The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[UNIX] Fetchmail DoS and Code Execution Vulnerabilities (POP3, UID)


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
From: SecuriTeam <support@securiteam.com.>
To: [email protected]
Date: 8 Aug 2005 15:38:03 +0200
Subject: [UNIX] Fetchmail DoS and Code Execution Vulnerabilities (POP3, UID)
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <20050808130738.D88B157CC@mail.tyumen.ru.>
X-Virus-Scanned: antivirus-gw at tyumen.ru

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html 

- - - - - - - - -




  Fetchmail DoS and Code Execution Vulnerabilities (POP3, UID)
------------------------------------------------------------------------


SUMMARY

fetchmail is "a software package to retrieve mail from remote POP2, POP3, 
IMAP, ETRN or ODMR servers and forward it to local SMTP, LMTP servers or 
message delivery agents".

The POP3 code in fetchmail-6.2.5 and older that deals with UIDs (from the 
UIDL) reads the responses returned by the POP3 server into fixed-size 
buffers allocated on the stack, without limiting the input length to the 
buffer size. A compromised or malicious POP3 server can thus overrun 
fetchmail's stack. This affects POP3 and all of its variants, for instance 
but not limited to APOP.

In fetchmail-6.2.5.1, the attempted fix prevented code injection via POP3 
UIDL, but introduced two possible NULL dereferences that can be exploited 
to mount a denial of service attack.

DETAILS

Vulnerable Systems:
 * fetchmail version 6.2.5.1 (denial of service)
 * fetchmail version 6.2.5 (code injection)
 * fetchmail version 6.2.0 (code injection)

Immune Systems:
 * fetchmail version 6.2.5.2
 * fetchmail version 6.2.6-pre7
 * fetchmail version 6.3.0 (not released yet)

Impact:
In fetchmail-6.2.5 and older, very long UIDs can cause fetchmail to crash, 
or potentially make it execute code placed on the stack. In some 
configurations, fetchmail is run by the root user to download mail for 
multiple accounts.

In fetchmail-6.2.5.1, a server that responds with UID lines containing 
only the article number but no UID (in violation of RFC-1939), or a 
message without Message-ID when no UIDL support is available, can crash 
fetchmail.

Solution:
Upgrade your fetchmail package to version 6.2.5.2.

You can either download a complete tarball of fetchmail-6.2.5.2.tar.gz, or 
you can download a patch against fetchmail-6.2.5 if you already have the 
6.2.5 tarball. Either is available from:  
<http://developer.berlios.de/project/showfiles.php?group_id=1824>; 
http://developer.berlios.de/project/showfiles.php?group_id=1824

To use the patch:
1. download fetchmail-6.2.5.tar.gz (or retrieve the version you already 
had downloaded) and fetchmail-patch-6.2.5.2.tar.gz
2. unpack the tarball: gunzip -c fetchmail-6.2.5.tar.gz | tar xf -
3. unpack the patch: gunzip fetchmail-patch-6.2.5.2.gz
4. apply the patch: cd fetchmail-6.2.5 ; patch -p1 
<../fetchmail-patch-6.2.5.2
5. now configure and build as usual - detailed instructions in the file 
named "INSTALL".


ADDITIONAL INFORMATION

The information has been provided by  
<mailto:[email protected]> Matthias Andree.
The original article can be found at:  
<http://fetchmail.berlios.de/fetchmail-SA-2005-01.txt>; 
http://fetchmail.berlios.de/fetchmail-SA-2005-01.txt




This bulletin is sent to members of the SecuriTeam mailing list. To unsubscribe from the list, send mail with an empty subject line and body to: [email protected] In order to subscribe to the mailing list, simply forward this email to: [email protected]

DISCLAIMER: The information in this bulletin is provided "AS IS" without warranty of any kind. In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру