Vulnerability Scanning Solutions, LLC.
Our Process
What We Scan For
Sample Report
Client List
Contact Us
What We Scan For
Family: Mandrake Local Security Checks --> Category: infos

MDKSA-2005:209: fetchmail Vulnerability Scan

Vulnerability Scan Summary
Check for the version of the fetchmail package

Detailed Explanation for this Vulnerability Test

The remote host is missing the patch for the advisory MDKSA-2005:209 (fetchmail).

Thomas Wolff and Miloslav Trmac discovered a race condition in the
fetchmailconf program. fetchmailconf would create the initial output
configuration file with insecure permissions and only after writing would it
change permissions to be more restrictive. During that time, passwords and
other data could be exposed to other users on the system unless the user used a
more restrictive umask setting. As well, the Mandriva Linux 2006 packages did
not contain the patch that corrected the issues fixed in MDKSA-2005:126, namely
a buffer overflow in fetchmail's POP3 client (CVE-2005-2355). The updated
packages have been patched to address this issue, and the Mandriva 2006
packages have also been patched to correct CVE-2005-2355.

Solution :
Threat Level: High

Click HERE for more information and discussions on this network vulnerability scan.


P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.