[<prev] [next>] [day] [month] [year] [list]
Message-ID: <200605262339.k4QNdEK5016922@lambchop.rdu.rpath.com>
Date: Fri, 26 May 2006 19:39:14 -0400
From: "Justin M. Forbes" <jmforbes@...th.com>
To: security-announce@...ts.rpath.com, update-announce@...ts.rpath.com
Cc: lwn@....net, full-disclosure@...ts.grok.org.uk, bugtraq@...urityfocus.com
Subject: rPSA-2006-0084-1 fetchmail
rPath Security Advisory: 2006-0084-1
Published: 2006-05-26
Products: rPath Linux 1
Rating: Minor
Exposure Level Classification:
User Non-deterministic Weakness
Updated Versions:
fetchmail=/conary.rpath.com@rpl:devel//1/6.2.5.5-0.1-1
References:
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2335
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4348
http://bugs.rpath.com/show_bug.cgi?id=1170
Description:
Previous versions of fetchmail, when talking to a hostile (possibly
compromised) mail server, are vulnerable to possible denial of
service or user compromise. Because a hostile or compromised
mail server can take other actions on the user's behalf and
has been provided with user authentication data, this individual
security update can provide only limited protection against hostile
or compromised servers, and does not and cannot protect against
attacks such as theft of authentication information or email data
by a hostile or compromised mail server.
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists