Subject: Fwd: Advisory 03/2002: Fetchmail remote vulnerabilities
To: None <frueauf@netbsd.org>
From: Alan Post <apost@interwoven.com>
List: tech-pkg
Date: 09/30/2002 11:50:58
As seen on bugtraq today. Seems rather serious to me, as control of the mail
server is not required to exploit this.
The version of fetchmail in pkgsrc is 5.9.13.
Alan
From: Stefan Esser <s.esser@e-matters.de>
Newsgroups: gmane.comp.security.bugtraq
Subject: Advisory 03/2002: Fetchmail remote vulnerabilities
Date: Sun, 29 Sep 2002 11:44:50 +0200
User-Agent: Mutt/1.4i
Advisory: Fetchmail remote vulnerabilities
Release Date: 2002/09/29
Last Modified: 2002/09/29
Author: Stefan Esser [s.esser@e-matters.de]
Application: Fetchmail <= 6.0.0
Severity: Several vulnerabilities within Fetchmail could
allow remote compromise.
Risk: Critical
Vendor Status: Vendor released version 6.1.0
Reference: http://security.e-matters.de/advisories/032002.html
Overview:
We have discovered several bufferoverflows and a broken boundary check
within Fetchmail. If Fetchmail is running in multidrop mode these flaws
can be used by remote attackers to crash it or to execute arbitrary
code with the permissions of the user running fetchmail. Depending on
the configuration this allows a remote root compromise.