Executive Summary

Informations
Name MDVSA-2011:107 First vendor Publication 2011-06-07
Vendor Mandriva Last vendor Modification 2011-06-07
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:P)
Cvss Base Score 5 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Multiple vulnerabilities were discovered and corrected in fetchmail:

fetchmail 4.6.3 through 6.3.16, when debug mode is enabled, does not properly handle invalid characters in a multi-character locale, which allows remote attackers to cause a denial of service (memory consumption and application crash) via a crafted (1) message header or (2) POP3 UIDL list (CVE-2010-1167). NOTE: This vulnerability did not affect Mandriva Linux 2010.2.

fetchmail 5.9.9 through 6.3.19 does not properly limit the wait time after issuing a (1) STARTTLS or (2) STLS request, which allows remote servers to cause a denial of service (application hang) by acknowledging the request but not sending additional packets (CVE-2011-1947).

Packages for 2009.0 are provided as of the Extended Maintenance Program. Please visit this link to learn more: http://store.mandriva.com/product_info.php?cPath=149&products_id=490

The updated packages have been upgraded to the 6.3.20 version which is not vulnerable to these issues.

Original Source

Url : http://www.mandriva.com/security/advisories?name=MDVSA-2011:107

CWE : Common Weakness Enumeration

% Id Name
50 % CWE-399 Resource Management Errors
50 % CWE-20 Improper Input Validation

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 128

OpenVAS Exploits

Date Description
2012-09-10 Name : Slackware Advisory SSA:2011-171-01 fetchmail
File : nvt/esoft_slk_ssa_2011_171_01.nasl
2011-08-03 Name : FreeBSD Ports: fetchmail
File : nvt/freebsd_fetchmail15.nasl
2011-07-12 Name : Fedora Update for fetchmail FEDORA-2011-8011
File : nvt/gb_fedora_2011_8011_fetchmail_fc15.nasl
2011-06-24 Name : Fedora Update for fetchmail FEDORA-2011-8021
File : nvt/gb_fedora_2011_8021_fetchmail_fc14.nasl
2011-06-24 Name : Fedora Update for fetchmail FEDORA-2011-8059
File : nvt/gb_fedora_2011_8059_fetchmail_fc13.nasl
2011-06-10 Name : Mandriva Update for fetchmail MDVSA-2011:107 (fetchmail)
File : nvt/gb_mandriva_MDVSA_2011_107.nasl
2010-05-04 Name : FreeBSD Ports: fetchmail
File : nvt/freebsd_fetchmail14.nasl
0000-00-00 Name : Slackware Advisory SSA:2010-136-01 fetchmail
File : nvt/esoft_slk_ssa_2010_136_01.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
74824 fetchmail STARTTLS / STLS Request Acknowledgement Wait Time Limit Remote DoS

64795 fetchmail Multi-character Locale Invalid Character Remote DoS

Nessus® Vulnerability Scanner

Date Description
2011-06-22 Name : The remote Fedora host is missing a security update.
File : fedora_2011-8011.nasl - Type : ACT_GATHER_INFO
2011-06-22 Name : The remote Fedora host is missing a security update.
File : fedora_2011-8021.nasl - Type : ACT_GATHER_INFO
2011-06-22 Name : The remote Fedora host is missing a security update.
File : fedora_2011-8059.nasl - Type : ACT_GATHER_INFO
2011-06-21 Name : The remote Slackware host is missing a security update.
File : Slackware_SSA_2011-171-01.nasl - Type : ACT_GATHER_INFO
2011-06-08 Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2011-107.nasl - Type : ACT_GATHER_INFO
2011-06-07 Name : The remote FreeBSD host is missing a security-related update.
File : freebsd_pkg_f7d838f2903911e0a051080027ef73ec.nasl - Type : ACT_GATHER_INFO
2010-05-17 Name : The remote Slackware host is missing a security update.
File : Slackware_SSA_2010-136-01.nasl - Type : ACT_GATHER_INFO
2010-04-21 Name : The remote FreeBSD host is missing a security-related update.
File : freebsd_pkg_09910d764c8211df83fb0015587e2cc1.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2014-02-17 11:42:19
  • Multiple Updates