Joined: 12 May 2004
|Posted: Mon Jul 25, 2005 9:03 pm Post subject: [ GLSA 200507-21 ] fetchmail: Buffer Overflow
|Gentoo Linux Security Advisory
Title: fetchmail: Buffer Overflow (GLSA 200507-21)
Date: July 25, 2005
fetchmail is susceptible to a buffer overflow resulting in a Denial of Service or arbitrary code execution.
fetchmail is a utility that retrieves and forwards mail from remote systems using IMAP, POP, and other protocols.
Vulnerable: < 184.108.40.206
Unaffected: >= 220.127.116.11
Architectures: All supported architectures
fetchmail does not properly validate UIDs coming from a POP3 mail server. The UID is placed in a fixed length buffer on the stack, which can be overflown.
Very long UIDs returned from a malicious or compromised POP3 server can cause fetchmail to crash, resulting in a Denial of Service, or allow arbitrary code to be placed on the stack.
There are no known workarounds at this time.
All fetchmail users should upgrade to the latest version:
|# emerge --sync
# emerge --ask --oneshot --verbose ">=net-mail/fetchmail-18.104.22.168"
Fetchmail Security Advisory
Last edited by GLSA on Sun May 07, 2006 4:58 pm; edited 1 time in total