Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.69753
Kategorie:FreeBSD Local Security Checks
Titel:FreeBSD Ports: fetchmail
Zusammenfassung:The remote host is missing an update to the system; as announced in the referenced advisory.
Beschreibung:Summary:
The remote host is missing an update to the system
as announced in the referenced advisory.

Vulnerability Insight:
The following package is affected: fetchmail

CVE-2011-1947
fetchmail 5.9.9 through 6.3.19 does not properly limit the wait time
after issuing a (1) STARTTLS or (2) STLS request, which allows remote
servers to cause a denial of service (application hang) by
acknowledging the request but not sending additional packets.

Solution:
Update your system with the appropriate patches or
software upgrades.

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2011-1947
BugTraq ID: 48043
http://www.securityfocus.com/bid/48043
Bugtraq: 20110606 fetchmail security announcement fetchmail-SA-2011-01 (CVE-2011-1947) (Google Search)
http://www.securityfocus.com/archive/1/518251/100/0/threaded
http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061672.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061735.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061634.html
http://www.mandriva.com/security/advisories?name=MDVSA-2011:107
http://openwall.com/lists/oss-security/2011/05/30/1
http://openwall.com/lists/oss-security/2011/05/31/12
http://openwall.com/lists/oss-security/2011/05/31/17
http://openwall.com/lists/oss-security/2011/06/01/2
http://www.securitytracker.com/id?1025605
XForce ISS Database: fetchmail-starttls-dos(67700)
https://exchange.xforce.ibmcloud.com/vulnerabilities/67700
CopyrightCopyright (C) 2011 E-Soft Inc.

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.