Lucene search

K
slackwareSlackware Linux ProjectSSA-2008-210-01
HistoryJul 29, 2008 - 5:31 a.m.

[slackware-security] fetchmail

2008-07-2905:31:09
Slackware Linux Project
www.slackware.com
22

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

0.113 Low

EPSS

Percentile

95.2%

New fetchmail packages are available for Slackware 8.1, 9.0, 9.1, 10.0, 10.1,
10.2, 11.0, 12.0, 12.1, and -current to fix security issues.

More details about this issue may be found in the Common
Vulnerabilities and Exposures (CVE) database:

https://vulners.com/cve/CVE-2008-2711

Here are the details from the Slackware 12.1 ChangeLog:

patches/packages/fetchmail-6.3.8-i486-3_slack12.1.tgz:
Patched to fix a possible denial of service when “-v -v” options are used.
For more information, see:
https://vulners.com/cve/CVE-2008-2711
(* Security fix *)

Where to find the new packages:

HINT: Getting slow download speeds from ftp.slackware.com?
Give slackware.osuosl.org a try. This is another primary FTP site
for Slackware that can be considerably faster than downloading
directly from ftp.slackware.com.

Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating additional FTP and rsync hosting
to the Slackware project! :-)

Also see the “Get Slack” section on http://slackware.com for
additional mirror sites near you.

Updated package for Slackware 8.1:
ftp://ftp.slackware.com/pub/slackware/slackware-8.1/patches/packages/fetchmail-6.3.8-i386-1_slack8.1.tgz

Updated package for Slackware 9.0:
ftp://ftp.slackware.com/pub/slackware/slackware-9.0/patches/packages/fetchmail-6.3.8-i386-1_slack9.0.tgz

Updated package for Slackware 9.1:
ftp://ftp.slackware.com/pub/slackware/slackware-9.1/patches/packages/fetchmail-6.3.8-i486-1_slack9.1.tgz

Updated package for Slackware 10.0:
ftp://ftp.slackware.com/pub/slackware/slackware-10.0/patches/packages/fetchmail-6.3.8-i486-1_slack10.0.tgz

Updated package for Slackware 10.1:
ftp://ftp.slackware.com/pub/slackware/slackware-10.1/patches/packages/fetchmail-6.3.8-i486-1_slack10.1.tgz

Updated package for Slackware 10.2:
ftp://ftp.slackware.com/pub/slackware/slackware-10.2/patches/packages/fetchmail-6.3.8-i486-1_slack10.2.tgz

Updated package for Slackware 11.0:
ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/fetchmail-6.3.8-i486-1_slack11.0.tgz

Updated package for Slackware 12.0:
ftp://ftp.slackware.com/pub/slackware/slackware-12.0/patches/packages/fetchmail-6.3.8-i486-3_slack12.0.tgz

Updated package for Slackware 12.1:
ftp://ftp.slackware.com/pub/slackware/slackware-12.1/patches/packages/fetchmail-6.3.8-i486-3_slack12.1.tgz

Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/fetchmail-6.3.8-i486-3.tgz

MD5 signatures:

Slackware 8.1 package:
b5d8c801042c5190ad8915a30dd0a35f fetchmail-6.3.8-i386-1_slack8.1.tgz

Slackware 9.0 package:
858b8cbf528801d500db9c8353dffd01 fetchmail-6.3.8-i386-1_slack9.0.tgz

Slackware 9.1 package:
d791215ee93508ab8e82a9038a7a838f fetchmail-6.3.8-i486-1_slack9.1.tgz

Slackware 10.0 package:
f30d0eadac70861cd437112f426c97e4 fetchmail-6.3.8-i486-1_slack10.0.tgz

Slackware 10.1 package:
64c4a49b7b88e67151cbf9c68b66c64a fetchmail-6.3.8-i486-1_slack10.1.tgz

Slackware 10.2 package:
507cd71d2d2fdbcce4b009eb730f12ba fetchmail-6.3.8-i486-1_slack10.2.tgz

Slackware 11.0 package:
c221a17709e63f4a61df34a02c65ff6f fetchmail-6.3.8-i486-1_slack11.0.tgz

Slackware 12.0 package:
e6f9da78a683f27bd4788d391a4d2edd fetchmail-6.3.8-i486-3_slack12.0.tgz

Slackware 12.1 package:
ef59967ab69a16d6b23083691550d53d fetchmail-6.3.8-i486-3_slack12.1.tgz

Slackware -current package:
0c4c7d0a8d72ef4548bff0c60cdd516a fetchmail-6.3.8-i486-3.tgz

Installation instructions:

Upgrade the package as root:
> upgradepkg fetchmail-6.3.8-i486-3_slack12.1.tgz

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

0.113 Low

EPSS

Percentile

95.2%