Summary
The remote host is missing an update to fetchmail
announced via advisory DSA 774-1.
Edward Shornock discovered a bug in the UIDL handling code of fetchmail, a common POP3, APOP and IMAP mail fetching utility. A malicious POP3 server could exploit this problem and inject arbitrary code that will be executed on the victim host. If fetchmail is running as root, this becomes a root exploit.
the old stable distribution (woody) is not affected by this problem.
Solution
For the stable distribution (sarge) this problem has been fixed in version 6.2.5-12sarge1.
For the unstable distribution (sid) this problem has been fixed in version 6.2.5-16.
We recommend that you upgrade your fetchmail package.
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20774-1
Severity
Classification
-
CVE CVE-2005-2335 -
CVSS Base Score: 5.0
AV:N/AC:L/Au:N/C:N/I:N/A:P
Related Vulnerabilities