Gentoo: fetchmail buffer overflow vulnerability

    Date16 Dec 2002
    CategoryGentoo
    6116
    Posted ByLinuxSecurity Advisories
    This heap overflow can be used by remote attackers to crash it or to execute arbitrary code with the privileges of the user running fetchmail. Depending on the configuration this allows a remote root compromise.
    
    - --------------------------------------------------------------------
    GENTOO LINUX SECURITY ANNOUNCEMENT 200212-3
    - --------------------------------------------------------------------
    
    PACKAGE : fetchmail
    SUMMARY : buffer overflow
    DATE    : 2002-12-15 13:12 UTC
    EXPLOIT : remote
    
    - --------------------------------------------------------------------
    
    From e-matters advisory:
    
    "In the light of recent discoveries we reaudited Fetchmail and found
    another buffer overflow within the default configuration. This heap
    overflow can be used by remote attackers to crash it or to execute
    arbitrary code with the privileges of the user running fetchmail.
    Depending on the configuration this allows a remote root compromise."
    
    Read the full advisory at 
    http://security.e-matters.de/advisories/052002.html
    
    SOLUTION
    
    It is recommended that all Gentoo Linux users who are running
    net-mail/fetchmail-6.1.2 and earlier update their systems as follows:
    
    emerge rsync
    emerge fetchmail
    emerge clean
    
    - --------------------------------------------------------------------
    This email address is being protected from spambots. You need JavaScript enabled to view it. - GnuPG key is available at www.gentoo.org/~aliz
    This email address is being protected from spambots. You need JavaScript enabled to view it.
    - --------------------------------------------------------------------
    
    
    
    You are not authorised to post comments.

    LinuxSecurity Poll

    Do you reuse passwords across multiple accounts?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    /component/communitypolls/?task=poll.vote
    13
    radio
    [{"id":"55","title":"Yes","votes":"2","type":"x","order":"1","pct":100,"resources":[]},{"id":"56","title":"No","votes":"0","type":"x","order":"2","pct":0,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.