Debian DSA-171-1 : fetchmail - buffer overflows

high Nessus Plugin ID 15008

Synopsis

The remote Debian host is missing a security-related update.

Description

Stefan Esser discovered several buffer overflows and a broken boundary check within fetchmail. If fetchmail is running in multidrop mode these flaws can be used by remote attackers to crash it or to execute arbitrary code under the user id of the user running fetchmail.
Depending on the configuration this even allows a remote root compromise.

These problems have been fixed in version 5.9.11-6.1 for both fetchmail and fetchmail-ssl for the current stable distribution (woody), in version 5.3.3-4.2 for fetchmail for the old stable distribution (potato) and in version 6.1.0-1 for both fetchmail and fetchmail-ssl for the unstable distribution (sid). There are no fetchmail-ssl packages for the old stable distribution (potato) and thus no updates.

Solution

Upgrade the fetchmail packages immediately.

See Also

http://security.e-matters.de/advisories/032002.html

http://www.debian.org/security/2002/dsa-171

Plugin Details

Severity: High

ID: 15008

File Name: debian_DSA-171.nasl

Version: 1.19

Type: local

Agent: unix

Published: 9/29/2004

Updated: 1/4/2021

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.5

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:fetchmail, p-cpe:/a:debian:debian_linux:fetchmail-ssl, cpe:/o:debian:debian_linux:2.2, cpe:/o:debian:debian_linux:3.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Ease: No known exploits are available

Patch Publication Date: 10/7/2002

Reference Information

CVE: CVE-2002-1174, CVE-2002-1175

BID: 5825, 5826, 5827

DSA: 171