CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
AI Score
Confidence
Low
EPSS
Percentile
97.0%
Heap-based buffer overflow in Fetchmail 6.1.3 and earlier does not account for the “@” character when determining buffer lengths for local addresses, which allows remote attackers to execute arbitrary code via a header with a large number of local addresses.
Vendor | Product | Version | CPE |
---|---|---|---|
fetchmail | fetchmail | * | cpe:2.3:a:fetchmail:fetchmail:*:*:*:*:*:*:*:* |
fetchmail | fetchmail | 4.5.1 | cpe:2.3:a:fetchmail:fetchmail:4.5.1:*:*:*:*:*:*:* |
fetchmail | fetchmail | 4.5.2 | cpe:2.3:a:fetchmail:fetchmail:4.5.2:*:*:*:*:*:*:* |
fetchmail | fetchmail | 4.5.3 | cpe:2.3:a:fetchmail:fetchmail:4.5.3:*:*:*:*:*:*:* |
fetchmail | fetchmail | 4.5.4 | cpe:2.3:a:fetchmail:fetchmail:4.5.4:*:*:*:*:*:*:* |
fetchmail | fetchmail | 4.5.5 | cpe:2.3:a:fetchmail:fetchmail:4.5.5:*:*:*:*:*:*:* |
fetchmail | fetchmail | 4.5.6 | cpe:2.3:a:fetchmail:fetchmail:4.5.6:*:*:*:*:*:*:* |
fetchmail | fetchmail | 4.5.7 | cpe:2.3:a:fetchmail:fetchmail:4.5.7:*:*:*:*:*:*:* |
fetchmail | fetchmail | 4.5.8 | cpe:2.3:a:fetchmail:fetchmail:4.5.8:*:*:*:*:*:*:* |
fetchmail | fetchmail | 4.6.0 | cpe:2.3:a:fetchmail:fetchmail:4.6.0:*:*:*:*:*:*:* |
ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2003-001.0.txt
distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000554
marc.info/?l=bugtraq&m=103979751818638&w=2
marc.info/?l=bugtraq&m=104004858802000&w=2
security.e-matters.de/advisories/052002.html
www.debian.org/security/2002/dsa-216
www.mandrakesoft.com/security/advisories?name=MDKSA-2003:011
www.redhat.com/support/errata/RHSA-2002-293.html
www.redhat.com/support/errata/RHSA-2002-294.html
www.redhat.com/support/errata/RHSA-2003-155.html
www.securityfocus.com/bid/6390
exchange.xforce.ibmcloud.com/vulnerabilities/10839