GLSA-200507-21 : fetchmail: Buffer Overflow
Medium Nessus Plugin ID 19323
SynopsisThe remote Gentoo host is missing one or more security-related patches.
DescriptionThe remote host is affected by the vulnerability described in GLSA-200507-21 (fetchmail: Buffer Overflow)
fetchmail does not properly validate UIDs coming from a POP3 mail server. The UID is placed in a fixed length buffer on the stack, which can be overflown.
Very long UIDs returned from a malicious or compromised POP3 server can cause fetchmail to crash, resulting in a Denial of Service, or allow arbitrary code to be placed on the stack.
There are no known workarounds at this time.
SolutionAll fetchmail users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose '>=net-mail/fetchmail-188.8.131.52'