lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Fri, 23 Dec 2005 17:53:00 -0700
From: Mandriva Security Team <security@...driva.com>
To: bugtraq@...urityfocus.com
Subject: MDKSA-2005:236 - Updated fetchmail packages fix vulnerability


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________
 
 Mandriva Linux Security Advisory                         MDKSA-2005:236
 http://www.mandriva.com/security/
 _______________________________________________________________________
 
 Package : fetchmail
 Date    : December 23, 2005
 Affected: 10.1, 10.2, 2006.0, Corporate 3.0
 _______________________________________________________________________
 
 Problem Description:
 
 Fetchmail before 6.3.1 and before 6.2.5.5, when configured for
 multidrop mode, allows remote attackers to cause a DoS (application
 crash) by sending messages without headers from upstream mail
 servers.
 
 The updated packages have been patched to correct this problem.
 _______________________________________________________________________

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-4348
 _______________________________________________________________________
 
 Updated Packages:
 
 Mandriva Linux 10.1:
 9c8726e3d841d87b9cc64a9ce3497021  10.1/RPMS/fetchmail-6.2.5-5.3.101mdk.i586.rpm
 83258675518c03144515f89ae8c78be4  10.1/RPMS/fetchmailconf-6.2.5-5.3.101mdk.i586.rpm
 321a0d1e90bbe0fdb128b96a42ff8e20  10.1/RPMS/fetchmail-daemon-6.2.5-5.3.101mdk.i586.rpm
 fbfde9ae3b5d9e343282d48b1f1053c8  10.1/SRPMS/fetchmail-6.2.5-5.3.101mdk.src.rpm

 Mandriva Linux 10.1/X86_64:
 ff6fb1245bcf6edf9247ad71669d4c46  x86_64/10.1/RPMS/fetchmail-6.2.5-5.3.101mdk.x86_64.rpm
 efb6b95e1ff2c7723460b9c1ac7e4200  x86_64/10.1/RPMS/fetchmailconf-6.2.5-5.3.101mdk.x86_64.rpm
 31c794fae961246e263db99fca4308eb  x86_64/10.1/RPMS/fetchmail-daemon-6.2.5-5.3.101mdk.x86_64.rpm
 fbfde9ae3b5d9e343282d48b1f1053c8  x86_64/10.1/SRPMS/fetchmail-6.2.5-5.3.101mdk.src.rpm

 Mandriva Linux 10.2:
 49e0f1a245c001f08117e20542119796  10.2/RPMS/fetchmail-6.2.5-10.4.102mdk.i586.rpm
 c8d3515770d91ff96190e6e10c400169  10.2/RPMS/fetchmailconf-6.2.5-10.4.102mdk.i586.rpm
 34feb39cc4766bdb9e15df201d085ed0  10.2/RPMS/fetchmail-daemon-6.2.5-10.4.102mdk.i586.rpm
 fbf579f130896de2c645a8460dd88862  10.2/SRPMS/fetchmail-6.2.5-10.4.102mdk.src.rpm

 Mandriva Linux 10.2/X86_64:
 489f797385cc55c378a3faf50faa898e  x86_64/10.2/RPMS/fetchmail-6.2.5-10.4.102mdk.x86_64.rpm
 d6c123681c17748de5f17c2399fdb7c4  x86_64/10.2/RPMS/fetchmailconf-6.2.5-10.4.102mdk.x86_64.rpm
 9e6b77b062ab162d4c215032dc7714f3  x86_64/10.2/RPMS/fetchmail-daemon-6.2.5-10.4.102mdk.x86_64.rpm
 fbf579f130896de2c645a8460dd88862  x86_64/10.2/SRPMS/fetchmail-6.2.5-10.4.102mdk.src.rpm

 Mandriva Linux 2006.0:
 e09c0856591976733a1bc8041e8eb93c  2006.0/RPMS/fetchmail-6.2.5-11.2.20060mdk.i586.rpm
 aba5a8c643b15149976c30ba11116540  2006.0/RPMS/fetchmailconf-6.2.5-11.2.20060mdk.i586.rpm
 d683b66431939e6106b3fee6b8b500f5  2006.0/RPMS/fetchmail-daemon-6.2.5-11.2.20060mdk.i586.rpm
 bb8c5a81a1299a855594849851615d17  2006.0/SRPMS/fetchmail-6.2.5-11.2.20060mdk.src.rpm

 Mandriva Linux 2006.0/X86_64:
 2567bef9f4fc2b8d91fae1e5539d5920  x86_64/2006.0/RPMS/fetchmail-6.2.5-11.2.20060mdk.x86_64.rpm
 33a88c8055504ab5c741be8c84ab1a81  x86_64/2006.0/RPMS/fetchmailconf-6.2.5-11.2.20060mdk.x86_64.rpm
 b2e430f97aed6f30e18144ee57b17b8f  x86_64/2006.0/RPMS/fetchmail-daemon-6.2.5-11.2.20060mdk.x86_64.rpm
 bb8c5a81a1299a855594849851615d17  x86_64/2006.0/SRPMS/fetchmail-6.2.5-11.2.20060mdk.src.rpm

 Corporate 3.0:
 51c54e861eec7692a76b3f5b91bab4b9  corporate/3.0/RPMS/fetchmail-6.2.5-3.3.C30mdk.i586.rpm
 41c74970c74af1fce8eae213f60d108e  corporate/3.0/RPMS/fetchmailconf-6.2.5-3.3.C30mdk.i586.rpm
 53fe277159d6771d83d40c99c3418f51  corporate/3.0/RPMS/fetchmail-daemon-6.2.5-3.3.C30mdk.i586.rpm
 477f8ec8d7ccaba94a529fd4ead38f11  corporate/3.0/SRPMS/fetchmail-6.2.5-3.3.C30mdk.src.rpm

 Corporate 3.0/X86_64:
 7f806d8e2858a008799f0766503f0c7a  x86_64/corporate/3.0/RPMS/fetchmail-6.2.5-3.3.C30mdk.x86_64.rpm
 cb3793ad31fb347d9daf894d7ec7d318  x86_64/corporate/3.0/RPMS/fetchmailconf-6.2.5-3.3.C30mdk.x86_64.rpm
 8030300459d198b72b9e9a83909fc0fb  x86_64/corporate/3.0/RPMS/fetchmail-daemon-6.2.5-3.3.C30mdk.x86_64.rpm
 477f8ec8d7ccaba94a529fd4ead38f11  x86_64/corporate/3.0/SRPMS/fetchmail-6.2.5-3.3.C30mdk.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)

iD8DBQFDrG5ZmqjQ0CJFipgRApfEAKDh472PEyH67pI3/bDJMxgCUqTv+QCfWfLO
I6ekE0okYXHNiq4ToDObDYs=
=IpRj
-----END PGP SIGNATURE-----


Powered by blists - more mailing lists