RHEL 2.1 : fetchmail (RHSA-2002:216)

This script is Copyright (C) 2004-2014 Tenable Network Security, Inc.


Synopsis :

The remote Red Hat host is missing one or more security updates.

Description :

Updated Fetchmail packages are available for Red Hat Linux Advanced
Server which close a remotely-exploitable vulnerability in unpatched
versions of Fetchmail prior to 6.1.0.

Fetchmail is a remote mail retrieval and forwarding utility intended
for use over on-demand TCP/IP links such as SLIP and PPP connections.
Two bugs have been found in the header parsing code in versions of
Fetchmail prior to 6.1.0.

The first bug allows a remote attacker to crash Fetchmail by sending a
carefully crafted DNS packet. The second bug allows a remote attacker
to carefully craft an email in such a way that when it is parsed by
Fetchmail a heap overflow occurs, allowing remote arbitrary code
execution.

Both of these bugs are only exploitable if Fetchmail is being used in
multidrop mode (using the 'multiple-local-recipients' feature).

All users of Fetchmail are advised to upgrade to the errata packages
containing a backported fix which is not vulnerable to these issues.

See also :

https://www.redhat.com/security/data/cve/CVE-2002-1174.html
https://www.redhat.com/security/data/cve/CVE-2002-1175.html
http://www.nessus.org/u?38f785bd
http://security.e-matters.de/advisories/032002.html
http://rhn.redhat.com/errata/RHSA-2002-216.html

Solution :

Update the affected fetchmail and / or fetchmailconf packages.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)

Family: Red Hat Local Security Checks

Nessus Plugin ID: 12327 ()

Bugtraq ID:

CVE ID: CVE-2002-1174
CVE-2002-1175