blob: bdf105c4ad65cbf4e7a66ad086d0264041c2882b [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200507-21">
<title>fetchmail: Buffer Overflow</title>
fetchmail is susceptible to a buffer overflow resulting in a Denial of
Service or arbitrary code execution.
<product type="ebuild">fetchmail</product>
<announced>July 25, 2005</announced>
<revised>July 25, 2005: 01</revised>
<package name="net-mail/fetchmail" auto="yes" arch="*">
<unaffected range="ge"></unaffected>
<vulnerable range="lt"></vulnerable>
fetchmail is a utility that retrieves and forwards mail from
remote systems using IMAP, POP, and other protocols.
fetchmail does not properly validate UIDs coming from a POP3 mail
server. The UID is placed in a fixed length buffer on the stack, which
can be overflown.
<impact type="normal">
Very long UIDs returned from a malicious or compromised POP3
server can cause fetchmail to crash, resulting in a Denial of Service,
or allow arbitrary code to be placed on the stack.
There are no known workarounds at this time.
All fetchmail users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=net-mail/fetchmail-;</code>
<uri link="">Fetchmail Security Advisory</uri>
<uri link="">CAN-2005-2335</uri>
<metadata tag="submitter" timestamp="Fri, 22 Jul 2005 05:37:13 +0000">
<metadata tag="bugReady" timestamp="Sun, 24 Jul 2005 07:43:36 +0000">