The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[ GLSA 200403-10 ] Fetchmail 6.2.5 fixes a remote DoS


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
Date: Wed, 31 Mar 2004 02:48:47 -0500
From: Kurt Lieber <[email protected]>
To: [email protected], [email protected],
Subject: [ GLSA 200403-10 ] Fetchmail 6.2.5 fixes a remote DoS

--YzDuxKLL0xGMARRp
Content-Type: text/plain; charset=iso-8859-1
Content-Disposition: inline

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory                           GLSA 200403-10
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                                             http://security.gentoo.org
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

  Severity: Normal
     Title: Fetchmail 6.2.5 fixes a remote DoS
      Date: March 30, 2004
      Bugs: #37717
        ID: 200403-10

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis
========

Fetchmail versions 6.2.4 and earlier can be crashed by sending a
specially-crafted email to a fetchmail user.

Background
==========

Fetchmail is a utility that retrieves and forwards mail from remote
systems using IMAP, POP, and other protocols.

Affected packages
=================

    -------------------------------------------------------------------
     Package             /   Vulnerable   /                 Unaffected
    -------------------------------------------------------------------
     net-mail/fetchmail       <= 6.2.4                        >= 6.2.5

Description
===========

Fetchmail versions 6.2.4 and earlier can be crashed by sending a
specially-crafted email to a fetchmail user. This problem occurs
because Fetchmail does not properly allocate memory for long lines in
an incoming email.

Impact
======

Fetchmail users who receive a malicious email may have their fetchmail
program crash.

Workaround
==========

While a workaround is not currently known for this issue, all users are
advised to upgrade to the latest version of the affected package.

Resolution
==========

Fetchmail users should upgrade to version 6.2.5 or later:

    # emerge sync
    # emerge -pv ">=net-mail/fetchmail-6.2.5"
    # emerge ">=net-mail/fetchmail-6.2.5"

References
==========

  [ 1 ] http://xforce.iss.net/xforce/xfdb/13450
  [ 2 ] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0792

Concerns?
=========

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
[email protected] or alternatively, you may file a bug at
http://bugs.gentoo.org.

--YzDuxKLL0xGMARRp
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.3 (GNU/Linux)

iD8DBQFAanffJPpRNiftIEYRAlP5AJ4/eAmDS9l8Y+hpsASLke1Tpxo2AQCeIZEg
e4Xakbks+5mcBSEDhtG12CE=
=town
-----END PGP SIGNATURE-----

--YzDuxKLL0xGMARRp--

<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2024 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру