GLSA-200403-10 : Fetchmail 6.2.5 fixes a remote DoS

This script is Copyright (C) 2004-2014 Tenable Network Security, Inc.


Synopsis :

The remote Gentoo host is missing one or more security-related
patches.

Description :

The remote host is affected by the vulnerability described in GLSA-200403-10
(Fetchmail 6.2.5 fixes a remote DoS)

Fetchmail versions 6.2.4 and earlier can be crashed by sending a
specially crafted email to a fetchmail user. This problem occurs because
Fetchmail does not properly allocate memory for long lines in an incoming
email.

Impact :

Fetchmail users who receive a malicious email may have their fetchmail
program crash.

Workaround :

While a workaround is not currently known for this issue, all users are advised to upgrade to the latest version of fetchmail.

See also :

http://xforce.iss.net/xforce/xfdb/13450
http://www.gentoo.org/security/en/glsa/glsa-200403-10.xml

Solution :

Fetchmail users should upgrade to version 6.2.5 or later:
# emerge sync
# emerge -pv '>=net-mail/fetchmail-6.2.5'
# emerge '>=net-mail/fetchmail-6.2.5'

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)

Family: Gentoo Local Security Checks

Nessus Plugin ID: 14461 (gentoo_GLSA-200403-10.nasl)

Bugtraq ID:

CVE ID: CVE-2003-0792