Mandriva Linux Security Advisory : fetchmail (MDVSA-2013:037)

medium Nessus Plugin ID 66051

Synopsis

The remote Mandriva Linux host is missing one or more security updates.

Description

Multiple vulnerabilities has been found and corrected in fetchmail :

Fetchmail version 6.3.9 enabled all SSL workarounds (SSL_OP_ALL) which contains a switch to disable a countermeasure against certain attacks against block ciphers that permit guessing the initialization vectors, providing that an attacker can make the application (fetchmail) encrypt some data for him -- which is not easily the case (aka a BEAST attack) (CVE-2011-3389).

A denial of service flaw was found in the way Fetchmail, a remote mail retrieval and forwarding utility, performed base64 decoding of certain NTLM server responses. Upon sending the NTLM authentication request, Fetchmail did not check if the received response was actually part of NTLM protocol exchange, or server-side error message and session abort. A rogue NTML server could use this flaw to cause fetchmail executable crash (CVE-2012-3482).

This advisory provides the latest version of fetchmail (6.3.22) which is not vulnerable to these issues.

Solution

Update the affected fetchmail, fetchmail-daemon and / or fetchmailconf packages.

See Also

http://www.fetchmail.info/fetchmail-SA-2012-01.txt

http://www.fetchmail.info/fetchmail-SA-2012-02.txt

Plugin Details

Severity: Medium

ID: 66051

File Name: mandriva_MDVSA-2013-037.nasl

Version: 1.11

Type: local

Published: 4/20/2013

Updated: 12/5/2022

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.2

CVSS v2

Risk Factor: Medium

Base Score: 5.8

Temporal Score: 4.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:P

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:fetchmail, p-cpe:/a:mandriva:linux:fetchmail-daemon, p-cpe:/a:mandriva:linux:fetchmailconf, cpe:/o:mandriva:business_server:1

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 4/5/2013

Reference Information

CVE: CVE-2011-3389, CVE-2012-3482

BID: 49388, 49778, 54987

MDVSA: 2013:037