Lucene search

K
ubuntuUbuntuUSN-520-1
HistorySep 26, 2007 - 12:00 a.m.

fetchmail vulnerabilities

2007-09-2600:00:00
ubuntu.com
30

6.7 Medium

AI Score

Confidence

Low

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.019 Low

EPSS

Percentile

88.3%

Releases

  • Ubuntu 7.04
  • Ubuntu 6.10
  • Ubuntu 6.06

Packages

  • fetchmail -

Details

Gaetan Leurent discovered a vulnerability in the APOP protocol based
on MD5 collisions. As fetchmail supports the APOP protocol, this
vulnerability can be used by attackers to discover a portion of the APOP
user’s authentication credentials. (CVE-2007-1558)

Earl Chew discovered that fetchmail can be made to de-reference a NULL
pointer when contacting SMTP servers. This vulnerability can be used
by attackers who control the SMTP server to crash fetchmail and cause
a denial of service. (CVE-2007-4565)

OSVersionArchitecturePackageVersionFilename
Ubuntu7.04noarchfetchmail< 6.3.6-1ubuntu2.1UNKNOWN
Ubuntu6.10noarchfetchmail< 6.3.4-1ubuntu4.2UNKNOWN
Ubuntu6.06noarchfetchmail< 6.3.2-2ubuntu2.2UNKNOWN

6.7 Medium

AI Score

Confidence

Low

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.019 Low

EPSS

Percentile

88.3%