Debian: 'fetchmail' memory corruption

    Date10 Aug 2001
    CategoryDebian
    2112
    Posted ByLinuxSecurity Advisories
    Salvatore Sanfilippo found two remotely exploitable problems in fetchmail while doing a security audit. In both the imap and pop3 code the input is not verified and used to store a number in an array.
    
    ------------------------------------------------------------------------
    Debian Security Advisory DSA-071-1                   This email address is being protected from spambots. You need JavaScript enabled to view it. 
    http://www.debian.org/security/                         Wichert Akkerman
    August 10, 2001
    ------------------------------------------------------------------------
    
    
    Package        : fetchmail
    Problem type   : memory corruption
    Debian-specific: no
    
    Salvatore Sanfilippo found two remotely exploitable problems in
    fetchmail while doing a security audit. In both the imap and pop3 code
    the input is not verified and used to store a number in an array. Since
    no bounds checking is done this can be used by an attacker to write
    arbitrary data in memory. An attacker can use this if we can get a user
    to transfer mail from a custom imap or pop3 server he controls.
    
    This has been fixed in version 5.3.3-3.
    
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    
    
    Debian GNU/Linux 2.2 alias potato
    ---------------------------------
    
      Potato was released for alpha, arm, i386, m68k, powerpc and sparc.
    
      Source archives:
         http://security.debian.org/dists/stable/updates/main/source/fetchmail_5.3.3-3.diff.gz
          MD5 checksum: a1ba0691be21e100b10beded89813911
         http://security.debian.org/dists/stable/updates/main/source/fetchmail_5.3.3-3.dsc
          MD5 checksum: b49e9eacda18f237ae066f085647d3f7
         http://security.debian.org/dists/stable/updates/main/source/fetchmail_5.3.3.orig.tar.gz
          MD5 checksum: d2cffc4594ec2d36db6681b800f25e2a
    
      Architecture independent archives:
         http://security.debian.org/dists/stable/updates/main/binary-all/fetchmailconf_5.3.3-3_all.deb
          MD5 checksum: 223c6590b7495a41d4743d526222bc4f
    
      Alpha architecture:
         http://security.debian.org/dists/stable/updates/main/binary-alpha/fetchmail_5.3.3-3_alpha.deb
          MD5 checksum: 75249ba9604e732e07a1b2147b6e155e
    
      ARM architecture:
         http://security.debian.org/dists/stable/updates/main/binary-arm/fetchmail_5.3.3-3_arm.deb
          MD5 checksum: 80a201b1e25ff5c301ccfd2cbfa6cd8e
    
      Intel IA-32 architecture:
         http://security.debian.org/dists/stable/updates/main/binary-i386/fetchmail_5.3.3-3_i386.deb
          MD5 checksum: 1d9e300f957b35486e2aefcff87e43c7
    
      Motorola 680x0 architecture:
         http://security.debian.org/dists/stable/updates/main/binary-m68k/fetchmail_5.3.3-3_m68k.deb
          MD5 checksum: 9bdf5c4712b7dec94f644e58635bee9b
    
      PowerPC architecture:
        
    http://security.debian.org/dists/stable/updates/main/binary-powerpc/fetchmail_5.3.3-3_powerpc.deb
          MD5 checksum: 1f97930cf7c8c4442362d6c5f27465cb
    
      Sun Sparc architecture:
         http://security.debian.org/dists/stable/updates/main/binary-sparc/fetchmail_5.3.3-3_sparc.deb
          MD5 checksum: fb060d4e74f6f1a84823829a21d54b19
    
      These packages will be moved into the stable distribution on its next
      revision.
    
    For not yet released architectures please refer to the appropriate
    directory  ftp://ftp.debian.org/debian/dists/sid/binary-$arch/ .
    
    --
    ----------------------------------------------------------------------------
    apt-get: deb  http://security.debian.org/ stable/updates main
    dpkg-ftp:  ftp://security.debian.org/debian-security dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    
    
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"25","type":"x","order":"1","pct":54.35,"resources":[]},{"id":"88","title":"Should be more technical","votes":"5","type":"x","order":"2","pct":10.87,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"16","type":"x","order":"3","pct":34.78,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.