RHEL 2.1 : fetchmail (RHSA-2002:216)

High Nessus Plugin ID 12327


The remote Red Hat host is missing one or more security updates.


Updated Fetchmail packages are available for Red Hat Linux Advanced Server which close a remotely-exploitable vulnerability in unpatched versions of Fetchmail prior to 6.1.0.

Fetchmail is a remote mail retrieval and forwarding utility intended for use over on-demand TCP/IP links such as SLIP and PPP connections.
Two bugs have been found in the header parsing code in versions of Fetchmail prior to 6.1.0.

The first bug allows a remote attacker to crash Fetchmail by sending a carefully crafted DNS packet. The second bug allows a remote attacker to carefully craft an email in such a way that when it is parsed by Fetchmail a heap overflow occurs, allowing remote arbitrary code execution.

Both of these bugs are only exploitable if Fetchmail is being used in multidrop mode (using the 'multiple-local-recipients' feature).

All users of Fetchmail are advised to upgrade to the errata packages containing a backported fix which is not vulnerable to these issues.


Update the affected fetchmail and / or fetchmailconf packages.

See Also






Plugin Details

Severity: High

ID: 12327

File Name: redhat-RHSA-2002-216.nasl

Version: $Revision: 1.20 $

Type: local

Agent: unix

Published: 2004/07/06

Modified: 2016/12/28

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:fetchmail, p-cpe:/a:redhat:enterprise_linux:fetchmailconf, cpe:/o:redhat:enterprise_linux:2.1

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Patch Publication Date: 2002/10/07

Reference Information

CVE: CVE-2002-1174, CVE-2002-1175

CERT: 738331

RHSA: 2002:216