Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.56144
Category:Debian Local Security Checks
Title:Debian: Security Advisory (DSA-939-1)
Summary:The remote host is missing an update for the Debian 'fetchmail' package(s) announced via the DSA-939-1 advisory.
Description:Summary:
The remote host is missing an update for the Debian 'fetchmail' package(s) announced via the DSA-939-1 advisory.

Vulnerability Insight:
Daniel Drake discovered a problem in fetchmail, an SSL enabled POP3, APOP, IMAP mail gatherer/forwarder, that can cause a crash when the program is running in multidrop mode and receives messages without headers.

The old stable distribution (woody) does not seem to be affected by this problem.

For the stable distribution (sarge) this problem has been fixed in version 6.2.5-12sarge4.

For the unstable distribution (sid) this problem has been fixed in version 6.3.1-1.

We recommend that you upgrade your fetchmail package.

Affected Software/OS:
'fetchmail' package(s) on Debian 3.1.

Solution:
Please install the updated package(s).

CVSS Score:
7.8

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2005-4348
BugTraq ID: 15987
http://www.securityfocus.com/bid/15987
BugTraq ID: 19289
http://www.securityfocus.com/bid/19289
Bugtraq: 20051221 fetchmail security announcement fetchmail-SA-2005-03 (CVE-2005-4348) (Google Search)
http://www.securityfocus.com/archive/1/420098/100/0/threaded
Bugtraq: 20060526 rPSA-2006-0084-1 fetchmail (Google Search)
http://www.securityfocus.com/archive/1/435197/100/0/threaded
Debian Security Information: DSA-939 (Google Search)
http://www.debian.org/security/2005/dsa-939
http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:236
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=343836
http://www.osvdb.org/21906
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9659
http://www.redhat.com/support/errata/RHSA-2007-0018.html
http://securitytracker.com/id?1015383
http://secunia.com/advisories/17891
http://secunia.com/advisories/18172
http://secunia.com/advisories/18231
http://secunia.com/advisories/18266
http://secunia.com/advisories/18433
http://secunia.com/advisories/18463
http://secunia.com/advisories/18895
http://secunia.com/advisories/21253
http://secunia.com/advisories/24007
http://secunia.com/advisories/24284
SGI Security Advisory: 20070201-01-P
ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.443499
SuSE Security Announcement: SUSE-SR:2007:004 (Google Search)
http://www.novell.com/linux/security/advisories/2007_4_sr.html
http://www.trustix.org/errata/2006/0002/
https://usn.ubuntu.com/233-1/
http://www.vupen.com/english/advisories/2005/2996
http://www.vupen.com/english/advisories/2006/3101
XForce ISS Database: fetchmail-null-pointer-dos(23713)
https://exchange.xforce.ibmcloud.com/vulnerabilities/23713
CopyrightCopyright (C) 2008 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.