Summary
The remote host is missing an update to fetchmail
announced via advisory DSA 071-1.
Solution
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20071-1
Insight
Salvatore Sanfilippo found two remotely exploitable problems in fetchmail while doing a security audit. In both the imap and pop3 code the input is not verified and used to store a number in an array. Since no bounds checking is done this can be used by an attacker to write arbitrary data in memory. An attacker can use this if we can get a user to transfer mail from a custom imap or pop3 server he controls.
This has been fixed in version 5.3.3-3.
Severity
Classification
-
CVE CVE-2001-1009 -
CVSS Base Score: 10.0
AV:N/AC:L/Au:N/C:C/I:C/A:C
Related Vulnerabilities