Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.66834
Category:Mandrake Local Security Checks
Title:Mandriva Security Advisory MDVSA-2010:037 (fetchmail)
Summary:NOSUMMARY
Description:Description:
The remote host is missing an update to fetchmail
announced via advisory MDVSA-2010:037.

A vulnerability have been discovered and corrected in fetchmail:

The sdump function in sdump.c in fetchmail 6.3.11, 6.3.12, and 6.3.13,
when running in verbose mode on platforms for which char is signed,
allows remote attackers to cause a denial of service (application
crash) or possibly execute arbitrary code via an SSL X.509 certificate
containing non-printable characters with the high bit set, which
triggers a heap-based buffer overflow during escaping (CVE-2010-0562).

This update provides fetchmail 6.3.14, which is not vulnerable to
this issue.

Affected: 2010.0

Solution:
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

http://www.securityspace.com/smysecure/catid.html?in=MDVSA-2010:037
http://www.fetchmail.info/fetchmail-SA-2010-01.txt

Risk factor : High

CVSS Score:
6.8

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2010-0562
BugTraq ID: 38088
http://www.securityfocus.com/bid/38088
http://www.mandriva.com/security/advisories?name=MDVSA-2010:037
http://osvdb.org/62114
http://www.securitytracker.com/id?1023543
http://secunia.com/advisories/38391
http://www.vupen.com/english/advisories/2010/0296
CopyrightCopyright (c) 2010 E-Soft Inc. http://www.securityspace.com

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.