Gentoo: fetchmail buffer overflow vulnerability

    Date16 Dec 2002
    CategoryGentoo
    6172
    Posted ByLinuxSecurity Advisories
    This heap overflow can be used by remote attackers to crash it or to execute arbitrary code with the privileges of the user running fetchmail. Depending on the configuration this allows a remote root compromise.
    
    - --------------------------------------------------------------------
    GENTOO LINUX SECURITY ANNOUNCEMENT 200212-3
    - --------------------------------------------------------------------
    
    PACKAGE : fetchmail
    SUMMARY : buffer overflow
    DATE    : 2002-12-15 13:12 UTC
    EXPLOIT : remote
    
    - --------------------------------------------------------------------
    
    From e-matters advisory:
    
    "In the light of recent discoveries we reaudited Fetchmail and found
    another buffer overflow within the default configuration. This heap
    overflow can be used by remote attackers to crash it or to execute
    arbitrary code with the privileges of the user running fetchmail.
    Depending on the configuration this allows a remote root compromise."
    
    Read the full advisory at 
    http://security.e-matters.de/advisories/052002.html
    
    SOLUTION
    
    It is recommended that all Gentoo Linux users who are running
    net-mail/fetchmail-6.1.2 and earlier update their systems as follows:
    
    emerge rsync
    emerge fetchmail
    emerge clean
    
    - --------------------------------------------------------------------
    This email address is being protected from spambots. You need JavaScript enabled to view it. - GnuPG key is available at www.gentoo.org/~aliz
    This email address is being protected from spambots. You need JavaScript enabled to view it.
    - --------------------------------------------------------------------
    
    
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"5","type":"x","order":"1","pct":55.56,"resources":[]},{"id":"88","title":"Should be more technical","votes":"3","type":"x","order":"2","pct":33.33,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"1","type":"x","order":"3","pct":11.11,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.