Summary
Detail | |||
---|---|---|---|
Vendor | Fetchmail | First view | 2001-02-12 |
Product | Fetchmail | Last view | 2021-08-30 |
Version | 4.7.2 | Type | Application |
Update | * | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:a:fetchmail:fetchmail |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
5.9 | 2021-08-30 | CVE-2021-39272 | Fetchmail before 6.4.22 fails to enforce STARTTLS session encryption in some circumstances, such as a certain situation with IMAP and PREAUTH. |
7.5 | 2021-07-30 | CVE-2021-36386 | report_vbuild in report.c in Fetchmail before 6.4.20 sometimes omits initialization of the vsnprintf va_list argument, which might allow mail servers to cause a denial of service or possibly have unspecified other impact via long error messages. NOTE: it is unclear whether use of Fetchmail on any realistic platform results in an impact beyond an inconvenience to the client user. |
4.3 | 2010-05-07 | CVE-2010-1167 | fetchmail 4.6.3 through 6.3.16, when debug mode is enabled, does not properly handle invalid characters in a multi-character locale, which allows remote attackers to cause a denial of service (memory consumption and application crash) via a crafted (1) message header or (2) POP3 UIDL list. |
6.4 | 2009-08-07 | CVE-2009-2666 | socket.c in fetchmail before 6.3.11 does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408. |
4.3 | 2008-06-16 | CVE-2008-2711 | fetchmail 6.3.8 and earlier, when running in -v -v (aka verbose) mode, allows remote attackers to cause a denial of service (crash and persistent mail failure) via a malformed mail message with long headers, which triggers an erroneous dereference when using vsnprintf to format log messages. |
5 | 2007-08-27 | CVE-2007-4565 | sink.c in fetchmail before 6.3.9 allows context-dependent attackers to cause a denial of service (NULL dereference and application crash) by refusing certain warning messages that are sent over SMTP. |
7.8 | 2006-12-31 | CVE-2006-5867 | fetchmail before 6.3.6-rc4 does not properly enforce TLS and may transmit cleartext passwords over unsecured links if certain circumstances occur, which allows remote attackers to obtain sensitive information via man-in-the-middle (MITM) attacks. |
7.8 | 2005-12-20 | CVE-2005-4348 | fetchmail before 6.3.1 and before 6.2.5.5, when configured for multidrop mode, allows remote attackers to cause a denial of service (application crash) by sending messages without headers from upstream mail servers. |
5 | 2005-07-27 | CVE-2005-2335 | Buffer overflow in the POP3 client in Fetchmail before 6.2.5.2 allows remote POP3 servers to cause a denial of service and possibly execute arbitrary code via long UIDL responses. NOTE: a typo in an advisory accidentally used the wrong CVE identifier for the Fetchmail issue. This is the correct identifier. |
5 | 2003-11-17 | CVE-2003-0792 | Fetchmail 6.2.4 and earlier does not properly allocate memory for long lines, which allows remote attackers to cause a denial of service (crash) via a certain email. |
7.5 | 2002-12-23 | CVE-2002-1365 | Heap-based buffer overflow in Fetchmail 6.1.3 and earlier does not account for the "@" character when determining buffer lengths for local addresses, which allows remote attackers to execute arbitrary code via a header with a large number of local addresses. |
5 | 2002-10-11 | CVE-2002-1175 | The getmxrecord function in Fetchmail 6.0.0 and earlier does not properly check the boundary of a particular malformed DNS packet from a malicious DNS server, which allows remote attackers to cause a denial of service (crash) when Fetchmail attempts to read data beyond the expected boundary. |
7.5 | 2002-10-11 | CVE-2002-1174 | Buffer overflows in Fetchmail 6.0.0 and earlier allow remote attackers to cause a denial of service (crash) or execute arbitrary code via (1) long headers that are not properly processed by the readheaders function, or (2) via long Received: headers, which are not properly parsed by the parse_received function. |
5 | 2002-06-25 | CVE-2002-0146 | fetchmail email client before 5.9.10 does not properly limit the maximum number of messages available, which allows a remote IMAP server to overwrite memory via a message count that exceeds the boundaries of an array. |
7.5 | 2001-12-06 | CVE-2001-0819 | A buffer overflow in Linux fetchmail before 5.8.6 allows remote attackers to execute arbitrary code via a large 'To:' field in an email header. |
2.1 | 2001-09-06 | CVE-2001-1378 | fetchmailconf in fetchmail before 5.7.4 allows local users to overwrite files of other users via a symlink attack on temporary files. |
10 | 2001-08-31 | CVE-2001-1009 | Fetchmail (aka fetchmail-ssl) before 5.8.17 allows a remote malicious (1) IMAP server or (2) POP/POP3 server to overwrite arbitrary memory and possibly gain privileges via a negative index number as part of a response to a LIST request. |
10 | 2001-02-12 | CVE-2001-0101 | Vulnerability in fetchmail 5.5.0-2 and earlier in the AUTHENTICATE GSSAPI command. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
33% (5) | CWE-20 | Improper Input Validation |
26% (4) | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
13% (2) | CWE-399 | Resource Management Errors |
6% (1) | CWE-319 | Cleartext Transmission of Sensitive Information |
6% (1) | CWE-310 | Cryptographic Issues |
6% (1) | CWE-264 | Permissions, Privileges, and Access Controls |
6% (1) | CWE-59 | Improper Link Resolution Before File Access ('Link Following') |
CAPEC : Common Attack Pattern Enumeration & Classification
id | Name |
---|---|
CAPEC-100 | Overflow Buffers |
CAPEC-119 | Resource Depletion |
CAPEC-123 | Buffer Attacks |
Open Source Vulnerability Database (OSVDB)
id | Description |
---|---|
64795 | fetchmail Multi-character Locale Invalid Character Remote DoS |
56855 | Fetchmail X.509 Certificate Authority (CA) Common Name Null Byte Handling SSL... |
46304 | Fetchmail Large Header Verbose Printing DoS |
45833 | Fetchmail SMTP Warning Message Refusal DoS |
31580 | Fetchmail TLS Enforcement Cleartext Credential Disclosure |
21906 | Fetchmail Multidrop Mode Headerless Message Remote DoS |
18174 | Fetchmail UIDL POP3 Server Response Overflow |
10330 | Fetchmail POP3 Reply Negative Index Privilege Escalation |
10329 | Fetchmail IMAP Server Negative Index Privilege Escalation |
10328 | Fetchmail AUTHENTICATE GSSAPI Command Unspecified Issue |
5537 | Fetchmail Header To: Field Overflow |
5405 | Fetchmail Message Index Arbitrary File Overwrite |
4604 | Fetchmail readheaders Overflow |
4603 | Fetchmail parse_received Command Execution Overflow |
4602 | Fetchmail getmxrecord Overflow DoS |
4595 | Fetchmail IMAP Message Count Overflow |
4594 | Fetchmail @ Character Local Address Saturation Overflow |
2699 | Fetchmail Email Long Line Handling DoS |
OpenVAS Exploits
id | Description |
---|---|
2011-08-09 | Name : CentOS Update for fetchmail CESA-2009:1427 centos5 i386 File : nvt/gb_CESA-2009_1427_fetchmail_centos5_i386.nasl |
2011-08-09 | Name : CentOS Update for fetchmail CESA-2009:1427 centos3 i386 File : nvt/gb_CESA-2009_1427_fetchmail_centos3_i386.nasl |
2011-08-09 | Name : CentOS Update for fetchmail CESA-2009:1427 centos4 i386 File : nvt/gb_CESA-2009_1427_fetchmail_centos4_i386.nasl |
2011-06-10 | Name : Mandriva Update for fetchmail MDVSA-2011:107 (fetchmail) File : nvt/gb_mandriva_MDVSA_2011_107.nasl |
2011-03-09 | Name : Gentoo Security Advisory GLSA 201006-12 (fetchmail) File : nvt/glsa_201006_12.nasl |
2010-05-12 | Name : Mac OS X 10.6.2 Update / Mac OS X Security Update 2009-006 File : nvt/macosx_upd_10_6_2_secupd_2009-006.nasl |
2010-05-12 | Name : Mac OS X Security Update 2009-001 File : nvt/macosx_secupd_2009-001.nasl |
2010-05-04 | Name : FreeBSD Ports: fetchmail File : nvt/freebsd_fetchmail14.nasl |
2009-12-10 | Name : Mandriva Security Advisory MDVSA-2009:201-1 (fetchmail) File : nvt/mdksa_2009_201_1.nasl |
2009-11-17 | Name : Mac OS X Version File : nvt/macosx_version.nasl |
2009-10-13 | Name : SLES10: Security update for fetchmail File : nvt/sles10_fetchmail0.nasl |
2009-10-13 | Name : SLES10: Security update for fetchmail File : nvt/sles10_fetchmail.nasl |
2009-10-11 | Name : SLES11: Security update for fetchmail File : nvt/sles11_fetchmail.nasl |
2009-10-10 | Name : SLES9: Security update for fetchmail File : nvt/sles9p5012567.nasl |
2009-10-10 | Name : SLES9: Security update for fetchmail File : nvt/sles9p5012536.nasl |
2009-10-10 | Name : SLES9: Security update for fetchmail File : nvt/sles9p5015579.nasl |
2009-10-10 | Name : SLES9: Security update for fetchmail File : nvt/sles9p5055302.nasl |
2009-09-15 | Name : CentOS Security Advisory CESA-2009:1427 (fetchmail) File : nvt/ovcesa2009_1427.nasl |
2009-09-09 | Name : Fedora Core 10 FEDORA-2009-8770 (fetchmail) File : nvt/fcore_2009_8770.nasl |
2009-09-09 | Name : Fedora Core 11 FEDORA-2009-8780 (fetchmail) File : nvt/fcore_2009_8780.nasl |
2009-09-09 | Name : RedHat Security Advisory RHSA-2009:1427 File : nvt/RHSA_2009_1427.nasl |
2009-08-17 | Name : Ubuntu USN-816-1 (fetchmail) File : nvt/ubuntu_816_1.nasl |
2009-08-17 | Name : FreeBSD Ports: fetchmail File : nvt/freebsd_fetchmail12.nasl |
2009-08-17 | Name : Mandrake Security Advisory MDVSA-2009:201 (fetchmail) File : nvt/mdksa_2009_201.nasl |
2009-08-17 | Name : Debian Security Advisory DSA 1852-1 (fetchmail) File : nvt/deb_1852_1.nasl |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2013-07-12 | Name: The remote Oracle Linux host is missing a security update. File: oraclelinux_ELSA-2007-0018.nasl - Type: ACT_GATHER_INFO |
2013-07-12 | Name: The remote Oracle Linux host is missing a security update. File: oraclelinux_ELSA-2009-1427.nasl - Type: ACT_GATHER_INFO |
2012-08-01 | Name: The remote Scientific Linux host is missing a security update. File: sl_20090908_fetchmail_on_SL3_x.nasl - Type: ACT_GATHER_INFO |
2011-06-08 | Name: The remote Mandriva Linux host is missing one or more security updates. File: mandriva_MDVSA-2011-107.nasl - Type: ACT_GATHER_INFO |
2010-06-02 | Name: The remote Gentoo host is missing one or more security-related patches. File: gentoo_GLSA-201006-12.nasl - Type: ACT_GATHER_INFO |
2010-05-17 | Name: The remote Slackware host is missing a security update. File: Slackware_SSA_2010-136-01.nasl - Type: ACT_GATHER_INFO |
2010-04-21 | Name: The remote FreeBSD host is missing a security-related update. File: freebsd_pkg_09910d764c8211df83fb0015587e2cc1.nasl - Type: ACT_GATHER_INFO |
2010-02-24 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-1852.nasl - Type: ACT_GATHER_INFO |
2009-11-09 | Name: The remote host is missing a Mac OS X update that fixes various security issues. File: macosx_SecUpd2009-006.nasl - Type: ACT_GATHER_INFO |
2009-11-09 | Name: The remote host is missing a Mac OS X update that fixes various security issues. File: macosx_10_6_2.nasl - Type: ACT_GATHER_INFO |
2009-10-06 | Name: The remote openSUSE host is missing a security update. File: suse_fetchmail-6410.nasl - Type: ACT_GATHER_INFO |
2009-09-24 | Name: The remote SuSE 11 host is missing one or more security updates. File: suse_11_fetchmail-090807.nasl - Type: ACT_GATHER_INFO |
2009-09-24 | Name: The remote SuSE 9 host is missing a security-related patch. File: suse9_11814.nasl - Type: ACT_GATHER_INFO |
2009-09-24 | Name: The remote SuSE 9 host is missing a security-related patch. File: suse9_12468.nasl - Type: ACT_GATHER_INFO |
2009-09-24 | Name: The remote SuSE 10 host is missing a security-related patch. File: suse_fetchmail-6409.nasl - Type: ACT_GATHER_INFO |
2009-09-09 | Name: The remote CentOS host is missing a security update. File: centos_RHSA-2009-1427.nasl - Type: ACT_GATHER_INFO |
2009-09-09 | Name: The remote Red Hat host is missing a security update. File: redhat-RHSA-2009-1427.nasl - Type: ACT_GATHER_INFO |
2009-09-04 | Name: The remote Fedora host is missing a security update. File: fedora_2009-8770.nasl - Type: ACT_GATHER_INFO |
2009-09-04 | Name: The remote Fedora host is missing a security update. File: fedora_2009-8780.nasl - Type: ACT_GATHER_INFO |
2009-08-13 | Name: The remote Mandriva Linux host is missing one or more security updates. File: mandriva_MDVSA-2009-201.nasl - Type: ACT_GATHER_INFO |
2009-08-13 | Name: The remote Ubuntu host is missing one or more security-related patches. File: ubuntu_USN-816-1.nasl - Type: ACT_GATHER_INFO |
2009-08-12 | Name: The remote openSUSE host is missing a security update. File: suse_11_0_fetchmail-090807.nasl - Type: ACT_GATHER_INFO |
2009-08-12 | Name: The remote openSUSE host is missing a security update. File: suse_11_1_fetchmail-090807.nasl - Type: ACT_GATHER_INFO |
2009-08-12 | Name: The remote FreeBSD host is missing a security-related update. File: freebsd_pkg_5179d85c868311de91b90022157515b2.nasl - Type: ACT_GATHER_INFO |
2009-08-07 | Name: The remote Slackware host is missing a security update. File: Slackware_SSA_2009-218-01.nasl - Type: ACT_GATHER_INFO |