Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.56200
Kategorie:FreeBSD Local Security Checks
Titel:FreeBSD Ports: fetchmail
Zusammenfassung:The remote host is missing an update to the system; as announced in the referenced advisory.
Beschreibung:Summary:
The remote host is missing an update to the system
as announced in the referenced advisory.

Vulnerability Insight:
The following package is affected: fetchmail

CVE-2006-0321
fetchmail 6.3.0 and other versions before 6.3.2 allows remote
attackers to cause a denial of service (crash) via crafted e-mail
messages that cause a free of an invalid pointer when fetchmail
bounces the message to the originator or local postmaster.

Solution:
Update your system with the appropriate patches or
software upgrades.

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2006-0321
http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html
BugTraq ID: 16365
http://www.securityfocus.com/bid/16365
BugTraq ID: 19289
http://www.securityfocus.com/bid/19289
Bugtraq: 20060122 fetchmail security announcement fetchmail-SA-2006-01 (CVE-2006-0321) (Google Search)
http://www.securityfocus.com/archive/1/422936/100/0/threaded
Cert/CC Advisory: TA06-214A
http://www.us-cert.gov/cas/techalerts/TA06-214A.html
http://www.osvdb.org/22691
http://securitytracker.com/id?1015527
http://secunia.com/advisories/18571
http://secunia.com/advisories/18895
http://secunia.com/advisories/21253
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.443499
http://www.vupen.com/english/advisories/2006/0300
http://www.vupen.com/english/advisories/2006/3101
XForce ISS Database: fetchmail-message-bounce-dos(24265)
https://exchange.xforce.ibmcloud.com/vulnerabilities/24265
CopyrightCopyright (C) 2008 E-Soft Inc.

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.