CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
AI Score
Confidence
Low
EPSS
Percentile
94.8%
A buffer overflow in Linux fetchmail before 5.8.6 allows remote attackers to execute arbitrary code via a large ‘To:’ field in an email header.
Vendor | Product | Version | CPE |
---|---|---|---|
fetchmail | fetchmail | * | cpe:2.3:a:fetchmail:fetchmail:*:*:*:*:*:*:*:* |
fetchmail | fetchmail | 4.5.1 | cpe:2.3:a:fetchmail:fetchmail:4.5.1:*:*:*:*:*:*:* |
fetchmail | fetchmail | 4.5.2 | cpe:2.3:a:fetchmail:fetchmail:4.5.2:*:*:*:*:*:*:* |
fetchmail | fetchmail | 4.5.3 | cpe:2.3:a:fetchmail:fetchmail:4.5.3:*:*:*:*:*:*:* |
fetchmail | fetchmail | 4.5.4 | cpe:2.3:a:fetchmail:fetchmail:4.5.4:*:*:*:*:*:*:* |
fetchmail | fetchmail | 4.5.5 | cpe:2.3:a:fetchmail:fetchmail:4.5.5:*:*:*:*:*:*:* |
fetchmail | fetchmail | 4.5.6 | cpe:2.3:a:fetchmail:fetchmail:4.5.6:*:*:*:*:*:*:* |
fetchmail | fetchmail | 4.5.7 | cpe:2.3:a:fetchmail:fetchmail:4.5.7:*:*:*:*:*:*:* |
fetchmail | fetchmail | 4.5.8 | cpe:2.3:a:fetchmail:fetchmail:4.5.8:*:*:*:*:*:*:* |
fetchmail | fetchmail | 4.6.0 | cpe:2.3:a:fetchmail:fetchmail:4.6.0:*:*:*:*:*:*:* |
ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:43.fetchmail.asc
distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000403
download.immunix.org/ImmunixOS/7.0/updates/IMNX-2001-70-025-01
www.caldera.com/support/security/advisories/CSSA-2001-022.1.txt
www.debian.org/security/2001/dsa-060
www.linux-mandrake.com/en/security/2001/MDKSA-2001-063.php3?dis=7.1
www.linuxsecurity.com/advisories/other_advisory-1451.html
www.novell.com/linux/security/advisories/2001_026_fetchmail_txt.html
www.redhat.com/support/errata/RHSA-2001-103.html
www.securityfocus.com/bid/2877
exchange.xforce.ibmcloud.com/vulnerabilities/6704