![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.51211 |
Categoría: | Red Hat Local Security Checks |
Título: | RedHat Security Advisory RHSA-2002:294 |
Resumen: | NOSUMMARY |
Descripción: | Description: The remote host is missing updates announced in advisory RHSA-2002:294. Updated Fetchmail packages are available for Red Hat Linux Advanced Server which close a remotely-exploitable vulnerability in unpatched versions of Fetchmail prior to 6.2.0. [Updated 06 Feb 2003] Added fixed packages for Advanced Workstation Fetchmail is a remote mail retrieval and forwarding utility intended for use over on-demand TCP/IP links such as SLIP and PPP connections. A bug has been found in the header parsing code in versions of Fetchmail prior to 6.2.0. The bug allows a remote attacker to crash Fetchmail and potentially execute arbitrary code by sending a carefully crafted email which is parsed by Fetchmail. All users of Fetchmail are advised to upgrade to the errata packages containing a backported fix which corrects this issue. Solution: Please note that this update is available via Red Hat Network. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date http://rhn.redhat.com/errata/RHSA-2002-294.html http://tuxedo.org/~ esr/fetchmail/NEWS http://security.e-matters.de/advisories/052002.html Risk factor : High CVSS Score: 7.5 |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2002-1365 BugTraq ID: 6390 http://www.securityfocus.com/bid/6390 Bugtraq: 20021213 Advisory 05/2002: Another Fetchmail Remote Vulnerability (Google Search) http://marc.info/?l=bugtraq&m=103979751818638&w=2 Bugtraq: 20021215 GLSA: fetchmail (Google Search) http://marc.info/?l=bugtraq&m=104004858802000&w=2 Caldera Security Advisory: CSSA-2003-001.0 ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2003-001.0.txt Conectiva Linux advisory: CLA-2002:554 http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000554 Debian Security Information: DSA-216 (Google Search) http://www.debian.org/security/2002/dsa-216 En Garde Linux Advisory: ESA-20030127-002 Immunix Linux Advisory: IMNX-2003-7+-023-01 http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:011 http://security.e-matters.de/advisories/052002.html http://www.redhat.com/support/errata/RHSA-2002-293.html http://www.redhat.com/support/errata/RHSA-2002-294.html http://www.redhat.com/support/errata/RHSA-2003-155.html SuSE Security Announcement: SuSE-SA:2003:001 (Google Search) XForce ISS Database: fetchmail-address-header-bo(10839) https://exchange.xforce.ibmcloud.com/vulnerabilities/10839 |
Copyright | Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com |
Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |