Lucene search

K
ubuntuUbuntuUSN-153-1
HistoryJul 26, 2005 - 12:00 a.m.

fetchmail vulnerability

2005-07-2600:00:00
ubuntu.com
25

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

7.6 High

AI Score

Confidence

Low

0.045 Low

EPSS

Percentile

92.5%

Releases

  • Ubuntu 5.04
  • Ubuntu 4.10

Details

Ross Boylan discovered a remote buffer overflow in fetchmail. By
sending invalid responses with very long UIDs, a faulty or malicious
POP server could crash fetchmail or execute arbitrary code with the
privileges of the user invoking fetchmail.

fetchmail is commonly run as root to fetch mail for multiple user
accounts; in this case, this vulnerability could be exploited to
compromise the whole system.

OSVersionArchitecturePackageVersionFilename
Ubuntu5.04noarchfetchmail< *UNKNOWN
Ubuntu4.10noarchfetchmail< *UNKNOWN

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

7.6 High

AI Score

Confidence

Low

0.045 Low

EPSS

Percentile

92.5%