Mandriva Linux Security Advisory : fetchmail (MDVSA-2011:107)

medium Nessus Plugin ID 54991

Synopsis

The remote Mandriva Linux host is missing one or more security updates.

Description

Multiple vulnerabilities were discovered and corrected in fetchmail :

fetchmail 4.6.3 through 6.3.16, when debug mode is enabled, does not properly handle invalid characters in a multi-character locale, which allows remote attackers to cause a denial of service (memory consumption and application crash) via a crafted (1) message header or (2) POP3 UIDL list (CVE-2010-1167). NOTE: This vulnerability did not affect Mandriva Linux 2010.2.

fetchmail 5.9.9 through 6.3.19 does not properly limit the wait time after issuing a (1) STARTTLS or (2) STLS request, which allows remote servers to cause a denial of service (application hang) by acknowledging the request but not sending additional packets (CVE-2011-1947).

Packages for 2009.0 are provided as of the Extended Maintenance Program. Please visit this link to learn more:
http://store.mandriva.com/product_info.php?cPath=149 products_id=490

The updated packages have been upgraded to the 6.3.20 version which is not vulnerable to these issues.

Solution

Update the affected fetchmail, fetchmail-daemon and / or fetchmailconf packages.

See Also

https://seclists.org/oss-sec/2011/q2/551

Plugin Details

Severity: Medium

ID: 54991

File Name: mandriva_MDVSA-2011-107.nasl

Version: 1.9

Type: local

Published: 6/8/2011

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 4.1

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: cpe:/o:mandriva:linux:2010.1, p-cpe:/a:mandriva:linux:fetchmail-daemon, p-cpe:/a:mandriva:linux:fetchmailconf, p-cpe:/a:mandriva:linux:fetchmail, cpe:/o:mandriva:linux:2009.0

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 6/7/2011

Reference Information

CVE: CVE-2010-1167, CVE-2011-1947

BID: 39556, 48043

MDVSA: 2011:107