.7.4 | |
fetchmail | fetchmail | 4.7.5 | |
fetchmail | fetchmail | 4.7.6 | |
fetchmail | fetchmail | 4.7.7 | |
fetchmail | fetchmail | 5.0.0 | |
fetchmail | fetchmail | 5.0.1 | |
fetchmail | fetchmail | 5.0.2 | |
fetchmail | fetchmail | 5.0.3 | |
fetchmail | fetchmail | 5.0.4 | |
fetchmail | fetchmail | 5.0.5 | |
fetchmail | fetchmail | 5.0.6 | |
fetchmail | fetchmail | 5.0.7 | |
fetchmail | fetchmail | 5.0.8 | |
fetchmail | fetchmail | 5.1.0 | |
fetchmail | fetchmail | 5.1.4 | |
fetchmail | fetchmail | 5.2.0 | |
fetchmail | fetchmail | 5.2.1 | |
fetchmail | fetchmail | 5.2.3 | |
fetchmail | fetchmail | 5.2.4 | |
fetchmail | fetchmail | 5.2.7 | |
fetchmail | fetchmail | 5.2.8 | |
fetchmail | fetchmail | 5.3.0 | |
fetchmail | fetchmail | 5.3.1 | |
fetchmail | fetchmail | 5.3.3 | |
fetchmail | fetchmail | 5.3.8 | |
fetchmail | fetchmail | 5.4.0 | |
fetchmail | fetchmail | 5.4.3 | |
fetchmail | fetchmail | 5.4.4 | |
fetchmail | fetchmail | 5.4.5 | |
fetchmail | fetchmail | 5.5.0 | |
fetchmail | fetchmail | 5.5.2 | |
fetchmail | fetchmail | 5.5.3 | |
fetchmail | fetchmail | 5.5.5 | |
fetchmail | fetchmail | 5.5.6 | |
fetchmail | fetchmail | 5.6.0 | |
fetchmail | fetchmail | 5.7.0 | |
fetchmail | fetchmail | 5.7.2 | |
fetchmail | fetchmail | 5.7.4 | |
fetchmail | fetchmail | 5.8 | |
fetchmail | fetchmail | 5.8.1 | |
fetchmail | fetchmail | 5.8.2 | |
fetchmail | fetchmail | 5.8.3 | |
fetchmail | fetchmail | 5.8.4 | |
fetchmail | fetchmail | 5.8.5 | |
fetchmail | fetchmail | 5.8.6 | |
fetchmail | fetchmail | 5.8.11 | |
fetchmail | fetchmail | 5.8.13 | |
fetchmail | fetchmail | 5.8.14 | |
fetchmail | fetchmail | 5.8.17 | |
fetchmail | fetchmail | 5.9.0 | |
fetchmail | fetchmail | 5.9.4 | |
fetchmail | fetchmail | 5.9.5 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fetchmail:fetchmail:*:*:*:*:*:*:*:*", "matchCriteriaId": "269F9BE0-13D0-4530-9F82-A30FBD1D5044", "versionEndIncluding": "5.9.8", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "BF519D04-7596-42C6-A1D8-FC1018D1A414", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "9AFEC739-BDFA-4D14-9A04-96FFB71AE330", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "E1923712-7B88-483E-B38A-0EA6FB38EB38", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "C9608A96-D131-401B-B041-09ADEEB59354", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "F4555DBB-B63B-4637-86A9-399B34B27D14", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "D8AB8504-8CD1-4013-9413-1378F3BAE0AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "3DC47DA9-D110-4E6B-9F5B-D17ECB942B40", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.8:*:*:*:*:*:*:*", "matchCriteriaId": "345D0848-958F-4B44-8F31-0793C36A5ADD", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "7E179061-FB6A-44AA-8EAC-4916719D9A28", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "58A6B5F4-C799-45C4-9EAD-A55023767033", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "54FDB8B9-5537-4E08-8FA0-931D4BED43E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "E7EB9B1D-C6B0-494B-8A8C-752E5659EA1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "CC13DE1B-1428-4842-9567-BBE5EEF7042F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "215ED879-1E26-4FF4-8857-18499C5DE3A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "72604F3D-2DE8-4BFF-97D5-4AFA64399201", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "8792F7FF-9E56-4201-89FD-F0146D4F0DF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "B12812E8-1C5B-46CF-A266-EE19C5CD3B12", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.9:*:*:*:*:*:*:*", "matchCriteriaId": "4DEAA0E8-746D-446D-AAEA-0ED287766332", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "7D3E14C3-82AE-4D4A-8963-438BECBA5678", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "4DCFB7BB-2879-4EB7-BE1D-163238E313C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "6ED223B6-1864-415C-96D6-64E1EDE4C840", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "14CBC8ED-CC10-40B6-8AA7-9F1342432ECB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "D3417C2E-1117-4FE7-B2FA-74CAB57235B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.5:*:*:*:*:*:*:*", "matchCriteriaId": "07C61DC4-50D5-44B2-92F8-A59C65144108", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.6:*:*:*:*:*:*:*", "matchCriteriaId": "31A37E19-1E07-4FD0-AC6D-6AC3ED954787", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.7:*:*:*:*:*:*:*", "matchCriteriaId": "570C9443-81CE-42AC-B4A6-3B2ABAD97EC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "853DD3E0-668F-4FAC-BA0B-D4E9C416D646", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "CEF70FCA-5DA4-4C0B-B876-0345FA077D44", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "BF0C4F7C-0003-4C77-AE22-A9C2FCBFAF3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "78D12F53-07DE-447D-8403-40EB75B91955", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "19ECB844-F378-4A94-B9FC-A731B8186013", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "3169AA63-79F6-4B89-9405-8F6A2FB6FD64", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "88D1D54C-81A4-44CE-BE12-798CF7DD2CC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "D6615C7D-09B5-4943-A124-2FF9A0F4B927", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "EF18219F-0406-4D46-90DE-EA2A17C8EFF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "87B56DFD-BDA9-4D8B-BE54-BF59B762D574", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "33EA0CA8-468F-4A94-8DA3-5D820AB65973", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA21C847-57ED-4E7D-9366-6038467D9080", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "0450BD04-15D2-4122-A210-6225B89BDA7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "18428805-AEB2-4BA4-9762-906B59CE74D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "AFCCBB15-DFFE-4A57-A029-E57707D15E04", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "0427B5C8-265C-47C3-9BAB-B2A0EAA1DEE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "89A4B962-BE5B-471C-83EF-674525C5AE83", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "7166ECCB-54FB-44EA-BA80-4D2AAF494AF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "6B309C89-99E2-4F0B-976C-95E44A45ADC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "A3DE7EE7-F627-4955-8D95-1F00F1F85C7D", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "D549098D-FE16-4BCB-91C4-D71A8C8D2E9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "57BFA165-6E2E-49AF-9E2D-3D8923CF36C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "F5C67DFF-A1BE-4486-A11F-CD3729927220", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "1D365E6E-8777-4084-BEC8-7CBF4997D976", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "20C4FF28-0DBA-4995-8252-2D62FF896BC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "F80C6B9B-AFCE-46A1-8DEF-51C1B526EB18", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "BF667DB5-F41E-4E73-A01F-4EC3F60BAD0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "D2B144FA-A901-4CDF-AC3D-7F5E820B7A4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "96774635-9A12-4DAB-BCF6-2D678F244CE9", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "EFD2EE7A-36CB-4A26-8EEB-DACA2864D921", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "C3898EBC-75A9-4DDD-A0AF-2CDEC72DAE4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "4267DCE8-985C-416D-A6B7-536585E5A573", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "50E63EDF-FF0A-447C-A3FC-7BA2414C15CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "61DDD4A1-6185-41B6-A715-4C70F0AA2631", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8:*:*:*:*:*:*:*", "matchCriteriaId": "B10A7E3C-07CD-48A6-9075-5314B4E1EEAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "319955A4-27A8-46FF-ACE7-97E6DF27B2DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "925CF3DD-682B-40E6-900C-23F784CD9239", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "16366780-611E-4217-A614-EBA01421D148", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "43AEA36F-E730-4305-9CB6-738A7152F02E", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.5:*:*:*:*:*:*:*", "matchCriteriaId": "2B9536BA-6334-4957-9632-6D64365B88AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.6:*:*:*:*:*:*:*", "matchCriteriaId": "F52FA32B-8048-4FD7-9D20-20DC5E52098B", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.11:*:*:*:*:*:*:*", "matchCriteriaId": "9FA92DF1-3AAD-46AC-A9E4-E9386C977818", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.13:*:*:*:*:*:*:*", "matchCriteriaId": "837D66DB-F9CB-41F1-A091-BCFBAC2F45B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.14:*:*:*:*:*:*:*", "matchCriteriaId": "74D12B67-6E66-419A-A28F-6306402931EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.17:*:*:*:*:*:*:*", "matchCriteriaId": "A71FCBED-B25D-48E3-916C-FBA9E0DE8D12", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "1A17995E-DCAF-465A-8ABD-F1EA0D538784", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "93D03D78-C56E-4189-97FC-916C918EDFEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "19A66C77-041F-4A12-8A36-233A6B50641C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "fetchmail email client before 5.9.10 does not properly limit the maximum number of messages available, which allows a remote IMAP server to overwrite memory via a message count that exceeds the boundaries of an array." } ], "id": "CVE-2002-0146", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2002-06-25T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-027.0.txt" }, { "source": "cve@mitre.org", "url": "http://online.securityfocus.com/advisories/4145" }, { "source": "cve@mitre.org", "url": "http://www.iss.net/security_center/static/9133.php" }, { "source": "cve@mitre.org", "url": "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-036.php" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2002-047.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/4788" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-027.0.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://online.securityfocus.com/advisories/4145" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.iss.net/security_center/static/9133.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-036.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2002-047.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/4788" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-08-28 01:17
Modified
2025-04-09 00:30
Severity ?
Summary
sink.c in fetchmail before 6.3.9 allows context-dependent attackers to cause a denial of service (NULL dereference and application crash) by refusing certain warning messages that are sent over SMTP.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://fetchmail.berlios.de/fetchmail-SA-2007-02.txt | ||
cve@mitre.org | http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html | ||
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00008.html | ||
cve@mitre.org | http://mknod.org/svn/fetchmail/branches/BRANCH_6-3/fetchmail-SA-2007-02.txt | Patch | |
cve@mitre.org | http://osvdb.org/45833 | ||
cve@mitre.org | http://secunia.com/advisories/27399 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/33937 | Vendor Advisory | |
cve@mitre.org | http://securityreason.com/securityalert/3074 | ||
cve@mitre.org | http://support.apple.com/kb/HT3438 | ||
cve@mitre.org | http://www.debian.org/security/2007/dsa-1377 | ||
cve@mitre.org | http://www.mandriva.com/security/advisories?name=MDKSA-2007:179 | ||
cve@mitre.org | http://www.securityfocus.com/archive/1/478798/100/0/threaded | ||
cve@mitre.org | http://www.securityfocus.com/archive/1/493388/100/0/threaded | ||
cve@mitre.org | http://www.securityfocus.com/bid/25495 | ||
cve@mitre.org | http://www.securitytracker.com/id?1018627 | ||
cve@mitre.org | http://www.trustix.org/errata/2007/0028/ | ||
cve@mitre.org | http://www.ubuntu.com/usn/usn-520-1 | ||
cve@mitre.org | http://www.vupen.com/english/advisories/2007/3032 | ||
cve@mitre.org | http://www.vupen.com/english/advisories/2009/0422 | ||
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/36385 | ||
cve@mitre.org | https://issues.rpath.com/browse/RPL-1690 | ||
cve@mitre.org | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10528 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://fetchmail.berlios.de/fetchmail-SA-2007-02.txt | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00008.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://mknod.org/svn/fetchmail/branches/BRANCH_6-3/fetchmail-SA-2007-02.txt | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/45833 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/27399 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/33937 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://securityreason.com/securityalert/3074 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://support.apple.com/kb/HT3438 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2007/dsa-1377 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDKSA-2007:179 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/478798/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/493388/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/25495 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1018627 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.trustix.org/errata/2007/0028/ | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/usn-520-1 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2007/3032 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2009/0422 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/36385 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://issues.rpath.com/browse/RPL-1690 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10528 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
fetchmail | fetchmail | * | |
fetchmail | fetchmail | 4.5.1 | |
fetchmail | fetchmail | 4.5.2 | |
fetchmail | fetchmail | 4.5.3 | |
fetchmail | fetchmail | 4.5.4 | |
fetchmail | fetchmail | 4.5.5 | |
fetchmail | fetchmail | 4.5.6 | |
fetchmail | fetchmail | 4.5.7 | |
fetchmail | fetchmail | 4.5.8 | |
fetchmail | fetchmail | 4.6.0 | |
fetchmail | fetchmail | 4.6.1 | |
fetchmail | fetchmail | 4.6.2 | |
fetchmail | fetchmail | 4.6.3 | |
fetchmail | fetchmail | 4.6.4 | |
fetchmail | fetchmail | 4.6.5 | |
fetchmail | fetchmail | 4.6.6 | |
fetchmail | fetchmail | 4.6.7 | |
fetchmail | fetchmail | 4.6.8 | |
fetchmail | fetchmail | 4.6.9 | |
fetchmail | fetchmail | 4.7.0 | |
fetchmail | fetchmail | 4.7.1 | |
fetchmail | fetchmail | 4.7.2 | |
fetchmail | fetchmail | 4.7.3 | |
fetchmail | fetchmail | 4.7.4 | |
fetchmail | fetchmail | 4.7.5 | |
fetchmail | fetchmail | 4.7.6 | |
fetchmail | fetchmail | 4.7.7 | |
fetchmail | fetchmail | 5.0.0 | |
fetchmail | fetchmail | 5.0.1 | |
fetchmail | fetchmail | 5.0.2 | |
fetchmail | fetchmail | 5.0.3 | |
fetchmail | fetchmail | 5.0.4 | |
fetchmail | fetchmail | 5.0.5 | |
fetchmail | fetchmail | 5.0.6 | |
fetchmail | fetchmail | 5.0.7 | |
fetchmail | fetchmail | 5.0.8 | |
fetchmail | fetchmail | 5.1.0 | |
fetchmail | fetchmail | 5.1.4 | |
fetchmail | fetchmail | 5.2.0 | |
fetchmail | fetchmail | 5.2.1 | |
fetchmail | fetchmail | 5.2.3 | |
fetchmail | fetchmail | 5.2.4 | |
fetchmail | fetchmail | 5.2.7 | |
fetchmail | fetchmail | 5.2.8 | |
fetchmail | fetchmail | 5.3.0 | |
fetchmail | fetchmail | 5.3.1 | |
fetchmail | fetchmail | 5.3.3 | |
fetchmail | fetchmail | 5.3.8 | |
fetchmail | fetchmail | 5.4.0 | |
fetchmail | fetchmail | 5.4.3 | |
fetchmail | fetchmail | 5.4.4 | |
fetchmail | fetchmail | 5.4.5 | |
fetchmail | fetchmail | 5.5.0 | |
fetchmail | fetchmail | 5.5.2 | |
fetchmail | fetchmail | 5.5.3 | |
fetchmail | fetchmail | 5.5.5 | |
fetchmail | fetchmail | 5.5.6 | |
fetchmail | fetchmail | 5.6.0 | |
fetchmail | fetchmail | 5.7.0 | |
fetchmail | fetchmail | 5.7.2 | |
fetchmail | fetchmail | 5.7.4 | |
fetchmail | fetchmail | 5.8 | |
fetchmail | fetchmail | 5.8.1 | |
fetchmail | fetchmail | 5.8.2 | |
fetchmail | fetchmail | 5.8.3 | |
fetchmail | fetchmail | 5.8.4 | |
fetchmail | fetchmail | 5.8.5 | |
fetchmail | fetchmail | 5.8.6 | |
fetchmail | fetchmail | 5.8.11 | |
fetchmail | fetchmail | 5.8.13 | |
fetchmail | fetchmail | 5.8.14 | |
fetchmail | fetchmail | 5.8.17 | |
fetchmail | fetchmail | 5.9.0 | |
fetchmail | fetchmail | 5.9.4 | |
fetchmail | fetchmail | 5.9.5 | |
fetchmail | fetchmail | 5.9.8 | |
fetchmail | fetchmail | 5.9.10 | |
fetchmail | fetchmail | 5.9.11 | |
fetchmail | fetchmail | 5.9.13 | |
fetchmail | fetchmail | 6.0.0 | |
fetchmail | fetchmail | 6.1.0 | |
fetchmail | fetchmail | 6.1.3 | |
fetchmail | fetchmail | 6.2.0 | |
fetchmail | fetchmail | 6.2.1 | |
fetchmail | fetchmail | 6.2.2 | |
fetchmail | fetchmail | 6.2.3 | |
fetchmail | fetchmail | 6.2.4 | |
fetchmail | fetchmail | 6.2.5 | |
fetchmail | fetchmail | 6.2.5.1 | |
fetchmail | fetchmail | 6.2.5.2 | |
fetchmail | fetchmail | 6.2.5.4 | |
fetchmail | fetchmail | 6.2.6 | |
fetchmail | fetchmail | 6.2.6 | |
fetchmail | fetchmail | 6.2.6 | |
fetchmail | fetchmail | 6.2.9 | |
fetchmail | fetchmail | 6.2.9 | |
fetchmail | fetchmail | 6.2.9 | |
fetchmail | fetchmail | 6.2.9 | |
fetchmail | fetchmail | 6.2.9 | |
fetchmail | fetchmail | 6.2.9 | |
fetchmail | fetchmail | 6.2.9 | |
fetchmail | fetchmail | 6.3.0 | |
fetchmail | fetchmail | 6.3.1 | |
fetchmail | fetchmail | 6.3.2 | |
fetchmail | fetchmail | 6.3.3 | |
fetchmail | fetchmail | 6.3.4 | |
fetchmail | fetchmail | 6.3.5 | |
fetchmail | fetchmail | 6.3.6 | |
fetchmail | fetchmail | 6.3.6 | |
fetchmail | fetchmail | 6.3.6 | |
fetchmail | fetchmail | 6.3.6 | |
fetchmail | fetchmail | 6.3.6 | |
fetchmail | fetchmail | 6.3.6 | |
fetchmail | fetchmail | 6.3.7 | |
fetchmail | fetchmail | 6.3.8 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fetchmail:fetchmail:*:rc2:*:*:*:*:*:*", "matchCriteriaId": "6089D7C8-8651-4C85-9F03-96A2C2BBD380", "versionEndIncluding": "6.3.9", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "BF519D04-7596-42C6-A1D8-FC1018D1A414", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "9AFEC739-BDFA-4D14-9A04-96FFB71AE330", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "E1923712-7B88-483E-B38A-0EA6FB38EB38", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "C9608A96-D131-401B-B041-09ADEEB59354", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "F4555DBB-B63B-4637-86A9-399B34B27D14", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "D8AB8504-8CD1-4013-9413-1378F3BAE0AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "3DC47DA9-D110-4E6B-9F5B-D17ECB942B40", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.8:*:*:*:*:*:*:*", "matchCriteriaId": "345D0848-958F-4B44-8F31-0793C36A5ADD", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "7E179061-FB6A-44AA-8EAC-4916719D9A28", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "58A6B5F4-C799-45C4-9EAD-A55023767033", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "54FDB8B9-5537-4E08-8FA0-931D4BED43E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "E7EB9B1D-C6B0-494B-8A8C-752E5659EA1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "CC13DE1B-1428-4842-9567-BBE5EEF7042F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "215ED879-1E26-4FF4-8857-18499C5DE3A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "72604F3D-2DE8-4BFF-97D5-4AFA64399201", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "8792F7FF-9E56-4201-89FD-F0146D4F0DF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "B12812E8-1C5B-46CF-A266-EE19C5CD3B12", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.9:*:*:*:*:*:*:*", "matchCriteriaId": "4DEAA0E8-746D-446D-AAEA-0ED287766332", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "7D3E14C3-82AE-4D4A-8963-438BECBA5678", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "4DCFB7BB-2879-4EB7-BE1D-163238E313C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "6ED223B6-1864-415C-96D6-64E1EDE4C840", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "14CBC8ED-CC10-40B6-8AA7-9F1342432ECB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "D3417C2E-1117-4FE7-B2FA-74CAB57235B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.5:*:*:*:*:*:*:*", "matchCriteriaId": "07C61DC4-50D5-44B2-92F8-A59C65144108", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.6:*:*:*:*:*:*:*", "matchCriteriaId": "31A37E19-1E07-4FD0-AC6D-6AC3ED954787", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.7:*:*:*:*:*:*:*", "matchCriteriaId": "570C9443-81CE-42AC-B4A6-3B2ABAD97EC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "853DD3E0-668F-4FAC-BA0B-D4E9C416D646", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "CEF70FCA-5DA4-4C0B-B876-0345FA077D44", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "BF0C4F7C-0003-4C77-AE22-A9C2FCBFAF3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "78D12F53-07DE-447D-8403-40EB75B91955", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "19ECB844-F378-4A94-B9FC-A731B8186013", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "3169AA63-79F6-4B89-9405-8F6A2FB6FD64", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "88D1D54C-81A4-44CE-BE12-798CF7DD2CC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "D6615C7D-09B5-4943-A124-2FF9A0F4B927", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "EF18219F-0406-4D46-90DE-EA2A17C8EFF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "87B56DFD-BDA9-4D8B-BE54-BF59B762D574", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "33EA0CA8-468F-4A94-8DA3-5D820AB65973", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA21C847-57ED-4E7D-9366-6038467D9080", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "0450BD04-15D2-4122-A210-6225B89BDA7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "18428805-AEB2-4BA4-9762-906B59CE74D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "AFCCBB15-DFFE-4A57-A029-E57707D15E04", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "0427B5C8-265C-47C3-9BAB-B2A0EAA1DEE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "89A4B962-BE5B-471C-83EF-674525C5AE83", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "7166ECCB-54FB-44EA-BA80-4D2AAF494AF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "6B309C89-99E2-4F0B-976C-95E44A45ADC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "A3DE7EE7-F627-4955-8D95-1F00F1F85C7D", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "D549098D-FE16-4BCB-91C4-D71A8C8D2E9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "57BFA165-6E2E-49AF-9E2D-3D8923CF36C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "F5C67DFF-A1BE-4486-A11F-CD3729927220", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "1D365E6E-8777-4084-BEC8-7CBF4997D976", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "20C4FF28-0DBA-4995-8252-2D62FF896BC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "F80C6B9B-AFCE-46A1-8DEF-51C1B526EB18", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "BF667DB5-F41E-4E73-A01F-4EC3F60BAD0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "D2B144FA-A901-4CDF-AC3D-7F5E820B7A4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "96774635-9A12-4DAB-BCF6-2D678F244CE9", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "EFD2EE7A-36CB-4A26-8EEB-DACA2864D921", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "C3898EBC-75A9-4DDD-A0AF-2CDEC72DAE4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "4267DCE8-985C-416D-A6B7-536585E5A573", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "50E63EDF-FF0A-447C-A3FC-7BA2414C15CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "61DDD4A1-6185-41B6-A715-4C70F0AA2631", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8:*:*:*:*:*:*:*", "matchCriteriaId": "B10A7E3C-07CD-48A6-9075-5314B4E1EEAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "319955A4-27A8-46FF-ACE7-97E6DF27B2DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "925CF3DD-682B-40E6-900C-23F784CD9239", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "16366780-611E-4217-A614-EBA01421D148", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "43AEA36F-E730-4305-9CB6-738A7152F02E", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.5:*:*:*:*:*:*:*", "matchCriteriaId": "2B9536BA-6334-4957-9632-6D64365B88AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.6:*:*:*:*:*:*:*", "matchCriteriaId": "F52FA32B-8048-4FD7-9D20-20DC5E52098B", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.11:*:*:*:*:*:*:*", "matchCriteriaId": "9FA92DF1-3AAD-46AC-A9E4-E9386C977818", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.13:*:*:*:*:*:*:*", "matchCriteriaId": "837D66DB-F9CB-41F1-A091-BCFBAC2F45B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.14:*:*:*:*:*:*:*", "matchCriteriaId": "74D12B67-6E66-419A-A28F-6306402931EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.17:*:*:*:*:*:*:*", "matchCriteriaId": "A71FCBED-B25D-48E3-916C-FBA9E0DE8D12", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "1A17995E-DCAF-465A-8ABD-F1EA0D538784", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "93D03D78-C56E-4189-97FC-916C918EDFEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "19A66C77-041F-4A12-8A36-233A6B50641C", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C945059C-EF39-486D-A804-FBB8704AB927", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "1258CA65-FBC1-4848-A9E5-A8F5E5D6FBD5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.11:*:*:*:*:*:*:*", "matchCriteriaId": "A91C6418-41F0-46EB-ACFC-FCE907F5AA87", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.13:*:*:*:*:*:*:*", "matchCriteriaId": "0C020534-7596-496C-B9B0-739F58F6F4EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "0A77D40C-6FF5-42BD-9EFB-B532824D7606", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "F04C6A76-2718-4DBA-8972-A3EECDDB1A17", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "38ACD96E-5582-4ED0-BBB1-C891094D8217", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "264386DA-747F-492C-B660-D49BE9DB7139", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "DC4066AC-BE10-4189-86F6-BF94443738DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "1C25A146-50D5-4BA2-ABA2-20BF8784D7DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "72E76256-997F-4229-9B03-7BC3074F359D", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "7A717C50-2C5A-4CD1-B2E6-8CDF450940CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "61F908FF-9986-4F71-B0B6-D6A86555EF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "B0C1F99C-A246-40D3-B84A-5D11FF24AC1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "028F7F83-AF15-443B-A7DB-4E695E62EAFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "B418C3CE-E6E6-401D-AD83-5BB181009A7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.6:pre4:*:*:*:*:*:*", "matchCriteriaId": "8BF06FD2-0A4C-4557-B8EF-F0F021179498", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.6:pre8:*:*:*:*:*:*", "matchCriteriaId": "38C949C2-07A0-4FE4-8FBF-86215CB999CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.6:pre9:*:*:*:*:*:*", "matchCriteriaId": "88B23630-79DD-4B69-BB01-286193BA562E", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc10:*:*:*:*:*:*", "matchCriteriaId": "5FE21564-68C0-4765-BA40-9D3046C4CB14", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc3:*:*:*:*:*:*", "matchCriteriaId": "208102ED-6F22-44C5-BAF1-FD85EACF208F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc4:*:*:*:*:*:*", "matchCriteriaId": "C1CF7767-EB24-44E2-8E59-B4DBC99AFD23", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc5:*:*:*:*:*:*", "matchCriteriaId": "CF3D6D4C-5FD8-4EE1-A34A-99D397F09E85", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc7:*:*:*:*:*:*", "matchCriteriaId": "D63D88C1-B201-4D48-9659-5802DC4FD3EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc8:*:*:*:*:*:*", "matchCriteriaId": "16463B23-E884-467E-9F63-6B57EED39856", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc9:*:*:*:*:*:*", "matchCriteriaId": "9F2C03AF-666D-4AF6-BC69-F8B081EB41AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "84F90AFA-4B13-46A0-89D7-4065300C94C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "5DAD0F05-8B55-43ED-89D5-61A19F41EDFF", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "99053698-7F8B-4E71-8647-1A8B0DF7CEB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "9314F22D-22A8-4374-A2BF-3C64CF1F69BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "816E9640-A932-4E2F-9793-689F80D2AA89", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "5D09BB43-6CBA-499B-91D1-BA256A65E40D", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "ABE76611-08CE-4D85-B57A-021909835A81", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc1:*:*:*:*:*:*", "matchCriteriaId": "B98AFEDF-2BAB-4588-94E0-35AEA5F1B514", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc2:*:*:*:*:*:*", "matchCriteriaId": "4E8BAB5B-4DBC-4D05-B5E2-591573BC05FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc3:*:*:*:*:*:*", "matchCriteriaId": "02F6E729-A2F2-42AC-A941-F57A0A4E84A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc4:*:*:*:*:*:*", "matchCriteriaId": "4143D519-4B49-4E71-8686-FC6A095F0999", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc5:*:*:*:*:*:*", "matchCriteriaId": "387ADB82-4FAD-44DA-ABF2-2F4645C4F1E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "CED4FBCB-B6DF-429D-871D-2A9F7F59E63B", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "237F86BD-82CD-4A37-BF64-F103B1304F0C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "sink.c in fetchmail before 6.3.9 allows context-dependent attackers to cause a denial of service (NULL dereference and application crash) by refusing certain warning messages that are sent over SMTP." }, { "lang": "es", "value": "El archivo sink.c en fetchmail versiones anteriores a 6.3.9, permite a atacantes dependiendo del contexto causar una denegaci\u00f3n de servicio (desreferencia del NULL y bloqueo de aplicaci\u00f3n) al rechazar ciertos mensajes de advertencia que son enviados mediante SMTP." } ], "id": "CVE-2007-4565", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-08-28T01:17:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://fetchmail.berlios.de/fetchmail-SA-2007-02.txt" }, { "source": "cve@mitre.org", "url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00008.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://mknod.org/svn/fetchmail/branches/BRANCH_6-3/fetchmail-SA-2007-02.txt" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/45833" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/27399" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/33937" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/3074" }, { "source": "cve@mitre.org", "url": "http://support.apple.com/kb/HT3438" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2007/dsa-1377" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:179" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/478798/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/493388/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/25495" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1018627" }, { "source": "cve@mitre.org", "url": "http://www.trustix.org/errata/2007/0028/" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/usn-520-1" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/3032" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2009/0422" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36385" }, { "source": "cve@mitre.org", "url": "https://issues.rpath.com/browse/RPL-1690" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10528" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://fetchmail.berlios.de/fetchmail-SA-2007-02.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00008.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://mknod.org/svn/fetchmail/branches/BRANCH_6-3/fetchmail-SA-2007-02.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/45833" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/27399" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/33937" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/3074" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.apple.com/kb/HT3438" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2007/dsa-1377" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:179" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/478798/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/493388/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/25495" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1018627" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.trustix.org/errata/2007/0028/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/usn-520-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/3032" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2009/0422" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36385" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://issues.rpath.com/browse/RPL-1690" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10528" } ], "sourceIdentifier": "cve@mitre.org", "vendorComments": [ { "comment": "This issue was addressed in fetchmail packages as shipped in Red Hat Enterprise Linux 3, 4, and 5 via:\n\nhttps://rhn.redhat.com/errata/RHSA-2009-1427.html", "lastModified": "2009-09-09T00:00:00", "organization": "Red Hat" } ], "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-07-30 14:15
Modified
2024-11-21 06:13
Severity ?
Summary
report_vbuild in report.c in Fetchmail before 6.4.20 sometimes omits initialization of the vsnprintf va_list argument, which might allow mail servers to cause a denial of service or possibly have unspecified other impact via long error messages. NOTE: it is unclear whether use of Fetchmail on any realistic platform results in an impact beyond an inconvenience to the client user.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.openwall.com/lists/oss-security/2021/07/28/5 | Mailing List, Patch, Third Party Advisory | |
cve@mitre.org | http://www.openwall.com/lists/oss-security/2021/08/09/1 | Mailing List | |
cve@mitre.org | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AGYO5AHSXTCKA4NQC2Z4H3XMMYNAGC77/ | ||
cve@mitre.org | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OIXKO6QW3AUHGJVWKJXBCOVBYJUJRBFC/ | ||
cve@mitre.org | https://security.gentoo.org/glsa/202209-14 | Third Party Advisory | |
cve@mitre.org | https://www.fetchmail.info/fetchmail-SA-2021-01.txt | Vendor Advisory | |
cve@mitre.org | https://www.fetchmail.info/security.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2021/07/28/5 | Mailing List, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2021/08/09/1 | Mailing List | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AGYO5AHSXTCKA4NQC2Z4H3XMMYNAGC77/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OIXKO6QW3AUHGJVWKJXBCOVBYJUJRBFC/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/202209-14 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.fetchmail.info/fetchmail-SA-2021-01.txt | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.fetchmail.info/security.html | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
fetchmail | fetchmail | * | |
fedoraproject | fedora | 33 | |
fedoraproject | fedora | 34 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fetchmail:fetchmail:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F3BEF4E-E90A-482F-AFC9-C0CE0619ACB1", "versionEndExcluding": "6.4.20", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "report_vbuild in report.c in Fetchmail before 6.4.20 sometimes omits initialization of the vsnprintf va_list argument, which might allow mail servers to cause a denial of service or possibly have unspecified other impact via long error messages. NOTE: it is unclear whether use of Fetchmail on any realistic platform results in an impact beyond an inconvenience to the client user." }, { "lang": "es", "value": "Una funci\u00f3n report_vbuild en el archivo report.c en Fetchmail versiones anteriores a 6.4.20, a veces omite la inicializaci\u00f3n del argumento vsnprintf va_list, lo que podr\u00eda permitir a servidores de correo causar una denegaci\u00f3n de servicio o posiblemente tener otro impacto no especificado por medio de largos mensajes de error. NOTA: no est\u00e1 claro si el uso de Fetchmail en cualquier plataforma realista presenta un impacto m\u00e1s all\u00e1 de un inconveniente para el usuario cliente" } ], "id": "CVE-2021-36386", "lastModified": "2024-11-21T06:13:39.480", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-07-30T14:15:18.140", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2021/07/28/5" }, { "source": "cve@mitre.org", "tags": [ "Mailing List" ], "url": "http://www.openwall.com/lists/oss-security/2021/08/09/1" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AGYO5AHSXTCKA4NQC2Z4H3XMMYNAGC77/" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OIXKO6QW3AUHGJVWKJXBCOVBYJUJRBFC/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202209-14" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.fetchmail.info/fetchmail-SA-2021-01.txt" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.fetchmail.info/security.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2021/07/28/5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "http://www.openwall.com/lists/oss-security/2021/08/09/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AGYO5AHSXTCKA4NQC2Z4H3XMMYNAGC77/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OIXKO6QW3AUHGJVWKJXBCOVBYJUJRBFC/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202209-14" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.fetchmail.info/fetchmail-SA-2021-01.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.fetchmail.info/security.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-909" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }