Gentoo alert: Fetchmail 6.2.5 fixes a remote DoS

Posted by dave on Mar 31, 2004 3:06 AM EDT
Mailing list
Mail this story
Print this story

Fetchmail versions 6.2.4 and earlier can be crashed by sending a specially-crafted email to a fetchmail user.



--EFrEOWQ9ye2lTNjK Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200403-10 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Severity: Normal Title: Fetchmail 6.2.5 fixes a remote DoS Date: March 30, 2004 Bugs: #37717 ID: 200403-10

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis ========

Fetchmail versions 6.2.4 and earlier can be crashed by sending a specially-crafted email to a fetchmail user.

Background ==========

Fetchmail is a utility that retrieves and forwards mail from remote systems using IMAP, POP, and other protocols.

Affected packages =================

------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- net-mail/fetchmail <= 6.2.4 >= 6.2.5

Description ===========

Fetchmail versions 6.2.4 and earlier can be crashed by sending a specially-crafted email to a fetchmail user. This problem occurs because Fetchmail does not properly allocate memory for long lines in an incoming email.

Impact ======

Fetchmail users who receive a malicious email may have their fetchmail program crash.

Workaround ==========

While a workaround is not currently known for this issue, all users are advised to upgrade to the latest version of the affected package.

Resolution ==========

Fetchmail users should upgrade to version 6.2.5 or later:

# emerge sync # emerge -pv ">=net-mail/fetchmail-6.2.5" # emerge ">=net-mail/fetchmail-6.2.5"

References ==========

[ 1 ] http://xforce.iss.net/xforce/xfdb/13450 [ 2 ] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0792

Concerns? =========

Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to [e-mail:security@gentoo.org] or alternatively, you may file a bug at http://bugs.gentoo.org.

--EFrEOWQ9ye2lTNjK Content-Type: application/pgp-signature Content-Disposition: inline

-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.3 (GNU/Linux)

iD8DBQFAanfvJPpRNiftIEYRAscGAJ9SSuMM6K/NpReNuHwrYY7syX3erwCfRKSm TNRLyeiEQcT7bUg56G0EEDQ= =5Ypa -----END PGP SIGNATURE-----

--EFrEOWQ9ye2lTNjK--

[PARSEASHTML]

  Nav
» Read more about: Story Type: Security; Groups: Gentoo

« Return to the newswire homepage

This topic does not have any threads posted yet!

You cannot post until you login.