Oracle Solaris Third-Party Patch Update : fetchmail (multiple_vulnerabilities_in_fetchmail) (BEAST)

This script is Copyright (C) 2015 Tenable Network Security, Inc.

Synopsis :

The remote Solaris system is missing a security patch for third-party

Description :

The remote Solaris system is missing necessary patches to address
security updates :

- The SSL protocol, as used in certain configurations in
Microsoft Windows and Microsoft Internet Explorer,
Mozilla Firefox, Google Chrome, Opera, and other
products, encrypts data by using CBC mode with chained
initialization vectors, which allows man-in-the-middle
attackers to obtain plaintext HTTP headers via a
blockwise chosen-boundary attack (BCBA) on an HTTPS
session, in conjunction with JavaScript code that uses
(1) the HTML5 WebSocket API, (2) the Java URLConnection
API, or (3) the Silverlight WebClient API, aka a 'BEAST'
attack. (CVE-2011-3389)

- Fetchmail 5.0.8 through 6.3.21, when using NTLM
authentication in debug mode, allows remote NTLM servers
to (1) cause a denial of service (crash and delayed
delivery of inbound mail) via a crafted NTLM response
that triggers an out-of-bounds read in the base64
decoder, or (2) obtain sensitive information from memory
via an NTLM Type 2 message with a crafted Target Name
structure, which triggers an out-of-bounds read.

See also :

Solution :

Upgrade to Solaris 11/11 SRU 12.4.

Risk factor :

Medium / CVSS Base Score : 5.8

Family: Solaris Local Security Checks

Nessus Plugin ID: 80605 ()

Bugtraq ID:

CVE ID: CVE-2011-3389

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now