![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.59704 |
Category: | Fedora Local Security Checks |
Title: | Fedora Core 7 FEDORA-2007-1983 (fetchmail) |
Summary: | NOSUMMARY |
Description: | Description: The remote host is missing an update to fetchmail announced via advisory FEDORA-2007-1983. Fetchmail is a remote mail retrieval and forwarding utility intended for use over on-demand TCP/IP links, like SLIP or PPP connections. Fetchmail supports every remote-mail protocol currently in use on the Internet (POP2, POP3, RPOP, APOP, KPOP, all IMAPs, ESMTP ETRN, IPv6, and IPSEC) for retrieval. Then Fetchmail forwards the mail through SMTP so you can read it through your favorite mail client. Install fetchmail if you need to retrieve mail over SLIP or PPP connections. ChangeLog: * Mon Sep 3 2007 Vitezslav Crhonek - 6.3.7-2 - Fix license - Fix fetchmail NULL pointer dereference (CVE-2007-4565) Resolves: #260861 References: [ 1 ] Bug #260861 https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=260861 [ 2 ] CVE-2007-4565 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4565 Updated packages: 9c13de5c295c8332646586f33d6f4f42a5be58b9 fetchmail-debuginfo-6.3.7-2.fc7.ppc64.rpm 4c72297f3d658e4c863471628e67f196b3b24c47 fetchmail-6.3.7-2.fc7.ppc64.rpm 22cbcfc665490a6a0cf59fcdd5cb119ff0f0fead fetchmail-debuginfo-6.3.7-2.fc7.i386.rpm a2bad7e2afc8e394a9f24869a68f5b5aa4132f99 fetchmail-6.3.7-2.fc7.i386.rpm 1509a06d524e72ea7e73a4d2981cbc5c94e01c3f fetchmail-debuginfo-6.3.7-2.fc7.x86_64.rpm d82a151341886040feb8ab64a9d7ff4413985924 fetchmail-6.3.7-2.fc7.x86_64.rpm 1cffd7b2aa63d940cbfe6f16fda6c3f08d3ca6d6 fetchmail-6.3.7-2.fc7.ppc.rpm a6b8315da35610c94ec9f860b5fb6d124197ae90 fetchmail-debuginfo-6.3.7-2.fc7.ppc.rpm 67b78d7b97c9213792c20eacc309d0cefa664f72 fetchmail-6.3.7-2.fc7.src.rpm This update can be installed with the 'yum' update program. Use 'yum update package-name' at the command line. For more information, refer to 'Managing Software with yum,' available at http://docs.fedoraproject.org/yum/. Solution: Apply the appropriate updates. http://www.securityspace.com/smysecure/catid.html?in=FEDORA-2007-1983 Risk factor : Medium CVSS Score: 5.0 |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2007-4565 http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html BugTraq ID: 25495 http://www.securityfocus.com/bid/25495 Bugtraq: 20070907 FLEA-2007-0053-1 fetchmail (Google Search) http://www.securityfocus.com/archive/1/478798/100/0/threaded Bugtraq: 20080617 fetchmail security announcement fetchmail-SA-2007-02 (CVE-2007-4565) (Google Search) http://www.securityfocus.com/archive/1/493388/100/0/threaded Debian Security Information: DSA-1377 (Google Search) http://www.debian.org/security/2007/dsa-1377 http://www.mandriva.com/security/advisories?name=MDKSA-2007:179 http://osvdb.org/45833 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10528 http://www.securitytracker.com/id?1018627 http://secunia.com/advisories/27399 http://secunia.com/advisories/33937 http://securityreason.com/securityalert/3074 SuSE Security Announcement: SUSE-SR:2007:022 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00008.html http://www.trustix.org/errata/2007/0028/ http://www.ubuntu.com/usn/usn-520-1 http://www.vupen.com/english/advisories/2007/3032 http://www.vupen.com/english/advisories/2009/0422 XForce ISS Database: fetchmail-warning-dos(36385) https://exchange.xforce.ibmcloud.com/vulnerabilities/36385 |
Copyright | Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |