Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.54396
Category:Fedora Local Security Checks
Title:Fedora Core 3 FEDORA-2005-614 (fetchmail)
Summary:NOSUMMARY
Description:Description:

The remote host is missing an update to fetchmail
announced via advisory FEDORA-2005-614.

Fetchmail is a remote mail retrieval and forwarding utility intended
for use over on-demand TCP/IP links, like SLIP or PPP connections.
Fetchmail supports every remote-mail protocol currently in use on the
Internet (POP2, POP3, RPOP, APOP, KPOP, all IMAPs, ESMTP ETRN, IPv6,
and IPSEC) for retrieval. Then Fetchmail forwards the mail through
SMTP so you can read it through your favorite mail client.

A buffer overflow was discovered in fetchmail's POP3 client. A malicious
server could cause fetchmail to execute arbitrary code.

The Common Vulnerabilities and Exposures project has assigned the name
CVE-2005-2335 to this issue.

All fetchmail users should upgrade to the updated package, which fixes this issue.
* Thu Jul 21 2005 Miloslav Trmac - 6.2.5-7.fc4.1
- Fix CVE-2005-2335 (#163819, patch by Ludwig Nussel)

* Wed Mar 16 2005 Nalin Dahyabhai 6.2.5-7
- stop using one of the libkrb5 private functions

Solution: Apply the appropriate updates.

This update can be downloaded from:
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/

This update can also be installed with the Update Agent
you can
launch the Update Agent with the 'up2date' command.

http://www.securityspace.com/smysecure/catid.html?in=FEDORA-2005-614

Risk factor : Medium

CVSS Score:
5.0

Cross-Ref: BugTraq ID: 14349
Common Vulnerability Exposure (CVE) ID: CVE-2005-2335
http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html
http://www.securityfocus.com/bid/14349
BugTraq ID: 19289
http://www.securityfocus.com/bid/19289
Bugtraq: 20060526 rPSA-2006-0084-1 fetchmail (Google Search)
http://www.securityfocus.com/archive/1/435197/100/0/threaded
Bugtraq: 20060801 DMA[2006-0801a] - 'Apple OSX fetchmail buffer overflow' (Google Search)
http://www.securityfocus.com/archive/1/441856/100/200/threaded
Cert/CC Advisory: TA06-214A
http://www.us-cert.gov/cas/techalerts/TA06-214A.html
Debian Security Information: DSA-774 (Google Search)
http://www.debian.org/security/2005/dsa-774
http://www.redhat.com/archives/fedora-announce-list/2005-July/msg00088.html
http://www.redhat.com/archives/fedora-announce-list/2005-July/msg00089.html
http://www.redhat.com/archives/fedora-announce-list/2005-July/msg00104.html
http://www.osvdb.org/18174
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1038
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1124
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8833
http://www.redhat.com/support/errata/RHSA-2005-640.html
http://secunia.com/advisories/16176
http://secunia.com/advisories/21253
SuSE Security Announcement: SUSE-SR:2005:018 (Google Search)
http://www.novell.com/linux/security/advisories/2005_18_sr.html
http://www.vupen.com/english/advisories/2005/1171
http://www.vupen.com/english/advisories/2006/3101
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.