[<prev] [next>] [day] [month] [year] [list]
Message-ID: <200605262339.k4QNdEK5016922@lambchop.rdu.rpath.com>
Date: Sat May 27 00:39:25 2006
From: jmforbes at rpath.com (Justin M. Forbes)
Subject: rPSA-2006-0084-1 fetchmail
rPath Security Advisory: 2006-0084-1
Published: 2006-05-26
Products: rPath Linux 1
Rating: Minor
Exposure Level Classification:
User Non-deterministic Weakness
Updated Versions:
fetchmail=/conary.rpath.com@rpl:devel//1/6.2.5.5-0.1-1
References:
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2335
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4348
http://bugs.rpath.com/show_bug.cgi?id=1170
Description:
Previous versions of fetchmail, when talking to a hostile (possibly
compromised) mail server, are vulnerable to possible denial of
service or user compromise. Because a hostile or compromised
mail server can take other actions on the user's behalf and
has been provided with user authentication data, this individual
security update can provide only limited protection against hostile
or compromised servers, and does not and cannot protect against
attacks such as theft of authentication information or email data
by a hostile or compromised mail server.
Powered by blists - more mailing lists