Vulnerability Scanning Solutions, LLC.
Home
Our Process
Residential
Corporate
What We Scan For
Sample Report
Client List
Terms
Contact Us
What We Scan For
Family: Gentoo Local Security Checks --> Category: infos

[GLSA-200507-21] fetchmail: Buffer Overflow Vulnerability Scan


Vulnerability Scan Summary
fetchmail: Buffer Overflow

Detailed Explanation for this Vulnerability Test
The remote host is affected by the vulnerability described in GLSA-200507-21
(fetchmail: Buffer Overflow)


fetchmail does not properly validate UIDs coming from a POP3 mail
server. The UID is placed in a fixed length buffer on the stack, which
can be overflown.

Impact

Very long UIDs returned from a malicious or compromised POP3
server can cause fetchmail to crash, resulting in a Denial of Service,
or allow arbitrary code to be placed on the stack.

Workaround

There are no known workarounds at this time.

References:
http://fetchmail.berlios.de/fetchmail-SA-2005-01.txt
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2335


Solution:
All fetchmail users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-mail/fetchmail-6.2.5.2"


Threat Level: Medium


Click HERE for more information and discussions on this network vulnerability scan.

VSS, LLC.

P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.