Search criteria Use this form to refine search results.
Full-text search supports keyword queries with ranking and filtering.
You can combine vendor, product, and sources to narrow results.
Enable “Apply ordering” to sort by date instead of relevance.

25 vulnerabilities by fetchmail

CVE-2025-61962 (GCVE-0-2025-61962)

Vulnerability from cvelistv5 – Published: 2025-10-04 00:00 – Updated: 2025-11-04 21:14
VLAI?
Summary
In fetchmail before 6.5.6, the SMTP client can crash when authenticating upon receiving a 334 status code in a malformed context.
CWE
  • CWE-142 - Improper Neutralization of Value Delimiters
Assigner
Impacted products
Vendor Product Version
fetchmail fetchmail Affected: 5.9.9 , < 6.5.6 (semver)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-61962",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-10-06T14:20:46.927097Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-06T14:20:57.032Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2025-11-04T21:14:11.806Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "url": "http://www.openwall.com/lists/oss-security/2025/10/04/3"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "fetchmail",
          "vendor": "fetchmail",
          "versions": [
            {
              "lessThan": "6.5.6",
              "status": "affected",
              "version": "5.9.9",
              "versionType": "semver"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:a:fetchmail:fetchmail:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.5.6",
                  "versionStartIncluding": "5.9.9",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In fetchmail before 6.5.6, the SMTP client can crash when authenticating upon receiving a 334 status code in a malformed context."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-142",
              "description": "CWE-142 Improper Neutralization of Value Delimiters",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-04T02:51:57.449Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://www.openwall.com/lists/oss-security/2025/10/03/2"
        },
        {
          "url": "https://www.fetchmail.info/fetchmail-SA-2025-01.txt"
        },
        {
          "url": "https://gitlab.com/fetchmail/fetchmail/-/commit/4c3cebfa4e659fb778ca2cae0ccb3f69201609a8"
        }
      ],
      "source": {
        "discovery": "INTERNAL"
      },
      "x_generator": {
        "engine": "enrichogram 0.0.1"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2025-61962",
    "datePublished": "2025-10-04T00:00:00.000Z",
    "dateReserved": "2025-10-04T00:00:00.000Z",
    "dateUpdated": "2025-11-04T21:14:11.806Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2021-39272 (GCVE-0-2021-39272)

Vulnerability from cvelistv5 – Published: 2021-08-30 05:05 – Updated: 2024-08-04 02:06
VLAI?
Summary
Fetchmail before 6.4.22 fails to enforce STARTTLS session encryption in some circumstances, such as a certain situation with IMAP and PREAUTH.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T02:06:41.615Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.fetchmail.info/security.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://nostarttls.secvuln.info/"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2021/08/27/3"
          },
          {
            "name": "FEDORA-2021-ddefbdbb46",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3XJ6XLEJCEZCAM5LGGD6XBCC522QLG4/"
          },
          {
            "name": "FEDORA-2021-9998719311",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZYCYLL73NP7ALJWSDICIVSA47ZIXWSSA/"
          },
          {
            "name": "FEDORA-2021-e61a978fef",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VXMKSEHAQSEDCWZMAOJEGX3P3JW6QY6H/"
          },
          {
            "name": "GLSA-202209-14",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/202209-14"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Fetchmail before 6.4.22 fails to enforce STARTTLS session encryption in some circumstances, such as a certain situation with IMAP and PREAUTH."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-09-25T15:07:04.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.fetchmail.info/security.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://nostarttls.secvuln.info/"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2021/08/27/3"
        },
        {
          "name": "FEDORA-2021-ddefbdbb46",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3XJ6XLEJCEZCAM5LGGD6XBCC522QLG4/"
        },
        {
          "name": "FEDORA-2021-9998719311",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZYCYLL73NP7ALJWSDICIVSA47ZIXWSSA/"
        },
        {
          "name": "FEDORA-2021-e61a978fef",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VXMKSEHAQSEDCWZMAOJEGX3P3JW6QY6H/"
        },
        {
          "name": "GLSA-202209-14",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/202209-14"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2021-39272",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Fetchmail before 6.4.22 fails to enforce STARTTLS session encryption in some circumstances, such as a certain situation with IMAP and PREAUTH."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.fetchmail.info/security.html",
              "refsource": "MISC",
              "url": "https://www.fetchmail.info/security.html"
            },
            {
              "name": "https://nostarttls.secvuln.info/",
              "refsource": "MISC",
              "url": "https://nostarttls.secvuln.info/"
            },
            {
              "name": "http://www.openwall.com/lists/oss-security/2021/08/27/3",
              "refsource": "MISC",
              "url": "http://www.openwall.com/lists/oss-security/2021/08/27/3"
            },
            {
              "name": "FEDORA-2021-ddefbdbb46",
              "refsource": "FEDORA",
              "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L3XJ6XLEJCEZCAM5LGGD6XBCC522QLG4/"
            },
            {
              "name": "FEDORA-2021-9998719311",
              "refsource": "FEDORA",
              "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZYCYLL73NP7ALJWSDICIVSA47ZIXWSSA/"
            },
            {
              "name": "FEDORA-2021-e61a978fef",
              "refsource": "FEDORA",
              "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXMKSEHAQSEDCWZMAOJEGX3P3JW6QY6H/"
            },
            {
              "name": "GLSA-202209-14",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/202209-14"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2021-39272",
    "datePublished": "2021-08-30T05:05:26.000Z",
    "dateReserved": "2021-08-18T00:00:00.000Z",
    "dateUpdated": "2024-08-04T02:06:41.615Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-36386 (GCVE-0-2021-36386)

Vulnerability from cvelistv5 – Published: 2021-07-29 13:59 – Updated: 2024-08-04 00:54
VLAI?
Summary
report_vbuild in report.c in Fetchmail before 6.4.20 sometimes omits initialization of the vsnprintf va_list argument, which might allow mail servers to cause a denial of service or possibly have unspecified other impact via long error messages. NOTE: it is unclear whether use of Fetchmail on any realistic platform results in an impact beyond an inconvenience to the client user.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T00:54:51.476Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.fetchmail.info/security.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2021/07/28/5"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.fetchmail.info/fetchmail-SA-2021-01.txt"
          },
          {
            "name": "[oss-security] 20210809 fetchmail 6.4.21 released/regression fix for 6.4.20\u0027s security fix, and UPDATE: fetchmail \u003c= 6.4.19 security announcement 2021-01 (CVE-2021-36386)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2021/08/09/1"
          },
          {
            "name": "FEDORA-2021-47893f53ed",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OIXKO6QW3AUHGJVWKJXBCOVBYJUJRBFC/"
          },
          {
            "name": "FEDORA-2021-b904d99ce5",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AGYO5AHSXTCKA4NQC2Z4H3XMMYNAGC77/"
          },
          {
            "name": "GLSA-202209-14",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/202209-14"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "report_vbuild in report.c in Fetchmail before 6.4.20 sometimes omits initialization of the vsnprintf va_list argument, which might allow mail servers to cause a denial of service or possibly have unspecified other impact via long error messages. NOTE: it is unclear whether use of Fetchmail on any realistic platform results in an impact beyond an inconvenience to the client user."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-09-25T15:07:03.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.fetchmail.info/security.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2021/07/28/5"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.fetchmail.info/fetchmail-SA-2021-01.txt"
        },
        {
          "name": "[oss-security] 20210809 fetchmail 6.4.21 released/regression fix for 6.4.20\u0027s security fix, and UPDATE: fetchmail \u003c= 6.4.19 security announcement 2021-01 (CVE-2021-36386)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2021/08/09/1"
        },
        {
          "name": "FEDORA-2021-47893f53ed",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OIXKO6QW3AUHGJVWKJXBCOVBYJUJRBFC/"
        },
        {
          "name": "FEDORA-2021-b904d99ce5",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AGYO5AHSXTCKA4NQC2Z4H3XMMYNAGC77/"
        },
        {
          "name": "GLSA-202209-14",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/202209-14"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2021-36386",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "report_vbuild in report.c in Fetchmail before 6.4.20 sometimes omits initialization of the vsnprintf va_list argument, which might allow mail servers to cause a denial of service or possibly have unspecified other impact via long error messages. NOTE: it is unclear whether use of Fetchmail on any realistic platform results in an impact beyond an inconvenience to the client user."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.fetchmail.info/security.html",
              "refsource": "MISC",
              "url": "https://www.fetchmail.info/security.html"
            },
            {
              "name": "http://www.openwall.com/lists/oss-security/2021/07/28/5",
              "refsource": "MISC",
              "url": "http://www.openwall.com/lists/oss-security/2021/07/28/5"
            },
            {
              "name": "https://www.fetchmail.info/fetchmail-SA-2021-01.txt",
              "refsource": "CONFIRM",
              "url": "https://www.fetchmail.info/fetchmail-SA-2021-01.txt"
            },
            {
              "name": "[oss-security] 20210809 fetchmail 6.4.21 released/regression fix for 6.4.20\u0027s security fix, and UPDATE: fetchmail \u003c= 6.4.19 security announcement 2021-01 (CVE-2021-36386)",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2021/08/09/1"
            },
            {
              "name": "FEDORA-2021-47893f53ed",
              "refsource": "FEDORA",
              "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIXKO6QW3AUHGJVWKJXBCOVBYJUJRBFC/"
            },
            {
              "name": "FEDORA-2021-b904d99ce5",
              "refsource": "FEDORA",
              "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AGYO5AHSXTCKA4NQC2Z4H3XMMYNAGC77/"
            },
            {
              "name": "GLSA-202209-14",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/202209-14"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2021-36386",
    "datePublished": "2021-07-29T13:59:24.000Z",
    "dateReserved": "2021-07-12T00:00:00.000Z",
    "dateUpdated": "2024-08-04T00:54:51.476Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-3482 (GCVE-0-2012-3482)

Vulnerability from cvelistv5 – Published: 2012-12-21 02:00 – Updated: 2024-08-06 20:05
VLAI?
Summary
Fetchmail 5.0.8 through 6.3.21, when using NTLM authentication in debug mode, allows remote NTLM servers to (1) cause a denial of service (crash and delayed delivery of inbound mail) via a crafted NTLM response that triggers an out-of-bounds read in the base64 decoder, or (2) obtain sensitive information from memory via an NTLM Type 2 message with a crafted Target Name structure, which triggers an out-of-bounds read.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Date Public ?
2012-08-13 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T20:05:12.577Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[oss-security] 20120813 Re: CVE ID request for fetchmail segfault in NTLM protocol exchange",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://seclists.org/oss-sec/2012/q3/232"
          },
          {
            "name": "[oss-security] 20120813 CVE ID request for fetchmail segfault in NTLM protocol exchange",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://seclists.org/oss-sec/2012/q3/230"
          },
          {
            "name": "54987",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/54987"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail"
          },
          {
            "name": "FEDORA-2012-14451",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-October/088871.html"
          },
          {
            "name": "FEDORA-2012-14462",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-October/088836.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.fetchmail.info/fetchmail-SA-2012-02.txt"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-08-13T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Fetchmail 5.0.8 through 6.3.21, when using NTLM authentication in debug mode, allows remote NTLM servers to (1) cause a denial of service (crash and delayed delivery of inbound mail) via a crafted NTLM response that triggers an out-of-bounds read in the base64 decoder, or (2) obtain sensitive information from memory via an NTLM Type 2 message with a crafted Target Name structure, which triggers an out-of-bounds read."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-04-05T09:00:00.000Z",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "[oss-security] 20120813 Re: CVE ID request for fetchmail segfault in NTLM protocol exchange",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://seclists.org/oss-sec/2012/q3/232"
        },
        {
          "name": "[oss-security] 20120813 CVE ID request for fetchmail segfault in NTLM protocol exchange",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://seclists.org/oss-sec/2012/q3/230"
        },
        {
          "name": "54987",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/54987"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail"
        },
        {
          "name": "FEDORA-2012-14451",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-October/088871.html"
        },
        {
          "name": "FEDORA-2012-14462",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-October/088836.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.fetchmail.info/fetchmail-SA-2012-02.txt"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2012-3482",
    "datePublished": "2012-12-21T02:00:00.000Z",
    "dateReserved": "2012-06-14T00:00:00.000Z",
    "dateUpdated": "2024-08-06T20:05:12.577Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-1947 (GCVE-0-2011-1947)

Vulnerability from cvelistv5 – Published: 2011-06-02 19:00 – Updated: 2024-08-06 22:46
VLAI?
Summary
fetchmail 5.9.9 through 6.3.19 does not properly limit the wait time after issuing a (1) STARTTLS or (2) STLS request, which allows remote servers to cause a denial of service (application hang) by acknowledging the request but not sending additional packets.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Date Public ?
2011-05-30 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T22:46:00.839Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[oss-security] 20110531 Re: CVE request for fetchmail STARTTLS hang (Denial of Service)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://openwall.com/lists/oss-security/2011/05/31/17"
          },
          {
            "name": "48043",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/48043"
          },
          {
            "name": "FEDORA-2011-8011",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061672.html"
          },
          {
            "name": "[oss-security] 20110531 Re: CVE request for fetchmail STARTTLS hang (Denial of Service)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://openwall.com/lists/oss-security/2011/05/31/12"
          },
          {
            "name": "[oss-security] 20110530 CVE request for fetchmail STARTTLS hang (Denial of Service)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://openwall.com/lists/oss-security/2011/05/30/1"
          },
          {
            "name": "20110606 fetchmail security announcement fetchmail-SA-2011-01 (CVE-2011-1947)",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/518251/100/0/threaded"
          },
          {
            "name": "FEDORA-2011-8059",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061634.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://gitorious.org/fetchmail/fetchmail/blobs/legacy_63/fetchmail-SA-2011-01.txt"
          },
          {
            "name": "1025605",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1025605"
          },
          {
            "name": "MDVSA-2011:107",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:107"
          },
          {
            "name": "FEDORA-2011-8021",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061735.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.fetchmail.info/fetchmail-SA-2011-01.txt"
          },
          {
            "name": "[oss-security] 20110601 Re: CVE request for fetchmail STARTTLS hang (Denial of Service)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://openwall.com/lists/oss-security/2011/06/01/2"
          },
          {
            "name": "fetchmail-starttls-dos(67700)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67700"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-05-30T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "fetchmail 5.9.9 through 6.3.19 does not properly limit the wait time after issuing a (1) STARTTLS or (2) STLS request, which allows remote servers to cause a denial of service (application hang) by acknowledging the request but not sending additional packets."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-09T18:57:01.000Z",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "[oss-security] 20110531 Re: CVE request for fetchmail STARTTLS hang (Denial of Service)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://openwall.com/lists/oss-security/2011/05/31/17"
        },
        {
          "name": "48043",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/48043"
        },
        {
          "name": "FEDORA-2011-8011",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061672.html"
        },
        {
          "name": "[oss-security] 20110531 Re: CVE request for fetchmail STARTTLS hang (Denial of Service)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://openwall.com/lists/oss-security/2011/05/31/12"
        },
        {
          "name": "[oss-security] 20110530 CVE request for fetchmail STARTTLS hang (Denial of Service)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://openwall.com/lists/oss-security/2011/05/30/1"
        },
        {
          "name": "20110606 fetchmail security announcement fetchmail-SA-2011-01 (CVE-2011-1947)",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/518251/100/0/threaded"
        },
        {
          "name": "FEDORA-2011-8059",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061634.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://gitorious.org/fetchmail/fetchmail/blobs/legacy_63/fetchmail-SA-2011-01.txt"
        },
        {
          "name": "1025605",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1025605"
        },
        {
          "name": "MDVSA-2011:107",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:107"
        },
        {
          "name": "FEDORA-2011-8021",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061735.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.fetchmail.info/fetchmail-SA-2011-01.txt"
        },
        {
          "name": "[oss-security] 20110601 Re: CVE request for fetchmail STARTTLS hang (Denial of Service)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://openwall.com/lists/oss-security/2011/06/01/2"
        },
        {
          "name": "fetchmail-starttls-dos(67700)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67700"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2011-1947",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "fetchmail 5.9.9 through 6.3.19 does not properly limit the wait time after issuing a (1) STARTTLS or (2) STLS request, which allows remote servers to cause a denial of service (application hang) by acknowledging the request but not sending additional packets."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[oss-security] 20110531 Re: CVE request for fetchmail STARTTLS hang (Denial of Service)",
              "refsource": "MLIST",
              "url": "http://openwall.com/lists/oss-security/2011/05/31/17"
            },
            {
              "name": "48043",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/48043"
            },
            {
              "name": "FEDORA-2011-8011",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061672.html"
            },
            {
              "name": "[oss-security] 20110531 Re: CVE request for fetchmail STARTTLS hang (Denial of Service)",
              "refsource": "MLIST",
              "url": "http://openwall.com/lists/oss-security/2011/05/31/12"
            },
            {
              "name": "[oss-security] 20110530 CVE request for fetchmail STARTTLS hang (Denial of Service)",
              "refsource": "MLIST",
              "url": "http://openwall.com/lists/oss-security/2011/05/30/1"
            },
            {
              "name": "20110606 fetchmail security announcement fetchmail-SA-2011-01 (CVE-2011-1947)",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/518251/100/0/threaded"
            },
            {
              "name": "FEDORA-2011-8059",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061634.html"
            },
            {
              "name": "http://gitorious.org/fetchmail/fetchmail/blobs/legacy_63/fetchmail-SA-2011-01.txt",
              "refsource": "CONFIRM",
              "url": "http://gitorious.org/fetchmail/fetchmail/blobs/legacy_63/fetchmail-SA-2011-01.txt"
            },
            {
              "name": "1025605",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1025605"
            },
            {
              "name": "MDVSA-2011:107",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:107"
            },
            {
              "name": "FEDORA-2011-8021",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061735.html"
            },
            {
              "name": "http://www.fetchmail.info/fetchmail-SA-2011-01.txt",
              "refsource": "CONFIRM",
              "url": "http://www.fetchmail.info/fetchmail-SA-2011-01.txt"
            },
            {
              "name": "[oss-security] 20110601 Re: CVE request for fetchmail STARTTLS hang (Denial of Service)",
              "refsource": "MLIST",
              "url": "http://openwall.com/lists/oss-security/2011/06/01/2"
            },
            {
              "name": "fetchmail-starttls-dos(67700)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67700"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2011-1947",
    "datePublished": "2011-06-02T19:00:00.000Z",
    "dateReserved": "2011-05-09T00:00:00.000Z",
    "dateUpdated": "2024-08-06T22:46:00.839Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2010-1167 (GCVE-0-2010-1167)

Vulnerability from cvelistv5 – Published: 2010-05-07 17:43 – Updated: 2024-08-07 01:14
VLAI?
Summary
fetchmail 4.6.3 through 6.3.16, when debug mode is enabled, does not properly handle invalid characters in a multi-character locale, which allows remote attackers to cause a denial of service (memory consumption and application crash) via a crafted (1) message header or (2) POP3 UIDL list.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Date Public ?
2010-05-06 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T01:14:06.646Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "39556",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/39556"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.fetchmail.info/fetchmail-SA-2010-02.txt"
          },
          {
            "name": "20100506 fetchmail security announcement fetchmail-SA-2010-02 (CVE-2010-1167)",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/511140/100/0/threaded"
          },
          {
            "name": "MDVSA-2011:107",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:107"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://developer.berlios.de/project/shownotes.php?group_id=1824\u0026release_id=17512"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2010-05-06T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "fetchmail 4.6.3 through 6.3.16, when debug mode is enabled, does not properly handle invalid characters in a multi-character locale, which allows remote attackers to cause a denial of service (memory consumption and application crash) via a crafted (1) message header or (2) POP3 UIDL list."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-10T18:57:01.000Z",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "39556",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/39556"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.fetchmail.info/fetchmail-SA-2010-02.txt"
        },
        {
          "name": "20100506 fetchmail security announcement fetchmail-SA-2010-02 (CVE-2010-1167)",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/511140/100/0/threaded"
        },
        {
          "name": "MDVSA-2011:107",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:107"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://developer.berlios.de/project/shownotes.php?group_id=1824\u0026release_id=17512"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2010-1167",
    "datePublished": "2010-05-07T17:43:00.000Z",
    "dateReserved": "2010-03-29T00:00:00.000Z",
    "dateUpdated": "2024-08-07T01:14:06.646Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2010-0562 (GCVE-0-2010-0562)

Vulnerability from cvelistv5 – Published: 2010-02-08 21:00 – Updated: 2024-08-07 00:52
VLAI?
Summary
The sdump function in sdump.c in fetchmail 6.3.11, 6.3.12, and 6.3.13, when running in verbose mode on platforms for which char is signed, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an SSL X.509 certificate containing non-printable characters with the high bit set, which triggers a heap-based buffer overflow during escaping.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.mandriva.com/security/advisories?name=… vendor-advisoryx_refsource_MANDRIVA
http://www.fetchmail.info/fetchmail-SA-2010-01.txt x_refsource_CONFIRM
http://www.securityfocus.com/bid/38088 vdb-entryx_refsource_BID
http://mknod.org/svn/fetchmail/branches/BRANCH_6-… x_refsource_CONFIRM
http://www.securitytracker.com/id?1023543 vdb-entryx_refsource_SECTRACK
http://secunia.com/advisories/38391 third-party-advisoryx_refsource_SECUNIA
http://osvdb.org/62114 vdb-entryx_refsource_OSVDB
http://www.vupen.com/english/advisories/2010/0296 vdb-entryx_refsource_VUPEN
Date Public ?
2010-02-04 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T00:52:19.355Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "MDVSA-2010:037",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:037"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.fetchmail.info/fetchmail-SA-2010-01.txt"
          },
          {
            "name": "38088",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/38088"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://mknod.org/svn/fetchmail/branches/BRANCH_6-3/fetchmail-SA-2010-01.txt"
          },
          {
            "name": "1023543",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1023543"
          },
          {
            "name": "38391",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/38391"
          },
          {
            "name": "62114",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/62114"
          },
          {
            "name": "ADV-2010-0296",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2010/0296"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2010-02-04T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "The sdump function in sdump.c in fetchmail 6.3.11, 6.3.12, and 6.3.13, when running in verbose mode on platforms for which char is signed, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an SSL X.509 certificate containing non-printable characters with the high bit set, which triggers a heap-based buffer overflow during escaping."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2010-02-24T10:00:00.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "MDVSA-2010:037",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:037"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.fetchmail.info/fetchmail-SA-2010-01.txt"
        },
        {
          "name": "38088",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/38088"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://mknod.org/svn/fetchmail/branches/BRANCH_6-3/fetchmail-SA-2010-01.txt"
        },
        {
          "name": "1023543",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1023543"
        },
        {
          "name": "38391",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/38391"
        },
        {
          "name": "62114",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/62114"
        },
        {
          "name": "ADV-2010-0296",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2010/0296"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2010-0562",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The sdump function in sdump.c in fetchmail 6.3.11, 6.3.12, and 6.3.13, when running in verbose mode on platforms for which char is signed, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an SSL X.509 certificate containing non-printable characters with the high bit set, which triggers a heap-based buffer overflow during escaping."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "MDVSA-2010:037",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:037"
            },
            {
              "name": "http://www.fetchmail.info/fetchmail-SA-2010-01.txt",
              "refsource": "CONFIRM",
              "url": "http://www.fetchmail.info/fetchmail-SA-2010-01.txt"
            },
            {
              "name": "38088",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/38088"
            },
            {
              "name": "http://mknod.org/svn/fetchmail/branches/BRANCH_6-3/fetchmail-SA-2010-01.txt",
              "refsource": "CONFIRM",
              "url": "http://mknod.org/svn/fetchmail/branches/BRANCH_6-3/fetchmail-SA-2010-01.txt"
            },
            {
              "name": "1023543",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1023543"
            },
            {
              "name": "38391",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/38391"
            },
            {
              "name": "62114",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/62114"
            },
            {
              "name": "ADV-2010-0296",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2010/0296"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2010-0562",
    "datePublished": "2010-02-08T21:00:00.000Z",
    "dateReserved": "2010-02-08T00:00:00.000Z",
    "dateUpdated": "2024-08-07T00:52:19.355Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-2666 (GCVE-0-2009-2666)

Vulnerability from cvelistv5 – Published: 2009-08-07 18:33 – Updated: 2024-08-07 05:59
VLAI?
Summary
socket.c in fetchmail before 6.3.11 does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.mandriva.com/security/advisories?name=… vendor-advisoryx_refsource_MANDRIVA
http://secunia.com/advisories/36175 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/36236 third-party-advisoryx_refsource_SECUNIA
http://www.debian.org/security/2009/dsa-1852 vendor-advisoryx_refsource_DEBIAN
http://fetchmail.berlios.de/fetchmail-SA-2009-01.txt x_refsource_CONFIRM
http://marc.info/?l=oss-security&m=124949601207156&w=2 mailing-listx_refsource_MLIST
http://www.securityfocus.com/archive/1/505530/100… mailing-listx_refsource_BUGTRAQ
http://www.slackware.com/security/viewer.php?l=sl… vendor-advisoryx_refsource_SLACKWARE
http://secunia.com/advisories/36179 third-party-advisoryx_refsource_SECUNIA
http://www.securitytracker.com/id?1022679 vdb-entryx_refsource_SECTRACK
http://osvdb.org/56855 vdb-entryx_refsource_OSVDB
https://oval.cisecurity.org/repository/search/def… vdb-entrysignaturex_refsource_OVAL
http://www.vupen.com/english/advisories/2009/3184 vdb-entryx_refsource_VUPEN
http://www.vupen.com/english/advisories/2009/2155 vdb-entryx_refsource_VUPEN
http://lists.apple.com/archives/security-announce… vendor-advisoryx_refsource_APPLE
http://support.apple.com/kb/HT3937 x_refsource_CONFIRM
http://www.securityfocus.com/bid/35951 vdb-entryx_refsource_BID
Date Public ?
2009-08-05 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T05:59:56.877Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "MDVSA-2009:201",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:201"
          },
          {
            "name": "36175",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/36175"
          },
          {
            "name": "36236",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/36236"
          },
          {
            "name": "DSA-1852",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2009/dsa-1852"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://fetchmail.berlios.de/fetchmail-SA-2009-01.txt"
          },
          {
            "name": "[oss-security] 20090805 Re: CVE request: fetchmail \u003c= 6.3.10 SSL certificate",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=oss-security\u0026m=124949601207156\u0026w=2"
          },
          {
            "name": "20090806 fetchmail security announcement fetchmail-SA-2009-01 (CVE-2009-2666)",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/505530/100/0/threaded"
          },
          {
            "name": "SSA:2009-218-01",
            "tags": [
              "vendor-advisory",
              "x_refsource_SLACKWARE",
              "x_transferred"
            ],
            "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.543463"
          },
          {
            "name": "36179",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/36179"
          },
          {
            "name": "1022679",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1022679"
          },
          {
            "name": "56855",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/56855"
          },
          {
            "name": "oval:org.mitre.oval:def:11059",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11059"
          },
          {
            "name": "ADV-2009-3184",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/3184"
          },
          {
            "name": "ADV-2009-2155",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/2155"
          },
          {
            "name": "APPLE-SA-2009-11-09-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.apple.com/kb/HT3937"
          },
          {
            "name": "35951",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/35951"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-08-05T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "socket.c in fetchmail before 6.3.11 does not properly handle a \u0027\\0\u0027 character in a domain name in the subject\u0027s Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-10T18:57:01.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "MDVSA-2009:201",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:201"
        },
        {
          "name": "36175",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/36175"
        },
        {
          "name": "36236",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/36236"
        },
        {
          "name": "DSA-1852",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2009/dsa-1852"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://fetchmail.berlios.de/fetchmail-SA-2009-01.txt"
        },
        {
          "name": "[oss-security] 20090805 Re: CVE request: fetchmail \u003c= 6.3.10 SSL certificate",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://marc.info/?l=oss-security\u0026m=124949601207156\u0026w=2"
        },
        {
          "name": "20090806 fetchmail security announcement fetchmail-SA-2009-01 (CVE-2009-2666)",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/505530/100/0/threaded"
        },
        {
          "name": "SSA:2009-218-01",
          "tags": [
            "vendor-advisory",
            "x_refsource_SLACKWARE"
          ],
          "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.543463"
        },
        {
          "name": "36179",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/36179"
        },
        {
          "name": "1022679",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1022679"
        },
        {
          "name": "56855",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/56855"
        },
        {
          "name": "oval:org.mitre.oval:def:11059",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11059"
        },
        {
          "name": "ADV-2009-3184",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/3184"
        },
        {
          "name": "ADV-2009-2155",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/2155"
        },
        {
          "name": "APPLE-SA-2009-11-09-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.apple.com/kb/HT3937"
        },
        {
          "name": "35951",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/35951"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-2666",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "socket.c in fetchmail before 6.3.11 does not properly handle a \u0027\\0\u0027 character in a domain name in the subject\u0027s Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "MDVSA-2009:201",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:201"
            },
            {
              "name": "36175",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/36175"
            },
            {
              "name": "36236",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/36236"
            },
            {
              "name": "DSA-1852",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2009/dsa-1852"
            },
            {
              "name": "http://fetchmail.berlios.de/fetchmail-SA-2009-01.txt",
              "refsource": "CONFIRM",
              "url": "http://fetchmail.berlios.de/fetchmail-SA-2009-01.txt"
            },
            {
              "name": "[oss-security] 20090805 Re: CVE request: fetchmail \u003c= 6.3.10 SSL certificate",
              "refsource": "MLIST",
              "url": "http://marc.info/?l=oss-security\u0026m=124949601207156\u0026w=2"
            },
            {
              "name": "20090806 fetchmail security announcement fetchmail-SA-2009-01 (CVE-2009-2666)",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/505530/100/0/threaded"
            },
            {
              "name": "SSA:2009-218-01",
              "refsource": "SLACKWARE",
              "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.543463"
            },
            {
              "name": "36179",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/36179"
            },
            {
              "name": "1022679",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1022679"
            },
            {
              "name": "56855",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/56855"
            },
            {
              "name": "oval:org.mitre.oval:def:11059",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11059"
            },
            {
              "name": "ADV-2009-3184",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/3184"
            },
            {
              "name": "ADV-2009-2155",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/2155"
            },
            {
              "name": "APPLE-SA-2009-11-09-1",
              "refsource": "APPLE",
              "url": "http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html"
            },
            {
              "name": "http://support.apple.com/kb/HT3937",
              "refsource": "CONFIRM",
              "url": "http://support.apple.com/kb/HT3937"
            },
            {
              "name": "35951",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/35951"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-2666",
    "datePublished": "2009-08-07T18:33:00.000Z",
    "dateReserved": "2009-08-05T00:00:00.000Z",
    "dateUpdated": "2024-08-07T05:59:56.877Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-2711 (GCVE-0-2008-2711)

Vulnerability from cvelistv5 – Published: 2008-06-16 21:00 – Updated: 2024-08-07 09:14
VLAI?
Summary
fetchmail 6.3.8 and earlier, when running in -v -v (aka verbose) mode, allows remote attackers to cause a denial of service (crash and persistent mail failure) via a malformed mail message with long headers, which triggers an erroneous dereference when using vsnprintf to format log messages.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.vupen.com/english/advisories/2008/1860… vdb-entryx_refsource_VUPEN
http://secunia.com/advisories/31287 third-party-advisoryx_refsource_SECUNIA
http://www.securityfocus.com/archive/1/494865/100… mailing-listx_refsource_BUGTRAQ
http://www.securitytracker.com/id?1020298 vdb-entryx_refsource_SECTRACK
http://secunia.com/advisories/33937 third-party-advisoryx_refsource_SECUNIA
http://www.securityfocus.com/archive/1/493391/100… mailing-listx_refsource_BUGTRAQ
http://secunia.com/advisories/31262 third-party-advisoryx_refsource_SECUNIA
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0235 x_refsource_CONFIRM
http://support.apple.com/kb/HT3438 x_refsource_CONFIRM
http://lists.apple.com/archives/security-announce… vendor-advisoryx_refsource_APPLE
http://secunia.com/advisories/30895 third-party-advisoryx_refsource_SECUNIA
https://www.redhat.com/archives/fedora-package-an… vendor-advisoryx_refsource_FEDORA
https://www.redhat.com/archives/fedora-package-an… vendor-advisoryx_refsource_FEDORA
http://slackware.com/security/viewer.php?l=slackw… vendor-advisoryx_refsource_SLACKWARE
http://www.fetchmail.info/fetchmail-SA-2008-01.txt x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2009/0422 vdb-entryx_refsource_VUPEN
http://www.securityfocus.com/bid/29705 vdb-entryx_refsource_BID
https://issues.rpath.com/browse/RPL-2623 x_refsource_CONFIRM
https://bugzilla.novell.com/show_bug.cgi?id=354291 x_refsource_MISC
http://www.mandriva.com/security/advisories?name=… vendor-advisoryx_refsource_MANDRIVA
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.openwall.com/lists/oss-security/2008/06/13/1 mailing-listx_refsource_MLIST
https://oval.cisecurity.org/repository/search/def… vdb-entrysignaturex_refsource_OVAL
http://secunia.com/advisories/30742 third-party-advisoryx_refsource_SECUNIA
http://www.openwall.com/lists/oss-security/2021/08/09/1 mailing-listx_refsource_MLIST
Date Public ?
2008-06-13 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T09:14:14.639Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ADV-2008-1860",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/1860/references"
          },
          {
            "name": "31287",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31287"
          },
          {
            "name": "20080729 rPSA-2008-0235-1 fetchmail fetchmailconf",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/494865/100/0/threaded"
          },
          {
            "name": "1020298",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1020298"
          },
          {
            "name": "33937",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/33937"
          },
          {
            "name": "20080617 fetchmail security announcement fetchmail-SA-2008-01 (CVE-2008-2711)",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/493391/100/0/threaded"
          },
          {
            "name": "31262",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31262"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0235"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.apple.com/kb/HT3438"
          },
          {
            "name": "APPLE-SA-2009-02-12",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"
          },
          {
            "name": "30895",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30895"
          },
          {
            "name": "FEDORA-2008-5800",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg01095.html"
          },
          {
            "name": "FEDORA-2008-5789",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg01091.html"
          },
          {
            "name": "SSA:2008-210-01",
            "tags": [
              "vendor-advisory",
              "x_refsource_SLACKWARE",
              "x_transferred"
            ],
            "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.495740"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.fetchmail.info/fetchmail-SA-2008-01.txt"
          },
          {
            "name": "ADV-2009-0422",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/0422"
          },
          {
            "name": "29705",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/29705"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://issues.rpath.com/browse/RPL-2623"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugzilla.novell.com/show_bug.cgi?id=354291"
          },
          {
            "name": "MDVSA-2008:117",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:117"
          },
          {
            "name": "fetchmail-logmessage-dos(43121)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43121"
          },
          {
            "name": "[oss-security] 20080613 CVE Id Request: fetchmail \u003c= 6.3.8 DoS when logging long headers in -v -v mode",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2008/06/13/1"
          },
          {
            "name": "oval:org.mitre.oval:def:10950",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10950"
          },
          {
            "name": "30742",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30742"
          },
          {
            "name": "[oss-security] 20210809 fetchmail 6.4.21 released/regression fix for 6.4.20\u0027s security fix, and UPDATE: fetchmail \u003c= 6.4.19 security announcement 2021-01 (CVE-2021-36386)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2021/08/09/1"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-06-13T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "fetchmail 6.3.8 and earlier, when running in -v -v (aka verbose) mode, allows remote attackers to cause a denial of service (crash and persistent mail failure) via a malformed mail message with long headers, which triggers an erroneous dereference when using vsnprintf to format log messages."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-08-09T20:06:29.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "ADV-2008-1860",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/1860/references"
        },
        {
          "name": "31287",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31287"
        },
        {
          "name": "20080729 rPSA-2008-0235-1 fetchmail fetchmailconf",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/494865/100/0/threaded"
        },
        {
          "name": "1020298",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1020298"
        },
        {
          "name": "33937",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/33937"
        },
        {
          "name": "20080617 fetchmail security announcement fetchmail-SA-2008-01 (CVE-2008-2711)",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/493391/100/0/threaded"
        },
        {
          "name": "31262",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31262"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0235"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.apple.com/kb/HT3438"
        },
        {
          "name": "APPLE-SA-2009-02-12",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"
        },
        {
          "name": "30895",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30895"
        },
        {
          "name": "FEDORA-2008-5800",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg01095.html"
        },
        {
          "name": "FEDORA-2008-5789",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg01091.html"
        },
        {
          "name": "SSA:2008-210-01",
          "tags": [
            "vendor-advisory",
            "x_refsource_SLACKWARE"
          ],
          "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.495740"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.fetchmail.info/fetchmail-SA-2008-01.txt"
        },
        {
          "name": "ADV-2009-0422",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/0422"
        },
        {
          "name": "29705",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/29705"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://issues.rpath.com/browse/RPL-2623"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugzilla.novell.com/show_bug.cgi?id=354291"
        },
        {
          "name": "MDVSA-2008:117",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:117"
        },
        {
          "name": "fetchmail-logmessage-dos(43121)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43121"
        },
        {
          "name": "[oss-security] 20080613 CVE Id Request: fetchmail \u003c= 6.3.8 DoS when logging long headers in -v -v mode",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2008/06/13/1"
        },
        {
          "name": "oval:org.mitre.oval:def:10950",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10950"
        },
        {
          "name": "30742",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30742"
        },
        {
          "name": "[oss-security] 20210809 fetchmail 6.4.21 released/regression fix for 6.4.20\u0027s security fix, and UPDATE: fetchmail \u003c= 6.4.19 security announcement 2021-01 (CVE-2021-36386)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2021/08/09/1"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-2711",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "fetchmail 6.3.8 and earlier, when running in -v -v (aka verbose) mode, allows remote attackers to cause a denial of service (crash and persistent mail failure) via a malformed mail message with long headers, which triggers an erroneous dereference when using vsnprintf to format log messages."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ADV-2008-1860",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/1860/references"
            },
            {
              "name": "31287",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/31287"
            },
            {
              "name": "20080729 rPSA-2008-0235-1 fetchmail fetchmailconf",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/494865/100/0/threaded"
            },
            {
              "name": "1020298",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1020298"
            },
            {
              "name": "33937",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/33937"
            },
            {
              "name": "20080617 fetchmail security announcement fetchmail-SA-2008-01 (CVE-2008-2711)",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/493391/100/0/threaded"
            },
            {
              "name": "31262",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/31262"
            },
            {
              "name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0235",
              "refsource": "CONFIRM",
              "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0235"
            },
            {
              "name": "http://support.apple.com/kb/HT3438",
              "refsource": "CONFIRM",
              "url": "http://support.apple.com/kb/HT3438"
            },
            {
              "name": "APPLE-SA-2009-02-12",
              "refsource": "APPLE",
              "url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"
            },
            {
              "name": "30895",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30895"
            },
            {
              "name": "FEDORA-2008-5800",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg01095.html"
            },
            {
              "name": "FEDORA-2008-5789",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg01091.html"
            },
            {
              "name": "SSA:2008-210-01",
              "refsource": "SLACKWARE",
              "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.495740"
            },
            {
              "name": "http://www.fetchmail.info/fetchmail-SA-2008-01.txt",
              "refsource": "CONFIRM",
              "url": "http://www.fetchmail.info/fetchmail-SA-2008-01.txt"
            },
            {
              "name": "ADV-2009-0422",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/0422"
            },
            {
              "name": "29705",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/29705"
            },
            {
              "name": "https://issues.rpath.com/browse/RPL-2623",
              "refsource": "CONFIRM",
              "url": "https://issues.rpath.com/browse/RPL-2623"
            },
            {
              "name": "https://bugzilla.novell.com/show_bug.cgi?id=354291",
              "refsource": "MISC",
              "url": "https://bugzilla.novell.com/show_bug.cgi?id=354291"
            },
            {
              "name": "MDVSA-2008:117",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:117"
            },
            {
              "name": "fetchmail-logmessage-dos(43121)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43121"
            },
            {
              "name": "[oss-security] 20080613 CVE Id Request: fetchmail \u003c= 6.3.8 DoS when logging long headers in -v -v mode",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2008/06/13/1"
            },
            {
              "name": "oval:org.mitre.oval:def:10950",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10950"
            },
            {
              "name": "30742",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30742"
            },
            {
              "name": "[oss-security] 20210809 fetchmail 6.4.21 released/regression fix for 6.4.20\u0027s security fix, and UPDATE: fetchmail \u003c= 6.4.19 security announcement 2021-01 (CVE-2021-36386)",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2021/08/09/1"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-2711",
    "datePublished": "2008-06-16T21:00:00.000Z",
    "dateReserved": "2008-06-16T00:00:00.000Z",
    "dateUpdated": "2024-08-07T09:14:14.639Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2007-4565 (GCVE-0-2007-4565)

Vulnerability from cvelistv5 – Published: 2007-08-28 01:00 – Updated: 2024-08-07 15:01
VLAI?
Summary
sink.c in fetchmail before 6.3.9 allows context-dependent attackers to cause a denial of service (NULL dereference and application crash) by refusing certain warning messages that are sent over SMTP.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://secunia.com/advisories/33937 third-party-advisoryx_refsource_SECUNIA
http://securityreason.com/securityalert/3074 third-party-advisoryx_refsource_SREASON
http://fetchmail.berlios.de/fetchmail-SA-2007-02.txt x_refsource_CONFIRM
http://mknod.org/svn/fetchmail/branches/BRANCH_6-… x_refsource_CONFIRM
http://support.apple.com/kb/HT3438 x_refsource_CONFIRM
http://www.securitytracker.com/id?1018627 vdb-entryx_refsource_SECTRACK
http://lists.apple.com/archives/security-announce… vendor-advisoryx_refsource_APPLE
http://www.securityfocus.com/archive/1/493388/100… mailing-listx_refsource_BUGTRAQ
http://www.trustix.org/errata/2007/0028/ vendor-advisoryx_refsource_TRUSTIX
https://oval.cisecurity.org/repository/search/def… vdb-entrysignaturex_refsource_OVAL
http://www.securityfocus.com/bid/25495 vdb-entryx_refsource_BID
http://www.vupen.com/english/advisories/2007/3032 vdb-entryx_refsource_VUPEN
http://www.vupen.com/english/advisories/2009/0422 vdb-entryx_refsource_VUPEN
http://www.securityfocus.com/archive/1/478798/100… mailing-listx_refsource_BUGTRAQ
http://secunia.com/advisories/27399 third-party-advisoryx_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.debian.org/security/2007/dsa-1377 vendor-advisoryx_refsource_DEBIAN
http://www.mandriva.com/security/advisories?name=… vendor-advisoryx_refsource_MANDRIVA
https://issues.rpath.com/browse/RPL-1690 x_refsource_CONFIRM
http://www.ubuntu.com/usn/usn-520-1 vendor-advisoryx_refsource_UBUNTU
http://lists.opensuse.org/opensuse-security-annou… vendor-advisoryx_refsource_SUSE
http://osvdb.org/45833 vdb-entryx_refsource_OSVDB
Date Public ?
2007-07-29 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T15:01:09.632Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "33937",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/33937"
          },
          {
            "name": "3074",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/3074"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://fetchmail.berlios.de/fetchmail-SA-2007-02.txt"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://mknod.org/svn/fetchmail/branches/BRANCH_6-3/fetchmail-SA-2007-02.txt"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.apple.com/kb/HT3438"
          },
          {
            "name": "1018627",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1018627"
          },
          {
            "name": "APPLE-SA-2009-02-12",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"
          },
          {
            "name": "20080617 fetchmail security announcement fetchmail-SA-2007-02 (CVE-2007-4565)",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/493388/100/0/threaded"
          },
          {
            "name": "2007-0028",
            "tags": [
              "vendor-advisory",
              "x_refsource_TRUSTIX",
              "x_transferred"
            ],
            "url": "http://www.trustix.org/errata/2007/0028/"
          },
          {
            "name": "oval:org.mitre.oval:def:10528",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10528"
          },
          {
            "name": "25495",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/25495"
          },
          {
            "name": "ADV-2007-3032",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/3032"
          },
          {
            "name": "ADV-2009-0422",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/0422"
          },
          {
            "name": "20070907 FLEA-2007-0053-1 fetchmail",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/478798/100/0/threaded"
          },
          {
            "name": "27399",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/27399"
          },
          {
            "name": "fetchmail-warning-dos(36385)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36385"
          },
          {
            "name": "DSA-1377",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2007/dsa-1377"
          },
          {
            "name": "MDKSA-2007:179",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:179"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://issues.rpath.com/browse/RPL-1690"
          },
          {
            "name": "USN-520-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/usn-520-1"
          },
          {
            "name": "SUSE-SR:2007:022",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00008.html"
          },
          {
            "name": "45833",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/45833"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-07-29T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "sink.c in fetchmail before 6.3.9 allows context-dependent attackers to cause a denial of service (NULL dereference and application crash) by refusing certain warning messages that are sent over SMTP."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-15T20:57:01.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "33937",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/33937"
        },
        {
          "name": "3074",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/3074"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://fetchmail.berlios.de/fetchmail-SA-2007-02.txt"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://mknod.org/svn/fetchmail/branches/BRANCH_6-3/fetchmail-SA-2007-02.txt"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.apple.com/kb/HT3438"
        },
        {
          "name": "1018627",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1018627"
        },
        {
          "name": "APPLE-SA-2009-02-12",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"
        },
        {
          "name": "20080617 fetchmail security announcement fetchmail-SA-2007-02 (CVE-2007-4565)",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/493388/100/0/threaded"
        },
        {
          "name": "2007-0028",
          "tags": [
            "vendor-advisory",
            "x_refsource_TRUSTIX"
          ],
          "url": "http://www.trustix.org/errata/2007/0028/"
        },
        {
          "name": "oval:org.mitre.oval:def:10528",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10528"
        },
        {
          "name": "25495",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/25495"
        },
        {
          "name": "ADV-2007-3032",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/3032"
        },
        {
          "name": "ADV-2009-0422",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/0422"
        },
        {
          "name": "20070907 FLEA-2007-0053-1 fetchmail",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/478798/100/0/threaded"
        },
        {
          "name": "27399",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/27399"
        },
        {
          "name": "fetchmail-warning-dos(36385)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36385"
        },
        {
          "name": "DSA-1377",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2007/dsa-1377"
        },
        {
          "name": "MDKSA-2007:179",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:179"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://issues.rpath.com/browse/RPL-1690"
        },
        {
          "name": "USN-520-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/usn-520-1"
        },
        {
          "name": "SUSE-SR:2007:022",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00008.html"
        },
        {
          "name": "45833",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/45833"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-4565",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "sink.c in fetchmail before 6.3.9 allows context-dependent attackers to cause a denial of service (NULL dereference and application crash) by refusing certain warning messages that are sent over SMTP."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "33937",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/33937"
            },
            {
              "name": "3074",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/3074"
            },
            {
              "name": "http://fetchmail.berlios.de/fetchmail-SA-2007-02.txt",
              "refsource": "CONFIRM",
              "url": "http://fetchmail.berlios.de/fetchmail-SA-2007-02.txt"
            },
            {
              "name": "http://mknod.org/svn/fetchmail/branches/BRANCH_6-3/fetchmail-SA-2007-02.txt",
              "refsource": "CONFIRM",
              "url": "http://mknod.org/svn/fetchmail/branches/BRANCH_6-3/fetchmail-SA-2007-02.txt"
            },
            {
              "name": "http://support.apple.com/kb/HT3438",
              "refsource": "CONFIRM",
              "url": "http://support.apple.com/kb/HT3438"
            },
            {
              "name": "1018627",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1018627"
            },
            {
              "name": "APPLE-SA-2009-02-12",
              "refsource": "APPLE",
              "url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"
            },
            {
              "name": "20080617 fetchmail security announcement fetchmail-SA-2007-02 (CVE-2007-4565)",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/493388/100/0/threaded"
            },
            {
              "name": "2007-0028",
              "refsource": "TRUSTIX",
              "url": "http://www.trustix.org/errata/2007/0028/"
            },
            {
              "name": "oval:org.mitre.oval:def:10528",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10528"
            },
            {
              "name": "25495",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/25495"
            },
            {
              "name": "ADV-2007-3032",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/3032"
            },
            {
              "name": "ADV-2009-0422",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/0422"
            },
            {
              "name": "20070907 FLEA-2007-0053-1 fetchmail",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/478798/100/0/threaded"
            },
            {
              "name": "27399",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/27399"
            },
            {
              "name": "fetchmail-warning-dos(36385)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36385"
            },
            {
              "name": "DSA-1377",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2007/dsa-1377"
            },
            {
              "name": "MDKSA-2007:179",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:179"
            },
            {
              "name": "https://issues.rpath.com/browse/RPL-1690",
              "refsource": "CONFIRM",
              "url": "https://issues.rpath.com/browse/RPL-1690"
            },
            {
              "name": "USN-520-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/usn-520-1"
            },
            {
              "name": "SUSE-SR:2007:022",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00008.html"
            },
            {
              "name": "45833",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/45833"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-4565",
    "datePublished": "2007-08-28T01:00:00.000Z",
    "dateReserved": "2007-08-27T00:00:00.000Z",
    "dateUpdated": "2024-08-07T15:01:09.632Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-5867 (GCVE-0-2006-5867)

Vulnerability from cvelistv5 – Published: 2007-01-09 00:00 – Updated: 2024-08-07 20:04
VLAI?
Summary
fetchmail before 6.3.6-rc4 does not properly enforce TLS and may transmit cleartext passwords over unsecured links if certain circumstances occur, which allows remote attackers to obtain sensitive information via man-in-the-middle (MITM) attacks.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://slackware.com/security/viewer.php?l=slackw… vendor-advisoryx_refsource_SLACKWARE
http://www.ubuntu.com/usn/usn-405-1 vendor-advisoryx_refsource_UBUNTU
http://secunia.com/advisories/24966 third-party-advisoryx_refsource_SECUNIA
http://osvdb.org/31580 vdb-entryx_refsource_OSVDB
http://secunia.com/advisories/23781 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/24174 third-party-advisoryx_refsource_SECUNIA
http://www.debian.org/security/2007/dsa-1259 vendor-advisoryx_refsource_DEBIAN
http://secunia.com/advisories/23838 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/24151 third-party-advisoryx_refsource_SECUNIA
http://docs.info.apple.com/article.html?artnum=305391 x_refsource_CONFIRM
http://secunia.com/advisories/23714 third-party-advisoryx_refsource_SECUNIA
http://www.securityfocus.com/bid/21903 vdb-entryx_refsource_BID
http://secunia.com/advisories/24284 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/23631 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/24007 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/23804 third-party-advisoryx_refsource_SECUNIA
http://www.securityfocus.com/archive/1/456115/100… mailing-listx_refsource_BUGTRAQ
http://www.vupen.com/english/advisories/2007/0088 vdb-entryx_refsource_VUPEN
http://www.novell.com/linux/security/advisories/2… vendor-advisoryx_refsource_SUSE
http://www.us-cert.gov/cas/techalerts/TA07-109A.html third-party-advisoryx_refsource_CERT
http://secunia.com/advisories/23695 third-party-advisoryx_refsource_SECUNIA
http://fetchmail.berlios.de/fetchmail-SA-2006-02.txt x_refsource_CONFIRM
http://www.mandriva.com/security/advisories?name=… vendor-advisoryx_refsource_MANDRIVA
http://fedoranews.org/cms/node/2429 vendor-advisoryx_refsource_FEDORA
http://secunia.com/advisories/23923 third-party-advisoryx_refsource_SECUNIA
http://www.openpkg.com/security/advisories/OpenPK… vendor-advisoryx_refsource_OPENPKG
http://www.trustix.org/errata/2007/0007 vendor-advisoryx_refsource_TRUSTIX
http://www.securityfocus.com/archive/1/460528/100… mailing-listx_refsource_BUGTRAQ
http://security.gentoo.org/glsa/glsa-200701-13.xml vendor-advisoryx_refsource_GENTOO
http://securitytracker.com/id?1017478 vdb-entryx_refsource_SECTRACK
https://issues.rpath.com/browse/RPL-919 x_refsource_CONFIRM
ftp://patches.sgi.com/support/free/security/advis… vendor-advisoryx_refsource_SGI
http://lists.apple.com/archives/Security-announce… vendor-advisoryx_refsource_APPLE
http://www.vupen.com/english/advisories/2007/1470 vdb-entryx_refsource_VUPEN
http://www.vupen.com/english/advisories/2007/0087 vdb-entryx_refsource_VUPEN
http://www.redhat.com/support/errata/RHSA-2007-00… vendor-advisoryx_refsource_REDHAT
https://oval.cisecurity.org/repository/search/def… vdb-entrysignaturex_refsource_OVAL
Date Public ?
2007-01-04 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T20:04:55.652Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "SSA:2007-024-01",
            "tags": [
              "vendor-advisory",
              "x_refsource_SLACKWARE",
              "x_transferred"
            ],
            "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.517995"
          },
          {
            "name": "USN-405-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/usn-405-1"
          },
          {
            "name": "24966",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/24966"
          },
          {
            "name": "31580",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/31580"
          },
          {
            "name": "23781",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23781"
          },
          {
            "name": "24174",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/24174"
          },
          {
            "name": "DSA-1259",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2007/dsa-1259"
          },
          {
            "name": "23838",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23838"
          },
          {
            "name": "24151",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/24151"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://docs.info.apple.com/article.html?artnum=305391"
          },
          {
            "name": "23714",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23714"
          },
          {
            "name": "21903",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/21903"
          },
          {
            "name": "24284",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/24284"
          },
          {
            "name": "23631",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23631"
          },
          {
            "name": "24007",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/24007"
          },
          {
            "name": "23804",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23804"
          },
          {
            "name": "20070105 fetchmail security announcement 2006-02 (CVE-2006-5867)",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/456115/100/0/threaded"
          },
          {
            "name": "ADV-2007-0088",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/0088"
          },
          {
            "name": "SUSE-SR:2007:004",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://www.novell.com/linux/security/advisories/2007_4_sr.html"
          },
          {
            "name": "TA07-109A",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT",
              "x_transferred"
            ],
            "url": "http://www.us-cert.gov/cas/techalerts/TA07-109A.html"
          },
          {
            "name": "23695",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23695"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://fetchmail.berlios.de/fetchmail-SA-2006-02.txt"
          },
          {
            "name": "MDKSA-2007:016",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:016"
          },
          {
            "name": "FEDORA-2007-041",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://fedoranews.org/cms/node/2429"
          },
          {
            "name": "23923",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23923"
          },
          {
            "name": "OpenPKG-SA-2007.004",
            "tags": [
              "vendor-advisory",
              "x_refsource_OPENPKG",
              "x_transferred"
            ],
            "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.004.html"
          },
          {
            "name": "2007-0007",
            "tags": [
              "vendor-advisory",
              "x_refsource_TRUSTIX",
              "x_transferred"
            ],
            "url": "http://www.trustix.org/errata/2007/0007"
          },
          {
            "name": "20070218 Re: [SECURITY] [DSA 1259-1] New fetchmail packages fix information disclosure",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/460528/100/0/threaded"
          },
          {
            "name": "GLSA-200701-13",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200701-13.xml"
          },
          {
            "name": "1017478",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1017478"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://issues.rpath.com/browse/RPL-919"
          },
          {
            "name": "20070201-01-P",
            "tags": [
              "vendor-advisory",
              "x_refsource_SGI",
              "x_transferred"
            ],
            "url": "ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc"
          },
          {
            "name": "APPLE-SA-2007-04-19",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html"
          },
          {
            "name": "ADV-2007-1470",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/1470"
          },
          {
            "name": "ADV-2007-0087",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/0087"
          },
          {
            "name": "RHSA-2007:0018",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2007-0018.html"
          },
          {
            "name": "oval:org.mitre.oval:def:10566",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10566"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-01-04T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "fetchmail before 6.3.6-rc4 does not properly enforce TLS and may transmit cleartext passwords over unsecured links if certain circumstances occur, which allows remote attackers to obtain sensitive information via man-in-the-middle (MITM) attacks."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-17T20:57:01.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "SSA:2007-024-01",
          "tags": [
            "vendor-advisory",
            "x_refsource_SLACKWARE"
          ],
          "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.517995"
        },
        {
          "name": "USN-405-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/usn-405-1"
        },
        {
          "name": "24966",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/24966"
        },
        {
          "name": "31580",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/31580"
        },
        {
          "name": "23781",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23781"
        },
        {
          "name": "24174",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/24174"
        },
        {
          "name": "DSA-1259",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2007/dsa-1259"
        },
        {
          "name": "23838",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23838"
        },
        {
          "name": "24151",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/24151"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://docs.info.apple.com/article.html?artnum=305391"
        },
        {
          "name": "23714",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23714"
        },
        {
          "name": "21903",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/21903"
        },
        {
          "name": "24284",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/24284"
        },
        {
          "name": "23631",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23631"
        },
        {
          "name": "24007",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/24007"
        },
        {
          "name": "23804",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23804"
        },
        {
          "name": "20070105 fetchmail security announcement 2006-02 (CVE-2006-5867)",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/456115/100/0/threaded"
        },
        {
          "name": "ADV-2007-0088",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/0088"
        },
        {
          "name": "SUSE-SR:2007:004",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://www.novell.com/linux/security/advisories/2007_4_sr.html"
        },
        {
          "name": "TA07-109A",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT"
          ],
          "url": "http://www.us-cert.gov/cas/techalerts/TA07-109A.html"
        },
        {
          "name": "23695",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23695"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://fetchmail.berlios.de/fetchmail-SA-2006-02.txt"
        },
        {
          "name": "MDKSA-2007:016",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:016"
        },
        {
          "name": "FEDORA-2007-041",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://fedoranews.org/cms/node/2429"
        },
        {
          "name": "23923",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23923"
        },
        {
          "name": "OpenPKG-SA-2007.004",
          "tags": [
            "vendor-advisory",
            "x_refsource_OPENPKG"
          ],
          "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.004.html"
        },
        {
          "name": "2007-0007",
          "tags": [
            "vendor-advisory",
            "x_refsource_TRUSTIX"
          ],
          "url": "http://www.trustix.org/errata/2007/0007"
        },
        {
          "name": "20070218 Re: [SECURITY] [DSA 1259-1] New fetchmail packages fix information disclosure",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/460528/100/0/threaded"
        },
        {
          "name": "GLSA-200701-13",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200701-13.xml"
        },
        {
          "name": "1017478",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1017478"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://issues.rpath.com/browse/RPL-919"
        },
        {
          "name": "20070201-01-P",
          "tags": [
            "vendor-advisory",
            "x_refsource_SGI"
          ],
          "url": "ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc"
        },
        {
          "name": "APPLE-SA-2007-04-19",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html"
        },
        {
          "name": "ADV-2007-1470",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/1470"
        },
        {
          "name": "ADV-2007-0087",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/0087"
        },
        {
          "name": "RHSA-2007:0018",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2007-0018.html"
        },
        {
          "name": "oval:org.mitre.oval:def:10566",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10566"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-5867",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "fetchmail before 6.3.6-rc4 does not properly enforce TLS and may transmit cleartext passwords over unsecured links if certain circumstances occur, which allows remote attackers to obtain sensitive information via man-in-the-middle (MITM) attacks."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "SSA:2007-024-01",
              "refsource": "SLACKWARE",
              "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.517995"
            },
            {
              "name": "USN-405-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/usn-405-1"
            },
            {
              "name": "24966",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/24966"
            },
            {
              "name": "31580",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/31580"
            },
            {
              "name": "23781",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23781"
            },
            {
              "name": "24174",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/24174"
            },
            {
              "name": "DSA-1259",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2007/dsa-1259"
            },
            {
              "name": "23838",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23838"
            },
            {
              "name": "24151",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/24151"
            },
            {
              "name": "http://docs.info.apple.com/article.html?artnum=305391",
              "refsource": "CONFIRM",
              "url": "http://docs.info.apple.com/article.html?artnum=305391"
            },
            {
              "name": "23714",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23714"
            },
            {
              "name": "21903",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/21903"
            },
            {
              "name": "24284",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/24284"
            },
            {
              "name": "23631",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23631"
            },
            {
              "name": "24007",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/24007"
            },
            {
              "name": "23804",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23804"
            },
            {
              "name": "20070105 fetchmail security announcement 2006-02 (CVE-2006-5867)",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/456115/100/0/threaded"
            },
            {
              "name": "ADV-2007-0088",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/0088"
            },
            {
              "name": "SUSE-SR:2007:004",
              "refsource": "SUSE",
              "url": "http://www.novell.com/linux/security/advisories/2007_4_sr.html"
            },
            {
              "name": "TA07-109A",
              "refsource": "CERT",
              "url": "http://www.us-cert.gov/cas/techalerts/TA07-109A.html"
            },
            {
              "name": "23695",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23695"
            },
            {
              "name": "http://fetchmail.berlios.de/fetchmail-SA-2006-02.txt",
              "refsource": "CONFIRM",
              "url": "http://fetchmail.berlios.de/fetchmail-SA-2006-02.txt"
            },
            {
              "name": "MDKSA-2007:016",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:016"
            },
            {
              "name": "FEDORA-2007-041",
              "refsource": "FEDORA",
              "url": "http://fedoranews.org/cms/node/2429"
            },
            {
              "name": "23923",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23923"
            },
            {
              "name": "OpenPKG-SA-2007.004",
              "refsource": "OPENPKG",
              "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.004.html"
            },
            {
              "name": "2007-0007",
              "refsource": "TRUSTIX",
              "url": "http://www.trustix.org/errata/2007/0007"
            },
            {
              "name": "20070218 Re: [SECURITY] [DSA 1259-1] New fetchmail packages fix information disclosure",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/460528/100/0/threaded"
            },
            {
              "name": "GLSA-200701-13",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200701-13.xml"
            },
            {
              "name": "1017478",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1017478"
            },
            {
              "name": "https://issues.rpath.com/browse/RPL-919",
              "refsource": "CONFIRM",
              "url": "https://issues.rpath.com/browse/RPL-919"
            },
            {
              "name": "20070201-01-P",
              "refsource": "SGI",
              "url": "ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc"
            },
            {
              "name": "APPLE-SA-2007-04-19",
              "refsource": "APPLE",
              "url": "http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html"
            },
            {
              "name": "ADV-2007-1470",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/1470"
            },
            {
              "name": "ADV-2007-0087",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/0087"
            },
            {
              "name": "RHSA-2007:0018",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2007-0018.html"
            },
            {
              "name": "oval:org.mitre.oval:def:10566",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10566"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-5867",
    "datePublished": "2007-01-09T00:00:00.000Z",
    "dateReserved": "2006-11-14T00:00:00.000Z",
    "dateUpdated": "2024-08-07T20:04:55.652Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-5974 (GCVE-0-2006-5974)

Vulnerability from cvelistv5 – Published: 2007-01-09 00:00 – Updated: 2024-08-07 20:12
VLAI?
Summary
fetchmail 6.3.5 and 6.3.6 before 6.3.6-rc4, when refusing a message delivered via the mda option, allows remote attackers to cause a denial of service (crash) via unknown vectors that trigger a NULL pointer dereference when calling the (1) ferror or (2) fflush functions.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://securitytracker.com/id?1017479 vdb-entryx_refsource_SECTRACK
http://slackware.com/security/viewer.php?l=slackw… vendor-advisoryx_refsource_SLACKWARE
http://fetchmail.berlios.de/fetchmail-SA-2006-03.txt x_refsource_CONFIRM
http://secunia.com/advisories/23838 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/24151 third-party-advisoryx_refsource_SECUNIA
http://www.securityfocus.com/archive/1/456114/100… mailing-listx_refsource_BUGTRAQ
http://secunia.com/advisories/23631 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/23804 third-party-advisoryx_refsource_SECUNIA
http://www.vupen.com/english/advisories/2007/0088 vdb-entryx_refsource_VUPEN
http://www.novell.com/linux/security/advisories/2… vendor-advisoryx_refsource_SUSE
http://fedoranews.org/cms/node/2429 vendor-advisoryx_refsource_FEDORA
http://secunia.com/advisories/23923 third-party-advisoryx_refsource_SECUNIA
http://osvdb.org/31836 vdb-entryx_refsource_OSVDB
http://www.openpkg.com/security/advisories/OpenPK… vendor-advisoryx_refsource_OPENPKG
http://www.trustix.org/errata/2007/0007 vendor-advisoryx_refsource_TRUSTIX
http://security.gentoo.org/glsa/glsa-200701-13.xml vendor-advisoryx_refsource_GENTOO
http://www.vupen.com/english/advisories/2007/0087 vdb-entryx_refsource_VUPEN
http://www.securityfocus.com/bid/21902 vdb-entryx_refsource_BID
Date Public ?
2007-01-04 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T20:12:31.425Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1017479",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1017479"
          },
          {
            "name": "SSA:2007-024-01",
            "tags": [
              "vendor-advisory",
              "x_refsource_SLACKWARE",
              "x_transferred"
            ],
            "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.517995"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://fetchmail.berlios.de/fetchmail-SA-2006-03.txt"
          },
          {
            "name": "23838",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23838"
          },
          {
            "name": "24151",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/24151"
          },
          {
            "name": "20070105 fetchmail security announcement 2006-03 (CVE-2006-5974)",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/456114/100/0/threaded"
          },
          {
            "name": "23631",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23631"
          },
          {
            "name": "23804",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23804"
          },
          {
            "name": "ADV-2007-0088",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/0088"
          },
          {
            "name": "SUSE-SR:2007:004",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://www.novell.com/linux/security/advisories/2007_4_sr.html"
          },
          {
            "name": "FEDORA-2007-041",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://fedoranews.org/cms/node/2429"
          },
          {
            "name": "23923",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23923"
          },
          {
            "name": "31836",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/31836"
          },
          {
            "name": "OpenPKG-SA-2007.004",
            "tags": [
              "vendor-advisory",
              "x_refsource_OPENPKG",
              "x_transferred"
            ],
            "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.004.html"
          },
          {
            "name": "2007-0007",
            "tags": [
              "vendor-advisory",
              "x_refsource_TRUSTIX",
              "x_transferred"
            ],
            "url": "http://www.trustix.org/errata/2007/0007"
          },
          {
            "name": "GLSA-200701-13",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200701-13.xml"
          },
          {
            "name": "ADV-2007-0087",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/0087"
          },
          {
            "name": "21902",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/21902"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-01-04T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "fetchmail 6.3.5 and 6.3.6 before 6.3.6-rc4, when refusing a message delivered via the mda option, allows remote attackers to cause a denial of service (crash) via unknown vectors that trigger a NULL pointer dereference when calling the (1) ferror or (2) fflush functions."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-17T20:57:01.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "1017479",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1017479"
        },
        {
          "name": "SSA:2007-024-01",
          "tags": [
            "vendor-advisory",
            "x_refsource_SLACKWARE"
          ],
          "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.517995"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://fetchmail.berlios.de/fetchmail-SA-2006-03.txt"
        },
        {
          "name": "23838",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23838"
        },
        {
          "name": "24151",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/24151"
        },
        {
          "name": "20070105 fetchmail security announcement 2006-03 (CVE-2006-5974)",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/456114/100/0/threaded"
        },
        {
          "name": "23631",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23631"
        },
        {
          "name": "23804",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23804"
        },
        {
          "name": "ADV-2007-0088",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/0088"
        },
        {
          "name": "SUSE-SR:2007:004",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://www.novell.com/linux/security/advisories/2007_4_sr.html"
        },
        {
          "name": "FEDORA-2007-041",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://fedoranews.org/cms/node/2429"
        },
        {
          "name": "23923",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23923"
        },
        {
          "name": "31836",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/31836"
        },
        {
          "name": "OpenPKG-SA-2007.004",
          "tags": [
            "vendor-advisory",
            "x_refsource_OPENPKG"
          ],
          "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.004.html"
        },
        {
          "name": "2007-0007",
          "tags": [
            "vendor-advisory",
            "x_refsource_TRUSTIX"
          ],
          "url": "http://www.trustix.org/errata/2007/0007"
        },
        {
          "name": "GLSA-200701-13",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200701-13.xml"
        },
        {
          "name": "ADV-2007-0087",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/0087"
        },
        {
          "name": "21902",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/21902"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-5974",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "fetchmail 6.3.5 and 6.3.6 before 6.3.6-rc4, when refusing a message delivered via the mda option, allows remote attackers to cause a denial of service (crash) via unknown vectors that trigger a NULL pointer dereference when calling the (1) ferror or (2) fflush functions."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1017479",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1017479"
            },
            {
              "name": "SSA:2007-024-01",
              "refsource": "SLACKWARE",
              "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.517995"
            },
            {
              "name": "http://fetchmail.berlios.de/fetchmail-SA-2006-03.txt",
              "refsource": "CONFIRM",
              "url": "http://fetchmail.berlios.de/fetchmail-SA-2006-03.txt"
            },
            {
              "name": "23838",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23838"
            },
            {
              "name": "24151",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/24151"
            },
            {
              "name": "20070105 fetchmail security announcement 2006-03 (CVE-2006-5974)",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/456114/100/0/threaded"
            },
            {
              "name": "23631",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23631"
            },
            {
              "name": "23804",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23804"
            },
            {
              "name": "ADV-2007-0088",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/0088"
            },
            {
              "name": "SUSE-SR:2007:004",
              "refsource": "SUSE",
              "url": "http://www.novell.com/linux/security/advisories/2007_4_sr.html"
            },
            {
              "name": "FEDORA-2007-041",
              "refsource": "FEDORA",
              "url": "http://fedoranews.org/cms/node/2429"
            },
            {
              "name": "23923",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23923"
            },
            {
              "name": "31836",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/31836"
            },
            {
              "name": "OpenPKG-SA-2007.004",
              "refsource": "OPENPKG",
              "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.004.html"
            },
            {
              "name": "2007-0007",
              "refsource": "TRUSTIX",
              "url": "http://www.trustix.org/errata/2007/0007"
            },
            {
              "name": "GLSA-200701-13",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200701-13.xml"
            },
            {
              "name": "ADV-2007-0087",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/0087"
            },
            {
              "name": "21902",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/21902"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-5974",
    "datePublished": "2007-01-09T00:00:00.000Z",
    "dateReserved": "2006-11-20T00:00:00.000Z",
    "dateUpdated": "2024-08-07T20:12:31.425Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-0321 (GCVE-0-2006-0321)

Vulnerability from cvelistv5 – Published: 2006-01-24 00:00 – Updated: 2024-08-07 16:34
VLAI?
Summary
fetchmail 6.3.0 and other versions before 6.3.2 allows remote attackers to cause a denial of service (crash) via crafted e-mail messages that cause a free of an invalid pointer when fetchmail bounces the message to the originator or local postmaster.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://lists.apple.com/archives/security-announce… vendor-advisoryx_refsource_APPLE
http://www.securityfocus.com/bid/16365 vdb-entryx_refsource_BID
http://developer.berlios.de/project/shownotes.php… x_refsource_CONFIRM
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.securityfocus.com/archive/1/422936/100… mailing-listx_refsource_BUGTRAQ
http://fetchmail.berlios.de/fetchmail-SA-2006-01.txt x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2006/3101 vdb-entryx_refsource_VUPEN
http://secunia.com/advisories/21253 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/18571 third-party-advisoryx_refsource_SECUNIA
http://slackware.com/security/viewer.php?l=slackw… vendor-advisoryx_refsource_SLACKWARE
http://www.vupen.com/english/advisories/2006/0300 vdb-entryx_refsource_VUPEN
http://www.securityfocus.com/bid/19289 vdb-entryx_refsource_BID
http://www.us-cert.gov/cas/techalerts/TA06-214A.html third-party-advisoryx_refsource_CERT
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=348747 x_refsource_CONFIRM
http://www.osvdb.org/22691 vdb-entryx_refsource_OSVDB
http://securitytracker.com/id?1015527 vdb-entryx_refsource_SECTRACK
http://secunia.com/advisories/18895 third-party-advisoryx_refsource_SECUNIA
Date Public ?
2006-01-23 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T16:34:13.607Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "APPLE-SA-2006-08-01",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html"
          },
          {
            "name": "16365",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/16365"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://developer.berlios.de/project/shownotes.php?release_id=8784"
          },
          {
            "name": "fetchmail-message-bounce-dos(24265)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24265"
          },
          {
            "name": "20060122 fetchmail security announcement fetchmail-SA-2006-01 (CVE-2006-0321)",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/422936/100/0/threaded"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://fetchmail.berlios.de/fetchmail-SA-2006-01.txt"
          },
          {
            "name": "ADV-2006-3101",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/3101"
          },
          {
            "name": "21253",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21253"
          },
          {
            "name": "18571",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18571"
          },
          {
            "name": "SSA:2006-045-01",
            "tags": [
              "vendor-advisory",
              "x_refsource_SLACKWARE",
              "x_transferred"
            ],
            "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.443499"
          },
          {
            "name": "ADV-2006-0300",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/0300"
          },
          {
            "name": "19289",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/19289"
          },
          {
            "name": "TA06-214A",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT",
              "x_transferred"
            ],
            "url": "http://www.us-cert.gov/cas/techalerts/TA06-214A.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=348747"
          },
          {
            "name": "22691",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/22691"
          },
          {
            "name": "1015527",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1015527"
          },
          {
            "name": "18895",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18895"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-01-23T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "fetchmail 6.3.0 and other versions before 6.3.2 allows remote attackers to cause a denial of service (crash) via crafted e-mail messages that cause a free of an invalid pointer when fetchmail bounces the message to the originator or local postmaster."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-19T14:57:01.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "APPLE-SA-2006-08-01",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html"
        },
        {
          "name": "16365",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/16365"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://developer.berlios.de/project/shownotes.php?release_id=8784"
        },
        {
          "name": "fetchmail-message-bounce-dos(24265)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24265"
        },
        {
          "name": "20060122 fetchmail security announcement fetchmail-SA-2006-01 (CVE-2006-0321)",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/422936/100/0/threaded"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://fetchmail.berlios.de/fetchmail-SA-2006-01.txt"
        },
        {
          "name": "ADV-2006-3101",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/3101"
        },
        {
          "name": "21253",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21253"
        },
        {
          "name": "18571",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18571"
        },
        {
          "name": "SSA:2006-045-01",
          "tags": [
            "vendor-advisory",
            "x_refsource_SLACKWARE"
          ],
          "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.443499"
        },
        {
          "name": "ADV-2006-0300",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/0300"
        },
        {
          "name": "19289",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/19289"
        },
        {
          "name": "TA06-214A",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT"
          ],
          "url": "http://www.us-cert.gov/cas/techalerts/TA06-214A.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=348747"
        },
        {
          "name": "22691",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/22691"
        },
        {
          "name": "1015527",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1015527"
        },
        {
          "name": "18895",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18895"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-0321",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "fetchmail 6.3.0 and other versions before 6.3.2 allows remote attackers to cause a denial of service (crash) via crafted e-mail messages that cause a free of an invalid pointer when fetchmail bounces the message to the originator or local postmaster."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "APPLE-SA-2006-08-01",
              "refsource": "APPLE",
              "url": "http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html"
            },
            {
              "name": "16365",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/16365"
            },
            {
              "name": "http://developer.berlios.de/project/shownotes.php?release_id=8784",
              "refsource": "CONFIRM",
              "url": "http://developer.berlios.de/project/shownotes.php?release_id=8784"
            },
            {
              "name": "fetchmail-message-bounce-dos(24265)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24265"
            },
            {
              "name": "20060122 fetchmail security announcement fetchmail-SA-2006-01 (CVE-2006-0321)",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/422936/100/0/threaded"
            },
            {
              "name": "http://fetchmail.berlios.de/fetchmail-SA-2006-01.txt",
              "refsource": "CONFIRM",
              "url": "http://fetchmail.berlios.de/fetchmail-SA-2006-01.txt"
            },
            {
              "name": "ADV-2006-3101",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/3101"
            },
            {
              "name": "21253",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21253"
            },
            {
              "name": "18571",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/18571"
            },
            {
              "name": "SSA:2006-045-01",
              "refsource": "SLACKWARE",
              "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.443499"
            },
            {
              "name": "ADV-2006-0300",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/0300"
            },
            {
              "name": "19289",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/19289"
            },
            {
              "name": "TA06-214A",
              "refsource": "CERT",
              "url": "http://www.us-cert.gov/cas/techalerts/TA06-214A.html"
            },
            {
              "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=348747",
              "refsource": "CONFIRM",
              "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=348747"
            },
            {
              "name": "22691",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/22691"
            },
            {
              "name": "1015527",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1015527"
            },
            {
              "name": "18895",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/18895"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-0321",
    "datePublished": "2006-01-24T00:00:00.000Z",
    "dateReserved": "2006-01-19T00:00:00.000Z",
    "dateUpdated": "2024-08-07T16:34:13.607Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-4348 (GCVE-0-2005-4348)

Vulnerability from cvelistv5 – Published: 2005-12-21 00:00 – Updated: 2024-08-07 23:38
VLAI?
Summary
fetchmail before 6.3.1 and before 6.2.5.5, when configured for multidrop mode, allows remote attackers to cause a denial of service (application crash) by sending messages without headers from upstream mail servers.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://secunia.com/advisories/18266 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/18172 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/18231 third-party-advisoryx_refsource_SECUNIA
http://www.vupen.com/english/advisories/2006/3101 vdb-entryx_refsource_VUPEN
http://www.securityfocus.com/archive/1/420098/100… mailing-listx_refsource_BUGTRAQ
http://secunia.com/advisories/21253 third-party-advisoryx_refsource_SECUNIA
http://securitytracker.com/id?1015383 vdb-entryx_refsource_SECTRACK
http://slackware.com/security/viewer.php?l=slackw… vendor-advisoryx_refsource_SLACKWARE
http://secunia.com/advisories/17891 third-party-advisoryx_refsource_SECUNIA
http://www.securityfocus.com/bid/19289 vdb-entryx_refsource_BID
http://www.trustix.org/errata/2006/0002/ vendor-advisoryx_refsource_TRUSTIX
http://secunia.com/advisories/18463 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/24284 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/24007 third-party-advisoryx_refsource_SECUNIA
https://oval.cisecurity.org/repository/search/def… vdb-entrysignaturex_refsource_OVAL
http://www.securityfocus.com/bid/15987 vdb-entryx_refsource_BID
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=343836 x_refsource_MISC
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.novell.com/linux/security/advisories/2… vendor-advisoryx_refsource_SUSE
https://usn.ubuntu.com/233-1/ vendor-advisoryx_refsource_UBUNTU
http://www.osvdb.org/21906 vdb-entryx_refsource_OSVDB
http://www.vupen.com/english/advisories/2005/2996 vdb-entryx_refsource_VUPEN
http://wwwnew.mandriva.com/security/advisories?na… vendor-advisoryx_refsource_MANDRIVA
http://www.securityfocus.com/archive/1/435197/100… mailing-listx_refsource_BUGTRAQ
ftp://patches.sgi.com/support/free/security/advis… vendor-advisoryx_refsource_SGI
http://www.redhat.com/support/errata/RHSA-2007-00… vendor-advisoryx_refsource_REDHAT
http://secunia.com/advisories/18895 third-party-advisoryx_refsource_SECUNIA
http://www.debian.org/security/2005/dsa-939 vendor-advisoryx_refsource_DEBIAN
http://secunia.com/advisories/18433 third-party-advisoryx_refsource_SECUNIA
http://fetchmail.berlios.de/fetchmail-SA-2005-03.txt x_refsource_CONFIRM
Date Public ?
2005-12-19 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T23:38:51.851Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "18266",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18266"
          },
          {
            "name": "18172",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18172"
          },
          {
            "name": "18231",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18231"
          },
          {
            "name": "ADV-2006-3101",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/3101"
          },
          {
            "name": "20051221 fetchmail security announcement fetchmail-SA-2005-03 (CVE-2005-4348)",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/420098/100/0/threaded"
          },
          {
            "name": "21253",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21253"
          },
          {
            "name": "1015383",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1015383"
          },
          {
            "name": "SSA:2006-045-01",
            "tags": [
              "vendor-advisory",
              "x_refsource_SLACKWARE",
              "x_transferred"
            ],
            "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.443499"
          },
          {
            "name": "17891",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17891"
          },
          {
            "name": "19289",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/19289"
          },
          {
            "name": "2006-0002",
            "tags": [
              "vendor-advisory",
              "x_refsource_TRUSTIX",
              "x_transferred"
            ],
            "url": "http://www.trustix.org/errata/2006/0002/"
          },
          {
            "name": "18463",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18463"
          },
          {
            "name": "24284",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/24284"
          },
          {
            "name": "24007",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/24007"
          },
          {
            "name": "oval:org.mitre.oval:def:9659",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9659"
          },
          {
            "name": "15987",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/15987"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=343836"
          },
          {
            "name": "fetchmail-null-pointer-dos(23713)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23713"
          },
          {
            "name": "SUSE-SR:2007:004",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://www.novell.com/linux/security/advisories/2007_4_sr.html"
          },
          {
            "name": "USN-233-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "https://usn.ubuntu.com/233-1/"
          },
          {
            "name": "21906",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/21906"
          },
          {
            "name": "ADV-2005-2996",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2005/2996"
          },
          {
            "name": "MDKSA-2005:236",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:236"
          },
          {
            "name": "20060526 rPSA-2006-0084-1 fetchmail",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/435197/100/0/threaded"
          },
          {
            "name": "20070201-01-P",
            "tags": [
              "vendor-advisory",
              "x_refsource_SGI",
              "x_transferred"
            ],
            "url": "ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc"
          },
          {
            "name": "RHSA-2007:0018",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2007-0018.html"
          },
          {
            "name": "18895",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18895"
          },
          {
            "name": "DSA-939",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2005/dsa-939"
          },
          {
            "name": "18433",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18433"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://fetchmail.berlios.de/fetchmail-SA-2005-03.txt"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-12-19T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "fetchmail before 6.3.1 and before 6.2.5.5, when configured for multidrop mode, allows remote attackers to cause a denial of service (application crash) by sending messages without headers from upstream mail servers."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-19T14:57:01.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "18266",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18266"
        },
        {
          "name": "18172",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18172"
        },
        {
          "name": "18231",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18231"
        },
        {
          "name": "ADV-2006-3101",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/3101"
        },
        {
          "name": "20051221 fetchmail security announcement fetchmail-SA-2005-03 (CVE-2005-4348)",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/420098/100/0/threaded"
        },
        {
          "name": "21253",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21253"
        },
        {
          "name": "1015383",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1015383"
        },
        {
          "name": "SSA:2006-045-01",
          "tags": [
            "vendor-advisory",
            "x_refsource_SLACKWARE"
          ],
          "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.443499"
        },
        {
          "name": "17891",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17891"
        },
        {
          "name": "19289",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/19289"
        },
        {
          "name": "2006-0002",
          "tags": [
            "vendor-advisory",
            "x_refsource_TRUSTIX"
          ],
          "url": "http://www.trustix.org/errata/2006/0002/"
        },
        {
          "name": "18463",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18463"
        },
        {
          "name": "24284",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/24284"
        },
        {
          "name": "24007",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/24007"
        },
        {
          "name": "oval:org.mitre.oval:def:9659",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9659"
        },
        {
          "name": "15987",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/15987"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=343836"
        },
        {
          "name": "fetchmail-null-pointer-dos(23713)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23713"
        },
        {
          "name": "SUSE-SR:2007:004",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://www.novell.com/linux/security/advisories/2007_4_sr.html"
        },
        {
          "name": "USN-233-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "https://usn.ubuntu.com/233-1/"
        },
        {
          "name": "21906",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/21906"
        },
        {
          "name": "ADV-2005-2996",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2005/2996"
        },
        {
          "name": "MDKSA-2005:236",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:236"
        },
        {
          "name": "20060526 rPSA-2006-0084-1 fetchmail",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/435197/100/0/threaded"
        },
        {
          "name": "20070201-01-P",
          "tags": [
            "vendor-advisory",
            "x_refsource_SGI"
          ],
          "url": "ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc"
        },
        {
          "name": "RHSA-2007:0018",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2007-0018.html"
        },
        {
          "name": "18895",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18895"
        },
        {
          "name": "DSA-939",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2005/dsa-939"
        },
        {
          "name": "18433",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18433"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://fetchmail.berlios.de/fetchmail-SA-2005-03.txt"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-4348",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "fetchmail before 6.3.1 and before 6.2.5.5, when configured for multidrop mode, allows remote attackers to cause a denial of service (application crash) by sending messages without headers from upstream mail servers."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "18266",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/18266"
            },
            {
              "name": "18172",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/18172"
            },
            {
              "name": "18231",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/18231"
            },
            {
              "name": "ADV-2006-3101",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/3101"
            },
            {
              "name": "20051221 fetchmail security announcement fetchmail-SA-2005-03 (CVE-2005-4348)",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/420098/100/0/threaded"
            },
            {
              "name": "21253",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21253"
            },
            {
              "name": "1015383",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1015383"
            },
            {
              "name": "SSA:2006-045-01",
              "refsource": "SLACKWARE",
              "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.443499"
            },
            {
              "name": "17891",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17891"
            },
            {
              "name": "19289",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/19289"
            },
            {
              "name": "2006-0002",
              "refsource": "TRUSTIX",
              "url": "http://www.trustix.org/errata/2006/0002/"
            },
            {
              "name": "18463",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/18463"
            },
            {
              "name": "24284",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/24284"
            },
            {
              "name": "24007",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/24007"
            },
            {
              "name": "oval:org.mitre.oval:def:9659",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9659"
            },
            {
              "name": "15987",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/15987"
            },
            {
              "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=343836",
              "refsource": "MISC",
              "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=343836"
            },
            {
              "name": "fetchmail-null-pointer-dos(23713)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23713"
            },
            {
              "name": "SUSE-SR:2007:004",
              "refsource": "SUSE",
              "url": "http://www.novell.com/linux/security/advisories/2007_4_sr.html"
            },
            {
              "name": "USN-233-1",
              "refsource": "UBUNTU",
              "url": "https://usn.ubuntu.com/233-1/"
            },
            {
              "name": "21906",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/21906"
            },
            {
              "name": "ADV-2005-2996",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2005/2996"
            },
            {
              "name": "MDKSA-2005:236",
              "refsource": "MANDRIVA",
              "url": "http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:236"
            },
            {
              "name": "20060526 rPSA-2006-0084-1 fetchmail",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/435197/100/0/threaded"
            },
            {
              "name": "20070201-01-P",
              "refsource": "SGI",
              "url": "ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc"
            },
            {
              "name": "RHSA-2007:0018",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2007-0018.html"
            },
            {
              "name": "18895",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/18895"
            },
            {
              "name": "DSA-939",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2005/dsa-939"
            },
            {
              "name": "18433",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/18433"
            },
            {
              "name": "http://fetchmail.berlios.de/fetchmail-SA-2005-03.txt",
              "refsource": "CONFIRM",
              "url": "http://fetchmail.berlios.de/fetchmail-SA-2005-03.txt"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-4348",
    "datePublished": "2005-12-21T00:00:00.000Z",
    "dateReserved": "2005-12-19T00:00:00.000Z",
    "dateUpdated": "2024-08-07T23:38:51.851Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-3088 (GCVE-0-2005-3088)

Vulnerability from cvelistv5 – Published: 2005-10-27 04:00 – Updated: 2024-08-07 23:01
VLAI?
Summary
fetchmailconf before 1.49 in fetchmail 6.2.0, 6.2.5 and 6.2.5.2 creates configuration files with insecure world-readable permissions, which allows local users to obtain sensitive information such as passwords.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.vupen.com/english/advisories/2005/2182 vdb-entryx_refsource_VUPEN
http://lists.apple.com/archives/security-announce… vendor-advisoryx_refsource_APPLE
http://www.osvdb.org/20267 vdb-entryx_refsource_OSVDB
http://secunia.com/advisories/17293 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/17349 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/17446 third-party-advisoryx_refsource_SECUNIA
http://www.vupen.com/english/advisories/2006/3101 vdb-entryx_refsource_VUPEN
http://securitytracker.com/id?1015114 vdb-entryx_refsource_SECTRACK
http://secunia.com/advisories/21253 third-party-advisoryx_refsource_SECUNIA
http://slackware.com/security/viewer.php?l=slackw… vendor-advisoryx_refsource_SLACKWARE
http://www.securityfocus.com/bid/19289 vdb-entryx_refsource_BID
http://www.us-cert.gov/cas/techalerts/TA06-214A.html third-party-advisoryx_refsource_CERT
http://marc.info/?l=bugtraq&m=113042785902031&w=2 mailing-listx_refsource_BUGTRAQ
http://fetchmail.berlios.de/fetchmail-SA-2005-02.txt x_refsource_CONFIRM
http://www.debian.org/security/2005/dsa-900 vendor-advisoryx_refsource_DEBIAN
http://www.securityfocus.com/bid/15179 vdb-entryx_refsource_BID
http://www.redhat.com/support/errata/RHSA-2005-823.html vendor-advisoryx_refsource_REDHAT
http://secunia.com/advisories/17495 third-party-advisoryx_refsource_SECUNIA
https://usn.ubuntu.com/215-1/ vendor-advisoryx_refsource_UBUNTU
http://www.mandriva.com/security/advisories?name=… vendor-advisoryx_refsource_MANDRIVA
http://secunia.com/advisories/17491 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/18895 third-party-advisoryx_refsource_SECUNIA
http://www.gentoo.org/security/en/glsa/glsa-20051… vendor-advisoryx_refsource_GENTOO
http://secunia.com/advisories/17631 third-party-advisoryx_refsource_SECUNIA
Date Public ?
2005-10-24 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T23:01:57.815Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ADV-2005-2182",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2005/2182"
          },
          {
            "name": "APPLE-SA-2006-08-01",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html"
          },
          {
            "name": "20267",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/20267"
          },
          {
            "name": "17293",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17293"
          },
          {
            "name": "17349",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17349"
          },
          {
            "name": "17446",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17446"
          },
          {
            "name": "ADV-2006-3101",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/3101"
          },
          {
            "name": "1015114",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1015114"
          },
          {
            "name": "21253",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21253"
          },
          {
            "name": "SSA:2006-045-01",
            "tags": [
              "vendor-advisory",
              "x_refsource_SLACKWARE",
              "x_transferred"
            ],
            "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.443499"
          },
          {
            "name": "19289",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/19289"
          },
          {
            "name": "TA06-214A",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT",
              "x_transferred"
            ],
            "url": "http://www.us-cert.gov/cas/techalerts/TA06-214A.html"
          },
          {
            "name": "20051027 fetchmail security announcement 2005-02 (CVE-2005-3088)",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=113042785902031\u0026w=2"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://fetchmail.berlios.de/fetchmail-SA-2005-02.txt"
          },
          {
            "name": "DSA-900",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2005/dsa-900"
          },
          {
            "name": "15179",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/15179"
          },
          {
            "name": "RHSA-2005:823",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2005-823.html"
          },
          {
            "name": "17495",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17495"
          },
          {
            "name": "USN-215-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "https://usn.ubuntu.com/215-1/"
          },
          {
            "name": "MDKSA-2005:209",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:209"
          },
          {
            "name": "17491",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17491"
          },
          {
            "name": "18895",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18895"
          },
          {
            "name": "GLSA-200511-06",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-200511-06.xml"
          },
          {
            "name": "17631",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17631"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-10-24T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "fetchmailconf before 1.49 in fetchmail 6.2.0, 6.2.5 and 6.2.5.2 creates configuration files with insecure world-readable permissions, which allows local users to obtain sensitive information such as passwords."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-03T20:57:01.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "ADV-2005-2182",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2005/2182"
        },
        {
          "name": "APPLE-SA-2006-08-01",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html"
        },
        {
          "name": "20267",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/20267"
        },
        {
          "name": "17293",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17293"
        },
        {
          "name": "17349",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17349"
        },
        {
          "name": "17446",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17446"
        },
        {
          "name": "ADV-2006-3101",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/3101"
        },
        {
          "name": "1015114",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1015114"
        },
        {
          "name": "21253",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21253"
        },
        {
          "name": "SSA:2006-045-01",
          "tags": [
            "vendor-advisory",
            "x_refsource_SLACKWARE"
          ],
          "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.443499"
        },
        {
          "name": "19289",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/19289"
        },
        {
          "name": "TA06-214A",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT"
          ],
          "url": "http://www.us-cert.gov/cas/techalerts/TA06-214A.html"
        },
        {
          "name": "20051027 fetchmail security announcement 2005-02 (CVE-2005-3088)",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=113042785902031\u0026w=2"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://fetchmail.berlios.de/fetchmail-SA-2005-02.txt"
        },
        {
          "name": "DSA-900",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2005/dsa-900"
        },
        {
          "name": "15179",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/15179"
        },
        {
          "name": "RHSA-2005:823",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2005-823.html"
        },
        {
          "name": "17495",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17495"
        },
        {
          "name": "USN-215-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "https://usn.ubuntu.com/215-1/"
        },
        {
          "name": "MDKSA-2005:209",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:209"
        },
        {
          "name": "17491",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17491"
        },
        {
          "name": "18895",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18895"
        },
        {
          "name": "GLSA-200511-06",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-200511-06.xml"
        },
        {
          "name": "17631",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17631"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-3088",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "fetchmailconf before 1.49 in fetchmail 6.2.0, 6.2.5 and 6.2.5.2 creates configuration files with insecure world-readable permissions, which allows local users to obtain sensitive information such as passwords."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ADV-2005-2182",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2005/2182"
            },
            {
              "name": "APPLE-SA-2006-08-01",
              "refsource": "APPLE",
              "url": "http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html"
            },
            {
              "name": "20267",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/20267"
            },
            {
              "name": "17293",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17293"
            },
            {
              "name": "17349",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17349"
            },
            {
              "name": "17446",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17446"
            },
            {
              "name": "ADV-2006-3101",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/3101"
            },
            {
              "name": "1015114",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1015114"
            },
            {
              "name": "21253",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21253"
            },
            {
              "name": "SSA:2006-045-01",
              "refsource": "SLACKWARE",
              "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.443499"
            },
            {
              "name": "19289",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/19289"
            },
            {
              "name": "TA06-214A",
              "refsource": "CERT",
              "url": "http://www.us-cert.gov/cas/techalerts/TA06-214A.html"
            },
            {
              "name": "20051027 fetchmail security announcement 2005-02 (CVE-2005-3088)",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=113042785902031\u0026w=2"
            },
            {
              "name": "http://fetchmail.berlios.de/fetchmail-SA-2005-02.txt",
              "refsource": "CONFIRM",
              "url": "http://fetchmail.berlios.de/fetchmail-SA-2005-02.txt"
            },
            {
              "name": "DSA-900",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2005/dsa-900"
            },
            {
              "name": "15179",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/15179"
            },
            {
              "name": "RHSA-2005:823",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2005-823.html"
            },
            {
              "name": "17495",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17495"
            },
            {
              "name": "USN-215-1",
              "refsource": "UBUNTU",
              "url": "https://usn.ubuntu.com/215-1/"
            },
            {
              "name": "MDKSA-2005:209",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:209"
            },
            {
              "name": "17491",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17491"
            },
            {
              "name": "18895",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/18895"
            },
            {
              "name": "GLSA-200511-06",
              "refsource": "GENTOO",
              "url": "http://www.gentoo.org/security/en/glsa/glsa-200511-06.xml"
            },
            {
              "name": "17631",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17631"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-3088",
    "datePublished": "2005-10-27T04:00:00.000Z",
    "dateReserved": "2005-09-28T00:00:00.000Z",
    "dateUpdated": "2024-08-07T23:01:57.815Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-2335 (GCVE-0-2005-2335)

Vulnerability from cvelistv5 – Published: 2005-07-27 04:00 – Updated: 2024-08-07 22:22
VLAI?
Summary
Buffer overflow in the POP3 client in Fetchmail before 6.2.5.2 allows remote POP3 servers to cause a denial of service and possibly execute arbitrary code via long UIDL responses. NOTE: a typo in an advisory accidentally used the wrong CVE identifier for the Fetchmail issue. This is the correct identifier.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://lists.apple.com/archives/security-announce… vendor-advisoryx_refsource_APPLE
http://www.securityfocus.com/bid/14349 vdb-entryx_refsource_BID
http://www.novell.com/linux/security/advisories/2… vendor-advisoryx_refsource_SUSE
http://www.vupen.com/english/advisories/2006/3101 vdb-entryx_refsource_VUPEN
http://www.redhat.com/archives/fedora-announce-li… x_refsource_MISC
http://www.vupen.com/english/advisories/2005/1171 vdb-entryx_refsource_VUPEN
http://secunia.com/advisories/21253 third-party-advisoryx_refsource_SECUNIA
http://www.securityfocus.com/bid/19289 vdb-entryx_refsource_BID
http://fetchmail.berlios.de/fetchmail-SA-2005-01.txt x_refsource_CONFIRM
http://www.osvdb.org/18174 vdb-entryx_refsource_OSVDB
http://www.us-cert.gov/cas/techalerts/TA06-214A.html third-party-advisoryx_refsource_CERT
https://oval.cisecurity.org/repository/search/def… vdb-entrysignaturex_refsource_OVAL
http://www.redhat.com/archives/fedora-announce-li… vendor-advisoryx_refsource_FEDORA
https://oval.cisecurity.org/repository/search/def… vdb-entrysignaturex_refsource_OVAL
http://developer.berlios.de/project/shownotes.php… x_refsource_CONFIRM
http://www.securityfocus.com/archive/1/441856/100… mailing-listx_refsource_BUGTRAQ
https://oval.cisecurity.org/repository/search/def… vdb-entrysignaturex_refsource_OVAL
http://www.debian.org/security/2005/dsa-774 vendor-advisoryx_refsource_DEBIAN
http://www.redhat.com/support/errata/RHSA-2005-640.html vendor-advisoryx_refsource_REDHAT
http://www.redhat.com/archives/fedora-announce-li… vendor-advisoryx_refsource_FEDORA
http://www.securityfocus.com/archive/1/435197/100… mailing-listx_refsource_BUGTRAQ
http://secunia.com/advisories/16176 third-party-advisoryx_refsource_SECUNIA
Date Public ?
2005-07-21 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T22:22:48.888Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "APPLE-SA-2006-08-01",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html"
          },
          {
            "name": "14349",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/14349"
          },
          {
            "name": "SUSE-SR:2005:018",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://www.novell.com/linux/security/advisories/2005_18_sr.html"
          },
          {
            "name": "ADV-2006-3101",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/3101"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/archives/fedora-announce-list/2005-July/msg00104.html"
          },
          {
            "name": "ADV-2005-1171",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2005/1171"
          },
          {
            "name": "21253",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21253"
          },
          {
            "name": "19289",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/19289"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://fetchmail.berlios.de/fetchmail-SA-2005-01.txt"
          },
          {
            "name": "18174",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/18174"
          },
          {
            "name": "TA06-214A",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT",
              "x_transferred"
            ],
            "url": "http://www.us-cert.gov/cas/techalerts/TA06-214A.html"
          },
          {
            "name": "oval:org.mitre.oval:def:1124",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1124"
          },
          {
            "name": "FEDORA-2005-613",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/archives/fedora-announce-list/2005-July/msg00088.html"
          },
          {
            "name": "oval:org.mitre.oval:def:1038",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1038"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://developer.berlios.de/project/shownotes.php?release_id=6617"
          },
          {
            "name": "20060801 DMA[2006-0801a] - \u0027Apple OSX fetchmail buffer overflow\u0027",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/441856/100/200/threaded"
          },
          {
            "name": "oval:org.mitre.oval:def:8833",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8833"
          },
          {
            "name": "DSA-774",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2005/dsa-774"
          },
          {
            "name": "RHSA-2005:640",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2005-640.html"
          },
          {
            "name": "FEDORA-2005-614",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/archives/fedora-announce-list/2005-July/msg00089.html"
          },
          {
            "name": "20060526 rPSA-2006-0084-1 fetchmail",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/435197/100/0/threaded"
          },
          {
            "name": "16176",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/16176"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-07-21T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in the POP3 client in Fetchmail before 6.2.5.2 allows remote POP3 servers to cause a denial of service and possibly execute arbitrary code via long UIDL responses.  NOTE: a typo in an advisory accidentally used the wrong CVE identifier for the Fetchmail issue. This is the correct identifier."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-19T14:57:01.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "APPLE-SA-2006-08-01",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html"
        },
        {
          "name": "14349",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/14349"
        },
        {
          "name": "SUSE-SR:2005:018",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://www.novell.com/linux/security/advisories/2005_18_sr.html"
        },
        {
          "name": "ADV-2006-3101",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/3101"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.redhat.com/archives/fedora-announce-list/2005-July/msg00104.html"
        },
        {
          "name": "ADV-2005-1171",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2005/1171"
        },
        {
          "name": "21253",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21253"
        },
        {
          "name": "19289",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/19289"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://fetchmail.berlios.de/fetchmail-SA-2005-01.txt"
        },
        {
          "name": "18174",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/18174"
        },
        {
          "name": "TA06-214A",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT"
          ],
          "url": "http://www.us-cert.gov/cas/techalerts/TA06-214A.html"
        },
        {
          "name": "oval:org.mitre.oval:def:1124",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1124"
        },
        {
          "name": "FEDORA-2005-613",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://www.redhat.com/archives/fedora-announce-list/2005-July/msg00088.html"
        },
        {
          "name": "oval:org.mitre.oval:def:1038",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1038"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://developer.berlios.de/project/shownotes.php?release_id=6617"
        },
        {
          "name": "20060801 DMA[2006-0801a] - \u0027Apple OSX fetchmail buffer overflow\u0027",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/441856/100/200/threaded"
        },
        {
          "name": "oval:org.mitre.oval:def:8833",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8833"
        },
        {
          "name": "DSA-774",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2005/dsa-774"
        },
        {
          "name": "RHSA-2005:640",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2005-640.html"
        },
        {
          "name": "FEDORA-2005-614",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://www.redhat.com/archives/fedora-announce-list/2005-July/msg00089.html"
        },
        {
          "name": "20060526 rPSA-2006-0084-1 fetchmail",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/435197/100/0/threaded"
        },
        {
          "name": "16176",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/16176"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-2335",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in the POP3 client in Fetchmail before 6.2.5.2 allows remote POP3 servers to cause a denial of service and possibly execute arbitrary code via long UIDL responses.  NOTE: a typo in an advisory accidentally used the wrong CVE identifier for the Fetchmail issue. This is the correct identifier."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "APPLE-SA-2006-08-01",
              "refsource": "APPLE",
              "url": "http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html"
            },
            {
              "name": "14349",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/14349"
            },
            {
              "name": "SUSE-SR:2005:018",
              "refsource": "SUSE",
              "url": "http://www.novell.com/linux/security/advisories/2005_18_sr.html"
            },
            {
              "name": "ADV-2006-3101",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/3101"
            },
            {
              "name": "http://www.redhat.com/archives/fedora-announce-list/2005-July/msg00104.html",
              "refsource": "MISC",
              "url": "http://www.redhat.com/archives/fedora-announce-list/2005-July/msg00104.html"
            },
            {
              "name": "ADV-2005-1171",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2005/1171"
            },
            {
              "name": "21253",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21253"
            },
            {
              "name": "19289",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/19289"
            },
            {
              "name": "http://fetchmail.berlios.de/fetchmail-SA-2005-01.txt",
              "refsource": "CONFIRM",
              "url": "http://fetchmail.berlios.de/fetchmail-SA-2005-01.txt"
            },
            {
              "name": "18174",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/18174"
            },
            {
              "name": "TA06-214A",
              "refsource": "CERT",
              "url": "http://www.us-cert.gov/cas/techalerts/TA06-214A.html"
            },
            {
              "name": "oval:org.mitre.oval:def:1124",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1124"
            },
            {
              "name": "FEDORA-2005-613",
              "refsource": "FEDORA",
              "url": "http://www.redhat.com/archives/fedora-announce-list/2005-July/msg00088.html"
            },
            {
              "name": "oval:org.mitre.oval:def:1038",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1038"
            },
            {
              "name": "http://developer.berlios.de/project/shownotes.php?release_id=6617",
              "refsource": "CONFIRM",
              "url": "http://developer.berlios.de/project/shownotes.php?release_id=6617"
            },
            {
              "name": "20060801 DMA[2006-0801a] - \u0027Apple OSX fetchmail buffer overflow\u0027",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/441856/100/200/threaded"
            },
            {
              "name": "oval:org.mitre.oval:def:8833",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8833"
            },
            {
              "name": "DSA-774",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2005/dsa-774"
            },
            {
              "name": "RHSA-2005:640",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2005-640.html"
            },
            {
              "name": "FEDORA-2005-614",
              "refsource": "FEDORA",
              "url": "http://www.redhat.com/archives/fedora-announce-list/2005-July/msg00089.html"
            },
            {
              "name": "20060526 rPSA-2006-0084-1 fetchmail",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/435197/100/0/threaded"
            },
            {
              "name": "16176",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/16176"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-2335",
    "datePublished": "2005-07-27T04:00:00.000Z",
    "dateReserved": "2005-07-21T00:00:00.000Z",
    "dateUpdated": "2024-08-07T22:22:48.888Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2002-1365 (GCVE-0-2002-1365)

Vulnerability from cvelistv5 – Published: 2004-09-01 04:00 – Updated: 2024-08-08 03:19
VLAI?
Summary
Heap-based buffer overflow in Fetchmail 6.1.3 and earlier does not account for the "@" character when determining buffer lengths for local addresses, which allows remote attackers to execute arbitrary code via a header with a large number of local addresses.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Date Public ?
2002-12-13 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T03:19:28.987Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "6390",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/6390"
          },
          {
            "name": "MDKSA-2003:011",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRAKE",
              "x_transferred"
            ],
            "url": "http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:011"
          },
          {
            "name": "20021213 Advisory 05/2002: Another Fetchmail Remote Vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=103979751818638\u0026w=2"
          },
          {
            "name": "20021215 GLSA: fetchmail",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=104004858802000\u0026w=2"
          },
          {
            "name": "DSA-216",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2002/dsa-216"
          },
          {
            "name": "fetchmail-address-header-bo(10839)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10839"
          },
          {
            "name": "RHSA-2002:293",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2002-293.html"
          },
          {
            "name": "CLA-2002:554",
            "tags": [
              "vendor-advisory",
              "x_refsource_CONECTIVA",
              "x_transferred"
            ],
            "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000554"
          },
          {
            "name": "RHSA-2002:294",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2002-294.html"
          },
          {
            "name": "RHSA-2003:155",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2003-155.html"
          },
          {
            "name": "CSSA-2003-001.0",
            "tags": [
              "vendor-advisory",
              "x_refsource_CALDERA",
              "x_transferred"
            ],
            "url": "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2003-001.0.txt"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://security.e-matters.de/advisories/052002.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2002-12-13T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Heap-based buffer overflow in Fetchmail 6.1.3 and earlier does not account for the \"@\" character when determining buffer lengths for local addresses, which allows remote attackers to execute arbitrary code via a header with a large number of local addresses."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2007-11-13T00:00:00.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "6390",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/6390"
        },
        {
          "name": "MDKSA-2003:011",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRAKE"
          ],
          "url": "http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:011"
        },
        {
          "name": "20021213 Advisory 05/2002: Another Fetchmail Remote Vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=103979751818638\u0026w=2"
        },
        {
          "name": "20021215 GLSA: fetchmail",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=104004858802000\u0026w=2"
        },
        {
          "name": "DSA-216",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2002/dsa-216"
        },
        {
          "name": "fetchmail-address-header-bo(10839)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10839"
        },
        {
          "name": "RHSA-2002:293",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2002-293.html"
        },
        {
          "name": "CLA-2002:554",
          "tags": [
            "vendor-advisory",
            "x_refsource_CONECTIVA"
          ],
          "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000554"
        },
        {
          "name": "RHSA-2002:294",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2002-294.html"
        },
        {
          "name": "RHSA-2003:155",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2003-155.html"
        },
        {
          "name": "CSSA-2003-001.0",
          "tags": [
            "vendor-advisory",
            "x_refsource_CALDERA"
          ],
          "url": "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2003-001.0.txt"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://security.e-matters.de/advisories/052002.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2002-1365",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Heap-based buffer overflow in Fetchmail 6.1.3 and earlier does not account for the \"@\" character when determining buffer lengths for local addresses, which allows remote attackers to execute arbitrary code via a header with a large number of local addresses."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "6390",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/6390"
            },
            {
              "name": "MDKSA-2003:011",
              "refsource": "MANDRAKE",
              "url": "http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:011"
            },
            {
              "name": "20021213 Advisory 05/2002: Another Fetchmail Remote Vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=103979751818638\u0026w=2"
            },
            {
              "name": "20021215 GLSA: fetchmail",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=104004858802000\u0026w=2"
            },
            {
              "name": "DSA-216",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2002/dsa-216"
            },
            {
              "name": "fetchmail-address-header-bo(10839)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10839"
            },
            {
              "name": "RHSA-2002:293",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2002-293.html"
            },
            {
              "name": "CLA-2002:554",
              "refsource": "CONECTIVA",
              "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000554"
            },
            {
              "name": "RHSA-2002:294",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2002-294.html"
            },
            {
              "name": "RHSA-2003:155",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2003-155.html"
            },
            {
              "name": "CSSA-2003-001.0",
              "refsource": "CALDERA",
              "url": "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2003-001.0.txt"
            },
            {
              "name": "http://security.e-matters.de/advisories/052002.html",
              "refsource": "MISC",
              "url": "http://security.e-matters.de/advisories/052002.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2002-1365",
    "datePublished": "2004-09-01T04:00:00.000Z",
    "dateReserved": "2002-12-16T00:00:00.000Z",
    "dateUpdated": "2024-08-08T03:19:28.987Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2003-0792 (GCVE-0-2003-0792)

Vulnerability from cvelistv5 – Published: 2003-10-21 04:00 – Updated: 2024-08-08 02:05
VLAI?
Summary
Fetchmail 6.2.4 and earlier does not properly allocate memory for long lines, which allows remote attackers to cause a denial of service (crash) via a certain email.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
ftp://ftp.sco.com/pub/updates/OpenLinux/3.1.1/Ser… vendor-advisoryx_refsource_SCO
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.securityfocus.com/advisories/5987 vendor-advisoryx_refsource_IMMUNIX
http://www.securityfocus.com/bid/8843 vdb-entryx_refsource_BID
http://www.mandriva.com/security/advisories?name=… vendor-advisoryx_refsource_MANDRAKE
http://security.gentoo.org/glsa/glsa-200403-10.xml vendor-advisoryx_refsource_GENTOO
http://www.turbolinux.com/security/TLSA-2003-61.txt vendor-advisoryx_refsource_TURBO
http://marc.info/?l=bugtraq&m=107731542827401&w=2 mailing-listx_refsource_BUGTRAQ
Date Public ?
2003-10-17 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T02:05:12.602Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "CSSA-2004-004.0",
            "tags": [
              "vendor-advisory",
              "x_refsource_SCO",
              "x_transferred"
            ],
            "url": "ftp://ftp.sco.com/pub/updates/OpenLinux/3.1.1/Server/CSSA-2004-004.0/CSSA-2004-004.0.txt"
          },
          {
            "name": "fetchmail-email-dos(13450)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/13450"
          },
          {
            "name": "IMNX-2003-7+-023-01",
            "tags": [
              "vendor-advisory",
              "x_refsource_IMMUNIX",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/advisories/5987"
          },
          {
            "name": "8843",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/8843"
          },
          {
            "name": "MDKSA-2003:101",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRAKE",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:101"
          },
          {
            "name": "GLSA-200403-10",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200403-10.xml"
          },
          {
            "name": "TLSA-2003-61",
            "tags": [
              "vendor-advisory",
              "x_refsource_TURBO",
              "x_transferred"
            ],
            "url": "http://www.turbolinux.com/security/TLSA-2003-61.txt"
          },
          {
            "name": "20040220 LNSA-#2004-0002: Fetchmail 6.2.4 and earlier remote denial of service",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=107731542827401\u0026w=2"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2003-10-17T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Fetchmail 6.2.4 and earlier does not properly allocate memory for long lines, which allows remote attackers to cause a denial of service (crash) via a certain email."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "CSSA-2004-004.0",
          "tags": [
            "vendor-advisory",
            "x_refsource_SCO"
          ],
          "url": "ftp://ftp.sco.com/pub/updates/OpenLinux/3.1.1/Server/CSSA-2004-004.0/CSSA-2004-004.0.txt"
        },
        {
          "name": "fetchmail-email-dos(13450)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/13450"
        },
        {
          "name": "IMNX-2003-7+-023-01",
          "tags": [
            "vendor-advisory",
            "x_refsource_IMMUNIX"
          ],
          "url": "http://www.securityfocus.com/advisories/5987"
        },
        {
          "name": "8843",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/8843"
        },
        {
          "name": "MDKSA-2003:101",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRAKE"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:101"
        },
        {
          "name": "GLSA-200403-10",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200403-10.xml"
        },
        {
          "name": "TLSA-2003-61",
          "tags": [
            "vendor-advisory",
            "x_refsource_TURBO"
          ],
          "url": "http://www.turbolinux.com/security/TLSA-2003-61.txt"
        },
        {
          "name": "20040220 LNSA-#2004-0002: Fetchmail 6.2.4 and earlier remote denial of service",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=107731542827401\u0026w=2"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2003-0792",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Fetchmail 6.2.4 and earlier does not properly allocate memory for long lines, which allows remote attackers to cause a denial of service (crash) via a certain email."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "CSSA-2004-004.0",
              "refsource": "SCO",
              "url": "ftp://ftp.sco.com/pub/updates/OpenLinux/3.1.1/Server/CSSA-2004-004.0/CSSA-2004-004.0.txt"
            },
            {
              "name": "fetchmail-email-dos(13450)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/13450"
            },
            {
              "name": "IMNX-2003-7+-023-01",
              "refsource": "IMMUNIX",
              "url": "http://www.securityfocus.com/advisories/5987"
            },
            {
              "name": "8843",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/8843"
            },
            {
              "name": "MDKSA-2003:101",
              "refsource": "MANDRAKE",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:101"
            },
            {
              "name": "GLSA-200403-10",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200403-10.xml"
            },
            {
              "name": "TLSA-2003-61",
              "refsource": "TURBO",
              "url": "http://www.turbolinux.com/security/TLSA-2003-61.txt"
            },
            {
              "name": "20040220 LNSA-#2004-0002: Fetchmail 6.2.4 and earlier remote denial of service",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=107731542827401\u0026w=2"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2003-0792",
    "datePublished": "2003-10-21T04:00:00.000Z",
    "dateReserved": "2003-09-17T00:00:00.000Z",
    "dateUpdated": "2024-08-08T02:05:12.602Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2002-0146 (GCVE-0-2002-0146)

Vulnerability from cvelistv5 – Published: 2003-04-02 05:00 – Updated: 2024-08-08 02:42
VLAI?
Summary
fetchmail email client before 5.9.10 does not properly limit the maximum number of messages available, which allows a remote IMAP server to overwrite memory via a message count that exceeds the boundaries of an array.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Date Public ?
2002-05-20 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T02:42:27.666Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "HPSBTL0205-042",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://online.securityfocus.com/advisories/4145"
          },
          {
            "name": "fetchmail-imap-msgnum-bo(9133)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "http://www.iss.net/security_center/static/9133.php"
          },
          {
            "name": "4788",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/4788"
          },
          {
            "name": "CSSA-2002-027.0",
            "tags": [
              "vendor-advisory",
              "x_refsource_CALDERA",
              "x_transferred"
            ],
            "url": "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-027.0.txt"
          },
          {
            "name": "RHSA-2002:047",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2002-047.html"
          },
          {
            "name": "MDKSA-2002:036",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRAKE",
              "x_transferred"
            ],
            "url": "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-036.php"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2002-05-20T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "fetchmail email client before 5.9.10 does not properly limit the maximum number of messages available, which allows a remote IMAP server to overwrite memory via a message count that exceeds the boundaries of an array."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2002-08-17T00:00:00.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "HPSBTL0205-042",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://online.securityfocus.com/advisories/4145"
        },
        {
          "name": "fetchmail-imap-msgnum-bo(9133)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "http://www.iss.net/security_center/static/9133.php"
        },
        {
          "name": "4788",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/4788"
        },
        {
          "name": "CSSA-2002-027.0",
          "tags": [
            "vendor-advisory",
            "x_refsource_CALDERA"
          ],
          "url": "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-027.0.txt"
        },
        {
          "name": "RHSA-2002:047",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2002-047.html"
        },
        {
          "name": "MDKSA-2002:036",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRAKE"
          ],
          "url": "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-036.php"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2002-0146",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "fetchmail email client before 5.9.10 does not properly limit the maximum number of messages available, which allows a remote IMAP server to overwrite memory via a message count that exceeds the boundaries of an array."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "HPSBTL0205-042",
              "refsource": "HP",
              "url": "http://online.securityfocus.com/advisories/4145"
            },
            {
              "name": "fetchmail-imap-msgnum-bo(9133)",
              "refsource": "XF",
              "url": "http://www.iss.net/security_center/static/9133.php"
            },
            {
              "name": "4788",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/4788"
            },
            {
              "name": "CSSA-2002-027.0",
              "refsource": "CALDERA",
              "url": "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-027.0.txt"
            },
            {
              "name": "RHSA-2002:047",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2002-047.html"
            },
            {
              "name": "MDKSA-2002:036",
              "refsource": "MANDRAKE",
              "url": "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-036.php"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2002-0146",
    "datePublished": "2003-04-02T05:00:00.000Z",
    "dateReserved": "2002-03-18T00:00:00.000Z",
    "dateUpdated": "2024-08-08T02:42:27.666Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2001-1378 (GCVE-0-2001-1378)

Vulnerability from cvelistv5 – Published: 2003-04-02 05:00 – Updated: 2024-08-08 04:51
VLAI?
Summary
fetchmailconf in fetchmail before 5.7.4 allows local users to overwrite files of other users via a symlink attack on temporary files.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Date Public ?
2001-03-12 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T04:51:08.433Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "RHSA-2001:103",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2001-103.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://lists.ccil.org/pipermail/fetchmail-announce/2001-March/000015.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2001-03-12T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "fetchmailconf in fetchmail before 5.7.4 allows local users to overwrite files of other users via a symlink attack on temporary files."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2002-07-26T09:00:00.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "RHSA-2001:103",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2001-103.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://lists.ccil.org/pipermail/fetchmail-announce/2001-March/000015.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2001-1378",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "fetchmailconf in fetchmail before 5.7.4 allows local users to overwrite files of other users via a symlink attack on temporary files."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "RHSA-2001:103",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2001-103.html"
            },
            {
              "name": "http://lists.ccil.org/pipermail/fetchmail-announce/2001-March/000015.html",
              "refsource": "MISC",
              "url": "http://lists.ccil.org/pipermail/fetchmail-announce/2001-March/000015.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2001-1378",
    "datePublished": "2003-04-02T05:00:00.000Z",
    "dateReserved": "2002-07-15T00:00:00.000Z",
    "dateUpdated": "2024-08-08T04:51:08.433Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2002-1174 (GCVE-0-2002-1174)

Vulnerability from cvelistv5 – Published: 2002-10-01 04:00 – Updated: 2024-08-08 03:19
VLAI?
Summary
Buffer overflows in Fetchmail 6.0.0 and earlier allow remote attackers to cause a denial of service (crash) or execute arbitrary code via (1) long headers that are not properly processed by the readheaders function, or (2) via long Received: headers, which are not properly parsed by the parse_received function.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.linux-mandrake.com/en/security/2002/MD… vendor-advisoryx_refsource_MANDRAKE
http://www.securityfocus.com/bid/5827 vdb-entryx_refsource_BID
http://marc.info/?l=bugtraq&m=103340148625187&w=2 mailing-listx_refsource_BUGTRAQ
http://www.securityfocus.com/bid/5825 vdb-entryx_refsource_BID
http://rhn.redhat.com/errata/RHSA-2002-215.html vendor-advisoryx_refsource_REDHAT
http://www.iss.net/security_center/static/10203.php vdb-entryx_refsource_XF
http://distro.conectiva.com.br/atualizacoes/?id=a… vendor-advisoryx_refsource_CONECTIVA
http://www.linuxsecurity.com/advisories/other_adv… vendor-advisoryx_refsource_ENGARDE
http://www.debian.org/security/2002/dsa-171 vendor-advisoryx_refsource_DEBIAN
Date Public ?
2002-09-29 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T03:19:27.643Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "MDKSA-2002:063",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRAKE",
              "x_transferred"
            ],
            "url": "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-063.php"
          },
          {
            "name": "5827",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/5827"
          },
          {
            "name": "20020929 Advisory 03/2002: Fetchmail remote vulnerabilities",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=103340148625187\u0026w=2"
          },
          {
            "name": "5825",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/5825"
          },
          {
            "name": "RHSA-2002:215",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2002-215.html"
          },
          {
            "name": "fetchmail-multidrop-bo(10203)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "http://www.iss.net/security_center/static/10203.php"
          },
          {
            "name": "CLA-2002:531",
            "tags": [
              "vendor-advisory",
              "x_refsource_CONECTIVA",
              "x_transferred"
            ],
            "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000531"
          },
          {
            "name": "ESA-20021003-023",
            "tags": [
              "vendor-advisory",
              "x_refsource_ENGARDE",
              "x_transferred"
            ],
            "url": "http://www.linuxsecurity.com/advisories/other_advisory-2402.html"
          },
          {
            "name": "DSA-171",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2002/dsa-171"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2002-09-29T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflows in Fetchmail 6.0.0 and earlier allow remote attackers to cause a denial of service (crash) or execute arbitrary code via (1) long headers that are not properly processed by the readheaders function, or (2) via long Received: headers, which are not properly parsed by the parse_received function."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-10-17T13:57:01.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "MDKSA-2002:063",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRAKE"
          ],
          "url": "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-063.php"
        },
        {
          "name": "5827",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/5827"
        },
        {
          "name": "20020929 Advisory 03/2002: Fetchmail remote vulnerabilities",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=103340148625187\u0026w=2"
        },
        {
          "name": "5825",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/5825"
        },
        {
          "name": "RHSA-2002:215",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2002-215.html"
        },
        {
          "name": "fetchmail-multidrop-bo(10203)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "http://www.iss.net/security_center/static/10203.php"
        },
        {
          "name": "CLA-2002:531",
          "tags": [
            "vendor-advisory",
            "x_refsource_CONECTIVA"
          ],
          "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000531"
        },
        {
          "name": "ESA-20021003-023",
          "tags": [
            "vendor-advisory",
            "x_refsource_ENGARDE"
          ],
          "url": "http://www.linuxsecurity.com/advisories/other_advisory-2402.html"
        },
        {
          "name": "DSA-171",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2002/dsa-171"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2002-1174",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflows in Fetchmail 6.0.0 and earlier allow remote attackers to cause a denial of service (crash) or execute arbitrary code via (1) long headers that are not properly processed by the readheaders function, or (2) via long Received: headers, which are not properly parsed by the parse_received function."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "MDKSA-2002:063",
              "refsource": "MANDRAKE",
              "url": "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-063.php"
            },
            {
              "name": "5827",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/5827"
            },
            {
              "name": "20020929 Advisory 03/2002: Fetchmail remote vulnerabilities",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=103340148625187\u0026w=2"
            },
            {
              "name": "5825",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/5825"
            },
            {
              "name": "RHSA-2002:215",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2002-215.html"
            },
            {
              "name": "fetchmail-multidrop-bo(10203)",
              "refsource": "XF",
              "url": "http://www.iss.net/security_center/static/10203.php"
            },
            {
              "name": "CLA-2002:531",
              "refsource": "CONECTIVA",
              "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000531"
            },
            {
              "name": "ESA-20021003-023",
              "refsource": "ENGARDE",
              "url": "http://www.linuxsecurity.com/advisories/other_advisory-2402.html"
            },
            {
              "name": "DSA-171",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2002/dsa-171"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2002-1174",
    "datePublished": "2002-10-01T04:00:00.000Z",
    "dateReserved": "2002-09-30T00:00:00.000Z",
    "dateUpdated": "2024-08-08T03:19:27.643Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2002-1175 (GCVE-0-2002-1175)

Vulnerability from cvelistv5 – Published: 2002-10-01 04:00 – Updated: 2024-08-08 03:19
VLAI?
Summary
The getmxrecord function in Fetchmail 6.0.0 and earlier does not properly check the boundary of a particular malformed DNS packet from a malicious DNS server, which allows remote attackers to cause a denial of service (crash) when Fetchmail attempts to read data beyond the expected boundary.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.linux-mandrake.com/en/security/2002/MD… vendor-advisoryx_refsource_MANDRAKE
http://marc.info/?l=bugtraq&m=103340148625187&w=2 mailing-listx_refsource_BUGTRAQ
http://rhn.redhat.com/errata/RHSA-2002-215.html vendor-advisoryx_refsource_REDHAT
http://www.iss.net/security_center/static/10203.php vdb-entryx_refsource_XF
http://distro.conectiva.com.br/atualizacoes/?id=a… vendor-advisoryx_refsource_CONECTIVA
http://www.linuxsecurity.com/advisories/other_adv… vendor-advisoryx_refsource_ENGARDE
http://www.securityfocus.com/bid/5826 vdb-entryx_refsource_BID
http://www.debian.org/security/2002/dsa-171 vendor-advisoryx_refsource_DEBIAN
Date Public ?
2002-09-29 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T03:19:27.488Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "MDKSA-2002:063",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRAKE",
              "x_transferred"
            ],
            "url": "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-063.php"
          },
          {
            "name": "20020929 Advisory 03/2002: Fetchmail remote vulnerabilities",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=103340148625187\u0026w=2"
          },
          {
            "name": "RHSA-2002:215",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2002-215.html"
          },
          {
            "name": "fetchmail-multidrop-bo(10203)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "http://www.iss.net/security_center/static/10203.php"
          },
          {
            "name": "CLA-2002:531",
            "tags": [
              "vendor-advisory",
              "x_refsource_CONECTIVA",
              "x_transferred"
            ],
            "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000531"
          },
          {
            "name": "ESA-20021003-023",
            "tags": [
              "vendor-advisory",
              "x_refsource_ENGARDE",
              "x_transferred"
            ],
            "url": "http://www.linuxsecurity.com/advisories/other_advisory-2402.html"
          },
          {
            "name": "5826",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/5826"
          },
          {
            "name": "DSA-171",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2002/dsa-171"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2002-09-29T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "The getmxrecord function in Fetchmail 6.0.0 and earlier does not properly check the boundary of a particular malformed DNS packet from a malicious DNS server, which allows remote attackers to cause a denial of service (crash) when Fetchmail attempts to read data beyond the expected boundary."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-10-17T13:57:01.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "MDKSA-2002:063",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRAKE"
          ],
          "url": "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-063.php"
        },
        {
          "name": "20020929 Advisory 03/2002: Fetchmail remote vulnerabilities",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=103340148625187\u0026w=2"
        },
        {
          "name": "RHSA-2002:215",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2002-215.html"
        },
        {
          "name": "fetchmail-multidrop-bo(10203)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "http://www.iss.net/security_center/static/10203.php"
        },
        {
          "name": "CLA-2002:531",
          "tags": [
            "vendor-advisory",
            "x_refsource_CONECTIVA"
          ],
          "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000531"
        },
        {
          "name": "ESA-20021003-023",
          "tags": [
            "vendor-advisory",
            "x_refsource_ENGARDE"
          ],
          "url": "http://www.linuxsecurity.com/advisories/other_advisory-2402.html"
        },
        {
          "name": "5826",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/5826"
        },
        {
          "name": "DSA-171",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2002/dsa-171"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2002-1175",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The getmxrecord function in Fetchmail 6.0.0 and earlier does not properly check the boundary of a particular malformed DNS packet from a malicious DNS server, which allows remote attackers to cause a denial of service (crash) when Fetchmail attempts to read data beyond the expected boundary."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "MDKSA-2002:063",
              "refsource": "MANDRAKE",
              "url": "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-063.php"
            },
            {
              "name": "20020929 Advisory 03/2002: Fetchmail remote vulnerabilities",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=103340148625187\u0026w=2"
            },
            {
              "name": "RHSA-2002:215",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2002-215.html"
            },
            {
              "name": "fetchmail-multidrop-bo(10203)",
              "refsource": "XF",
              "url": "http://www.iss.net/security_center/static/10203.php"
            },
            {
              "name": "CLA-2002:531",
              "refsource": "CONECTIVA",
              "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000531"
            },
            {
              "name": "ESA-20021003-023",
              "refsource": "ENGARDE",
              "url": "http://www.linuxsecurity.com/advisories/other_advisory-2402.html"
            },
            {
              "name": "5826",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/5826"
            },
            {
              "name": "DSA-171",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2002/dsa-171"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2002-1175",
    "datePublished": "2002-10-01T04:00:00.000Z",
    "dateReserved": "2002-09-30T00:00:00.000Z",
    "dateUpdated": "2024-08-08T03:19:27.488Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2001-0819 (GCVE-0-2001-0819)

Vulnerability from cvelistv5 – Published: 2002-03-09 05:00 – Updated: 2024-08-08 04:37
VLAI?
Summary
A buffer overflow in Linux fetchmail before 5.8.6 allows remote attackers to execute arbitrary code via a large 'To:' field in an email header.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.novell.com/linux/security/advisories/2… vendor-advisoryx_refsource_SUSE
http://www.redhat.com/support/errata/RHSA-2001-103.html vendor-advisoryx_refsource_REDHAT
ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories… vendor-advisoryx_refsource_FREEBSD
http://www.securityfocus.com/bid/2877 vdb-entryx_refsource_BID
http://download.immunix.org/ImmunixOS/7.0/updates… vendor-advisoryx_refsource_IMMUNIX
http://www.linuxsecurity.com/advisories/other_adv… vendor-advisoryx_refsource_ENGARDE
http://www.caldera.com/support/security/advisorie… vendor-advisoryx_refsource_CALDERA
http://www.debian.org/security/2001/dsa-060 vendor-advisoryx_refsource_DEBIAN
http://www.linux-mandrake.com/en/security/2001/MD… vendor-advisoryx_refsource_MANDRAKE
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://distro.conectiva.com.br/atualizacoes/?id=a… vendor-advisoryx_refsource_CONECTIVA
Date Public ?
2001-06-10 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T04:37:06.917Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "SuSE-SA:2001:026",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://www.novell.com/linux/security/advisories/2001_026_fetchmail_txt.html"
          },
          {
            "name": "RHSA-2001:103",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2001-103.html"
          },
          {
            "name": "FreeBSD-SA-01:43",
            "tags": [
              "vendor-advisory",
              "x_refsource_FREEBSD",
              "x_transferred"
            ],
            "url": "ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:43.fetchmail.asc"
          },
          {
            "name": "2877",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/2877"
          },
          {
            "name": "IMNX-2001-70-025-01",
            "tags": [
              "vendor-advisory",
              "x_refsource_IMMUNIX",
              "x_transferred"
            ],
            "url": "http://download.immunix.org/ImmunixOS/7.0/updates/IMNX-2001-70-025-01"
          },
          {
            "name": "ESA-20010620-01",
            "tags": [
              "vendor-advisory",
              "x_refsource_ENGARDE",
              "x_transferred"
            ],
            "url": "http://www.linuxsecurity.com/advisories/other_advisory-1451.html"
          },
          {
            "name": "CSSA-2001-022.1",
            "tags": [
              "vendor-advisory",
              "x_refsource_CALDERA",
              "x_transferred"
            ],
            "url": "http://www.caldera.com/support/security/advisories/CSSA-2001-022.1.txt"
          },
          {
            "name": "DSA-060",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2001/dsa-060"
          },
          {
            "name": "MDKSA-2001:063",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRAKE",
              "x_transferred"
            ],
            "url": "http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-063.php3?dis=7.1"
          },
          {
            "name": "fetchmail-long-header-bo(6704)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6704"
          },
          {
            "name": "CLA-2001:403",
            "tags": [
              "vendor-advisory",
              "x_refsource_CONECTIVA",
              "x_transferred"
            ],
            "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000403"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2001-06-10T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "A buffer overflow in Linux fetchmail before 5.8.6 allows remote attackers to execute arbitrary code via a large \u0027To:\u0027 field in an email header."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2002-02-26T00:00:00.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "SuSE-SA:2001:026",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://www.novell.com/linux/security/advisories/2001_026_fetchmail_txt.html"
        },
        {
          "name": "RHSA-2001:103",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2001-103.html"
        },
        {
          "name": "FreeBSD-SA-01:43",
          "tags": [
            "vendor-advisory",
            "x_refsource_FREEBSD"
          ],
          "url": "ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:43.fetchmail.asc"
        },
        {
          "name": "2877",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/2877"
        },
        {
          "name": "IMNX-2001-70-025-01",
          "tags": [
            "vendor-advisory",
            "x_refsource_IMMUNIX"
          ],
          "url": "http://download.immunix.org/ImmunixOS/7.0/updates/IMNX-2001-70-025-01"
        },
        {
          "name": "ESA-20010620-01",
          "tags": [
            "vendor-advisory",
            "x_refsource_ENGARDE"
          ],
          "url": "http://www.linuxsecurity.com/advisories/other_advisory-1451.html"
        },
        {
          "name": "CSSA-2001-022.1",
          "tags": [
            "vendor-advisory",
            "x_refsource_CALDERA"
          ],
          "url": "http://www.caldera.com/support/security/advisories/CSSA-2001-022.1.txt"
        },
        {
          "name": "DSA-060",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2001/dsa-060"
        },
        {
          "name": "MDKSA-2001:063",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRAKE"
          ],
          "url": "http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-063.php3?dis=7.1"
        },
        {
          "name": "fetchmail-long-header-bo(6704)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6704"
        },
        {
          "name": "CLA-2001:403",
          "tags": [
            "vendor-advisory",
            "x_refsource_CONECTIVA"
          ],
          "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000403"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2001-0819",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A buffer overflow in Linux fetchmail before 5.8.6 allows remote attackers to execute arbitrary code via a large \u0027To:\u0027 field in an email header."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "SuSE-SA:2001:026",
              "refsource": "SUSE",
              "url": "http://www.novell.com/linux/security/advisories/2001_026_fetchmail_txt.html"
            },
            {
              "name": "RHSA-2001:103",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2001-103.html"
            },
            {
              "name": "FreeBSD-SA-01:43",
              "refsource": "FREEBSD",
              "url": "ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:43.fetchmail.asc"
            },
            {
              "name": "2877",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/2877"
            },
            {
              "name": "IMNX-2001-70-025-01",
              "refsource": "IMMUNIX",
              "url": "http://download.immunix.org/ImmunixOS/7.0/updates/IMNX-2001-70-025-01"
            },
            {
              "name": "ESA-20010620-01",
              "refsource": "ENGARDE",
              "url": "http://www.linuxsecurity.com/advisories/other_advisory-1451.html"
            },
            {
              "name": "CSSA-2001-022.1",
              "refsource": "CALDERA",
              "url": "http://www.caldera.com/support/security/advisories/CSSA-2001-022.1.txt"
            },
            {
              "name": "DSA-060",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2001/dsa-060"
            },
            {
              "name": "MDKSA-2001:063",
              "refsource": "MANDRAKE",
              "url": "http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-063.php3?dis=7.1"
            },
            {
              "name": "fetchmail-long-header-bo(6704)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6704"
            },
            {
              "name": "CLA-2001:403",
              "refsource": "CONECTIVA",
              "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000403"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2001-0819",
    "datePublished": "2002-03-09T05:00:00.000Z",
    "dateReserved": "2001-11-22T00:00:00.000Z",
    "dateUpdated": "2024-08-08T04:37:06.917Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2001-1009 (GCVE-0-2001-1009)

Vulnerability from cvelistv5 – Published: 2002-02-02 05:00 – Updated: 2024-08-08 04:37
VLAI?
Summary
Fetchmail (aka fetchmail-ssl) before 5.8.17 allows a remote malicious (1) IMAP server or (2) POP/POP3 server to overwrite arbitrary memory and possibly gain privileges via a negative index number as part of a response to a LIST request.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.novell.com/linux/security/advisories/2… vendor-advisoryx_refsource_SUSE
http://www.debian.org/security/2001/dsa-071 vendor-advisoryx_refsource_DEBIAN
http://www.redhat.com/support/errata/RHSA-2001-103.html vendor-advisoryx_refsource_REDHAT
http://www.securityfocus.com/bid/3166 vdb-entryx_refsource_BID
http://archives.neohapsis.com/archives/bugtraq/20… mailing-listx_refsource_BUGTRAQ
http://distro.conectiva.com.br/atualizacoes/?id=a… vendor-advisoryx_refsource_CONECTIVA
http://www.linux-mandrake.com/en/security/2001/MD… vendor-advisoryx_refsource_MANDRAKE
http://www.linuxsecurity.com/advisories/other_adv… vendor-advisoryx_refsource_ENGARDE
http://www.securityfocus.com/bid/3164 vdb-entryx_refsource_BID
http://www.iss.net/security_center/static/6965.php vdb-entryx_refsource_XF
Date Public ?
2001-08-09 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T04:37:07.103Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "SuSE-SA:2001:026",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://www.novell.com/linux/security/advisories/2001_026_fetchmail_txt.html"
          },
          {
            "name": "DSA-071",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2001/dsa-071"
          },
          {
            "name": "RHSA-2001:103",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2001-103.html"
          },
          {
            "name": "3166",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/3166"
          },
          {
            "name": "20010809 Fetchmail security advisory",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/bugtraq/2001-08/0118.html"
          },
          {
            "name": "CLA-2001:419",
            "tags": [
              "vendor-advisory",
              "x_refsource_CONECTIVA",
              "x_transferred"
            ],
            "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000419"
          },
          {
            "name": "MDKSA-2001:072",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRAKE",
              "x_transferred"
            ],
            "url": "http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-072.php3"
          },
          {
            "name": "ESA-20010816-01",
            "tags": [
              "vendor-advisory",
              "x_refsource_ENGARDE",
              "x_transferred"
            ],
            "url": "http://www.linuxsecurity.com/advisories/other_advisory-1555.html"
          },
          {
            "name": "3164",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/3164"
          },
          {
            "name": "fetchmail-signed-integer-index(6965)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "http://www.iss.net/security_center/static/6965.php"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2001-08-09T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Fetchmail (aka fetchmail-ssl) before 5.8.17 allows a remote malicious (1) IMAP server or (2) POP/POP3 server to overwrite arbitrary memory and possibly gain privileges via a negative index number as part of a response to a LIST request."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2002-08-17T00:00:00.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "SuSE-SA:2001:026",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://www.novell.com/linux/security/advisories/2001_026_fetchmail_txt.html"
        },
        {
          "name": "DSA-071",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2001/dsa-071"
        },
        {
          "name": "RHSA-2001:103",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2001-103.html"
        },
        {
          "name": "3166",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/3166"
        },
        {
          "name": "20010809 Fetchmail security advisory",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://archives.neohapsis.com/archives/bugtraq/2001-08/0118.html"
        },
        {
          "name": "CLA-2001:419",
          "tags": [
            "vendor-advisory",
            "x_refsource_CONECTIVA"
          ],
          "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000419"
        },
        {
          "name": "MDKSA-2001:072",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRAKE"
          ],
          "url": "http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-072.php3"
        },
        {
          "name": "ESA-20010816-01",
          "tags": [
            "vendor-advisory",
            "x_refsource_ENGARDE"
          ],
          "url": "http://www.linuxsecurity.com/advisories/other_advisory-1555.html"
        },
        {
          "name": "3164",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/3164"
        },
        {
          "name": "fetchmail-signed-integer-index(6965)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "http://www.iss.net/security_center/static/6965.php"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2001-1009",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Fetchmail (aka fetchmail-ssl) before 5.8.17 allows a remote malicious (1) IMAP server or (2) POP/POP3 server to overwrite arbitrary memory and possibly gain privileges via a negative index number as part of a response to a LIST request."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "SuSE-SA:2001:026",
              "refsource": "SUSE",
              "url": "http://www.novell.com/linux/security/advisories/2001_026_fetchmail_txt.html"
            },
            {
              "name": "DSA-071",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2001/dsa-071"
            },
            {
              "name": "RHSA-2001:103",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2001-103.html"
            },
            {
              "name": "3166",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/3166"
            },
            {
              "name": "20010809 Fetchmail security advisory",
              "refsource": "BUGTRAQ",
              "url": "http://archives.neohapsis.com/archives/bugtraq/2001-08/0118.html"
            },
            {
              "name": "CLA-2001:419",
              "refsource": "CONECTIVA",
              "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000419"
            },
            {
              "name": "MDKSA-2001:072",
              "refsource": "MANDRAKE",
              "url": "http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-072.php3"
            },
            {
              "name": "ESA-20010816-01",
              "refsource": "ENGARDE",
              "url": "http://www.linuxsecurity.com/advisories/other_advisory-1555.html"
            },
            {
              "name": "3164",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/3164"
            },
            {
              "name": "fetchmail-signed-integer-index(6965)",
              "refsource": "XF",
              "url": "http://www.iss.net/security_center/static/6965.php"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2001-1009",
    "datePublished": "2002-02-02T05:00:00.000Z",
    "dateReserved": "2002-01-31T00:00:00.000Z",
    "dateUpdated": "2024-08-08T04:37:07.103Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2001-0101 (GCVE-0-2001-0101)

Vulnerability from cvelistv5 – Published: 2001-02-02 05:00 – Updated: 2024-08-08 04:06
VLAI?
Summary
Vulnerability in fetchmail 5.5.0-2 and earlier in the AUTHENTICATE GSSAPI command.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Date Public ?
2000-12-27 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T04:06:55.260Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "TLSA2000024-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_TURBO",
              "x_transferred"
            ],
            "url": "http://www.turbolinux.com/pipermail/tl-security-announce/2000-December/000027.html"
          },
          {
            "name": "RHBA-2000:106-04",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHBA-2000-106.html"
          },
          {
            "name": "fetchmail-authenticate-gssapi(7455)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7455"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2000-12-27T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Vulnerability in fetchmail 5.5.0-2 and earlier in the AUTHENTICATE GSSAPI command."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-12-18T21:57:01.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "TLSA2000024-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_TURBO"
          ],
          "url": "http://www.turbolinux.com/pipermail/tl-security-announce/2000-December/000027.html"
        },
        {
          "name": "RHBA-2000:106-04",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHBA-2000-106.html"
        },
        {
          "name": "fetchmail-authenticate-gssapi(7455)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7455"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2001-0101",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Vulnerability in fetchmail 5.5.0-2 and earlier in the AUTHENTICATE GSSAPI command."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "TLSA2000024-1",
              "refsource": "TURBO",
              "url": "http://www.turbolinux.com/pipermail/tl-security-announce/2000-December/000027.html"
            },
            {
              "name": "RHBA-2000:106-04",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHBA-2000-106.html"
            },
            {
              "name": "fetchmail-authenticate-gssapi(7455)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7455"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2001-0101",
    "datePublished": "2001-02-02T05:00:00.000Z",
    "dateReserved": "2001-02-01T00:00:00.000Z",
    "dateUpdated": "2024-08-08T04:06:55.260Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}