CERTA-2005-AVI-278
Vulnerability from certfr_avis - Published: 2005-07-22 - Updated: 2005-08-17None
Description
cette vulnérabilité et injecter du code arbitraire à distance permettant, entre autres, d'obtenir les droits administrateurs sur la machine vulnérable.
L'exploitation de cette faille à destination d'une machine disposant de Fetchmail 6.2.5.1 ne provoque qu'un déni de service.
Solution
Passer en version 6.2.5.2 et appliquer le patch fetchmail-patch-6.2.5.2 :
http://developer.berlios.de/project/showfiles.php?group_id=1824
Fetchmail version 6.2.5.1 et versions antérieures.
Impacted products
| Vendor | Product | Description |
|---|
References
| Title | Publication Time | Tags | |
|---|---|---|---|
|
|
|||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cp\u003eFetchmail version 6.2.5.1 et versions ant\u00e9rieures.\u003c/p\u003e",
"content": "## Description\n\ncette vuln\u00e9rabilit\u00e9 et injecter du code arbitraire \u00e0 distance\npermettant, entre autres, d\u0027obtenir les droits administrateurs sur la\nmachine vuln\u00e9rable. \n\nL\u0027exploitation de cette faille \u00e0 destination d\u0027une machine disposant de\nFetchmail 6.2.5.1 ne provoque qu\u0027un d\u00e9ni de service.\n\n## Solution\n\nPasser en version 6.2.5.2 et appliquer le patch fetchmail-patch-6.2.5.2\n:\n\n http://developer.berlios.de/project/showfiles.php?group_id=1824\n",
"cves": [],
"initial_release_date": "2005-07-22T00:00:00",
"last_revision_date": "2005-08-17T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SR:2005:018 du 28 juillet 2005 :",
"url": "http://www.novell.com/linux/security/advisories/2005_18_sr.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Debian DSA-774 du 12 ao\u00fbt 2005 :",
"url": "http://www.debian.org/security/2005/dsa-774"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Mandriva MDKSA-2005:126 du 28 juillet 2005 :",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:126"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de FreeBSD :",
"url": "http://www.vuxml.org/freebsd/pkg-fetchmail.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2005:640 du 25 juillet 2005 :",
"url": "http://rhn.redhat.com/errata/RHSA-2005-640.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Gentoo GLSA 200507-21 du 25 juillet 2005 :",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200507-21.xml"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 OpenBSD pour fetchmail du 25 juillet 2005 :",
"url": "http://www.vuxml.org/openbsd/pkg-fetchmail.html"
}
],
"reference": "CERTA-2005-AVI-278",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2005-07-22T00:00:00.000000"
},
{
"description": "ajout de la r\u00e9f\u00e9rence au bulletin de s\u00e9curit\u00e9 OpenBSD.",
"revision_date": "2005-07-25T00:00:00.000000"
},
{
"description": "ajout de la r\u00e9f\u00e9rence au bulletin de s\u00e9curit\u00e9 Gentoo GLSA 200507-21.",
"revision_date": "2005-07-26T00:00:00.000000"
},
{
"description": "ajout des r\u00e9f\u00e9rences aux bulletins de s\u00e9curit\u00e9 Mandriva MDKSA-2005:126 et SUSE SUSE-SR:2005:018.",
"revision_date": "2005-07-29T00:00:00.000000"
},
{
"description": "ajout de la r\u00e9f\u00e9rence au bulletin de s\u00e9curit\u00e9 Debian DSA-774.",
"revision_date": "2005-08-17T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance via un serveur pop3 malicieux"
},
{
"description": "D\u00e9ni de service"
}
],
"summary": null,
"title": "Vuln\u00e9rabilit\u00e9 dans Fetchmail",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Berlios",
"url": "http://fetchmail.berlios.de/fetchmail-SA-2005-01.txt"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…