Family: Debian Local Security Checks --> Category: infos
[DSA774] DSA-774-1 fetchmail Vulnerability Scan
Vulnerability Scan Summary
Detailed Explanation for this Vulnerability Test
Edward Shornock discovered a bug in the UIDL handling code of
fetchmail, a common POP3, APOP and IMAP mail fetching utility. A
malicious POP3 server could exploit this problem and inject arbitrary
code that will be executed on the victim host. If fetchmail is
running as root, this becomes a root exploit.
The old stable distribution (woody) is not affected by this problem.
For the stable distribution (sarge) this problem has been fixed in
For the unstable distribution (sid) this problem has been fixed in
We recommend that you upgrade your fetchmail package.
Solution : http://www.debian.org/security/2005/dsa-774
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.