Fetchmail (aka fetchmail-ssl) before 5.8.17 allows a remote malicious (1) IMAP server or (2) POP/POP3 server to overwrite arbitrary memory and possibly gain privileges via a negative index number as part of a response to a LIST request.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://www.novell.com/linux/security/advisories/2001_026_fetchmail_txt.html | vendor advisory |
http://www.debian.org/security/2001/dsa-071 | vendor advisory |
http://www.redhat.com/support/errata/RHSA-2001-103.html | patch vendor advisory |
http://www.securityfocus.com/bid/3166 | exploit vdb entry patch vendor advisory |
http://archives.neohapsis.com/archives/bugtraq/2001-08/0118.html | mailing list exploit patch vendor advisory |
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000419 | vendor advisory |
http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-072.php3 | vendor advisory |
http://www.linuxsecurity.com/advisories/other_advisory-1555.html | patch vendor advisory |
http://www.securityfocus.com/bid/3164 | exploit vdb entry patch vendor advisory |
http://www.iss.net/security_center/static/6965.php | vdb entry |