CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
EPSS
Percentile
92.5%
CentOS Errata and Security Advisory CESA-2005:640-01
Fetchmail is a remote mail retrieval and forwarding utility.
A buffer overflow was discovered in fetchmail’s POP3 client. A malicious
server could cause send a carefully crafted message UID and cause fetchmail
to crash or potentially execute arbitrary code as the user running
fetchmail. The Common Vulnerabilities and Exposures project assigned the
name CAN-2005-2335 to this issue.
Users of fetchmail should update to this erratum package which contains a
backported patch to correct this issue.
Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2005-July/074143.html
https://lists.centos.org/pipermail/centos-announce/2005-July/074144.html
Affected packages:
fetchmail
fetchmailconf
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
CentOS | 2 | i386 | fetchmail | < 5.9.0-21.7.3.el2.1.1 | fetchmail-5.9.0-21.7.3.el2.1.1.i386.rpm |
CentOS | 2 | i386 | fetchmailconf | < 5.9.0-21.7.3.el2.1.1 | fetchmailconf-5.9.0-21.7.3.el2.1.1.i386.rpm |
CentOS | 2 | i386 | fetchmail | < 5.9.0-21.7.3.el2.1.1 | fetchmail-5.9.0-21.7.3.el2.1.1.i386.rpm |
CentOS | 2 | i386 | fetchmailconf | < 5.9.0-21.7.3.el2.1.1 | fetchmailconf-5.9.0-21.7.3.el2.1.1.i386.rpm |