Visit our newest sister site!
Hundreds of free aircraft flight manuals
Civilian • Historical • Military • Declassified • FREE!

TUCoPS :: Linux :: Apps A-M :: hack1290.htm

fetchmail - OpenPKG Security Advisory (fetchmail) OpenPKG-SA-2004.012
[OpenPKG-SA-2004.012] OpenPKG Security Advisory (fetchmail)

Hash: SHA1


OpenPKG Security Advisory                            The OpenPKG Project                    
OpenPKG-SA-2004.012                                          08-Apr-2004

Package:             fetchmail
Vulnerability:       denial of service
OpenPKG Specific:    no

Affected Releases:   Affected Packages:          Corrected Packages:
OpenPKG CURRENT      <= fetchmail-6.2.4-20031008 >= fetchmail-6.2.5-20031016
OpenPKG 1.3          <= fetchmail-6.2.3-1.3.0    >= fetchmail-6.2.3-1.3.1
OpenPKG 2.0          none                        N.A.

Dependent Packages:  none

  According to a Mandrake Linux security advisory [0], a denial of
  service (DoS) vulnerability exists in the header rewriting code of
  Fetchmail [1]. The code's intention is to hack message headers so
  replies work properly. However, logic in the reply_hack() function
  fails to allocate enough memory for long lines and may write past a
  memory boundary. This could allow an attacker to cause a denial of
  service by sending a specially crafted email and crashing fetchmail.
  The Common Vulnerabilities and Exposures (CVE) project assigned the id
  CAN-2003-0792 [2] to the problem.

  Please check whether you are affected by running "/bin/rpm
  -q fetchmail". If you have the "fetchmail" package installed and its
  version is affected (see above), we recommend that you immediately
  upgrade it (see Solution). [3][4]

  Select the updated source RPM appropriate for your OpenPKG release
  [5], fetch it from the OpenPKG FTP service [6] or a mirror location,
  verify its integrity [7], build a corresponding binary RPM from it
  [3] and update your OpenPKG installation by applying the binary RPM
  [4]. For the OpenPKG 1.3 release, perform the following operations to
  permanently fix the security problem.

  $ ftp
  ftp> bin
  ftp> cd release/1.3/UPD
  ftp> get fetchmail-6.2.3-1.3.1.src.rpm
  ftp> bye
  $ /bin/rpm -v --checksig fetchmail-6.2.3-1.3.1.src.rpm
  $ /bin/rpm --rebuild fetchmail-6.2.3-1.3.1.src.rpm
  $ su -
  # /bin/rpm -Fvh /RPM/PKG/fetchmail-6.2.3-1.3.1.*.rpm

  [0] DKSA-2003:101

For security reasons, this advisory was digitally signed with the
OpenPGP public key "OpenPKG " (ID 63C4CB9F) of the
OpenPKG project which you can retrieve from and
hkp:// Follow the instructions on 
for details on how to verify the integrity of this advisory.

Comment: OpenPKG  


TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2015 AOH