Search criteria
74 vulnerabilities found for fetchmail by fetchmail
CVE-2025-61962 (GCVE-0-2025-61962)
Vulnerability from cvelistv5 – Published: 2025-10-04 00:00 – Updated: 2025-11-04 21:14
VLAI?
Summary
In fetchmail before 6.5.6, the SMTP client can crash when authenticating upon receiving a 334 status code in a malformed context.
Severity ?
5.9 (Medium)
CWE
- CWE-142 - Improper Neutralization of Value Delimiters
Assigner
References
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-61962",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-10-06T14:20:46.927097Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-10-06T14:20:57.032Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2025-11-04T21:14:11.806Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2025/10/04/3"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "fetchmail",
"vendor": "fetchmail",
"versions": [
{
"lessThan": "6.5.6",
"status": "affected",
"version": "5.9.9",
"versionType": "semver"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.5.6",
"versionStartIncluding": "5.9.9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In fetchmail before 6.5.6, the SMTP client can crash when authenticating upon receiving a 334 status code in a malformed context."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-142",
"description": "CWE-142 Improper Neutralization of Value Delimiters",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-10-04T02:51:57.449Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://www.openwall.com/lists/oss-security/2025/10/03/2"
},
{
"url": "https://www.fetchmail.info/fetchmail-SA-2025-01.txt"
},
{
"url": "https://gitlab.com/fetchmail/fetchmail/-/commit/4c3cebfa4e659fb778ca2cae0ccb3f69201609a8"
}
],
"source": {
"discovery": "INTERNAL"
},
"x_generator": {
"engine": "enrichogram 0.0.1"
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2025-61962",
"datePublished": "2025-10-04T00:00:00.000Z",
"dateReserved": "2025-10-04T00:00:00.000Z",
"dateUpdated": "2025-11-04T21:14:11.806Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2021-39272 (GCVE-0-2021-39272)
Vulnerability from cvelistv5 – Published: 2021-08-30 05:05 – Updated: 2024-08-04 02:06
VLAI?
Summary
Fetchmail before 6.4.22 fails to enforce STARTTLS session encryption in some circumstances, such as a certain situation with IMAP and PREAUTH.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T02:06:41.615Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.fetchmail.info/security.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://nostarttls.secvuln.info/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2021/08/27/3"
},
{
"name": "FEDORA-2021-ddefbdbb46",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3XJ6XLEJCEZCAM5LGGD6XBCC522QLG4/"
},
{
"name": "FEDORA-2021-9998719311",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZYCYLL73NP7ALJWSDICIVSA47ZIXWSSA/"
},
{
"name": "FEDORA-2021-e61a978fef",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VXMKSEHAQSEDCWZMAOJEGX3P3JW6QY6H/"
},
{
"name": "GLSA-202209-14",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/202209-14"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Fetchmail before 6.4.22 fails to enforce STARTTLS session encryption in some circumstances, such as a certain situation with IMAP and PREAUTH."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-09-25T15:07:04",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.fetchmail.info/security.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://nostarttls.secvuln.info/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.openwall.com/lists/oss-security/2021/08/27/3"
},
{
"name": "FEDORA-2021-ddefbdbb46",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3XJ6XLEJCEZCAM5LGGD6XBCC522QLG4/"
},
{
"name": "FEDORA-2021-9998719311",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZYCYLL73NP7ALJWSDICIVSA47ZIXWSSA/"
},
{
"name": "FEDORA-2021-e61a978fef",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VXMKSEHAQSEDCWZMAOJEGX3P3JW6QY6H/"
},
{
"name": "GLSA-202209-14",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "https://security.gentoo.org/glsa/202209-14"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-39272",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Fetchmail before 6.4.22 fails to enforce STARTTLS session encryption in some circumstances, such as a certain situation with IMAP and PREAUTH."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.fetchmail.info/security.html",
"refsource": "MISC",
"url": "https://www.fetchmail.info/security.html"
},
{
"name": "https://nostarttls.secvuln.info/",
"refsource": "MISC",
"url": "https://nostarttls.secvuln.info/"
},
{
"name": "http://www.openwall.com/lists/oss-security/2021/08/27/3",
"refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2021/08/27/3"
},
{
"name": "FEDORA-2021-ddefbdbb46",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L3XJ6XLEJCEZCAM5LGGD6XBCC522QLG4/"
},
{
"name": "FEDORA-2021-9998719311",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZYCYLL73NP7ALJWSDICIVSA47ZIXWSSA/"
},
{
"name": "FEDORA-2021-e61a978fef",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXMKSEHAQSEDCWZMAOJEGX3P3JW6QY6H/"
},
{
"name": "GLSA-202209-14",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/202209-14"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2021-39272",
"datePublished": "2021-08-30T05:05:26",
"dateReserved": "2021-08-18T00:00:00",
"dateUpdated": "2024-08-04T02:06:41.615Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-36386 (GCVE-0-2021-36386)
Vulnerability from cvelistv5 – Published: 2021-07-29 13:59 – Updated: 2024-08-04 00:54
VLAI?
Summary
report_vbuild in report.c in Fetchmail before 6.4.20 sometimes omits initialization of the vsnprintf va_list argument, which might allow mail servers to cause a denial of service or possibly have unspecified other impact via long error messages. NOTE: it is unclear whether use of Fetchmail on any realistic platform results in an impact beyond an inconvenience to the client user.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T00:54:51.476Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.fetchmail.info/security.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2021/07/28/5"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.fetchmail.info/fetchmail-SA-2021-01.txt"
},
{
"name": "[oss-security] 20210809 fetchmail 6.4.21 released/regression fix for 6.4.20\u0027s security fix, and UPDATE: fetchmail \u003c= 6.4.19 security announcement 2021-01 (CVE-2021-36386)",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2021/08/09/1"
},
{
"name": "FEDORA-2021-47893f53ed",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OIXKO6QW3AUHGJVWKJXBCOVBYJUJRBFC/"
},
{
"name": "FEDORA-2021-b904d99ce5",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AGYO5AHSXTCKA4NQC2Z4H3XMMYNAGC77/"
},
{
"name": "GLSA-202209-14",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/202209-14"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "report_vbuild in report.c in Fetchmail before 6.4.20 sometimes omits initialization of the vsnprintf va_list argument, which might allow mail servers to cause a denial of service or possibly have unspecified other impact via long error messages. NOTE: it is unclear whether use of Fetchmail on any realistic platform results in an impact beyond an inconvenience to the client user."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-09-25T15:07:03",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.fetchmail.info/security.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.openwall.com/lists/oss-security/2021/07/28/5"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.fetchmail.info/fetchmail-SA-2021-01.txt"
},
{
"name": "[oss-security] 20210809 fetchmail 6.4.21 released/regression fix for 6.4.20\u0027s security fix, and UPDATE: fetchmail \u003c= 6.4.19 security announcement 2021-01 (CVE-2021-36386)",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2021/08/09/1"
},
{
"name": "FEDORA-2021-47893f53ed",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OIXKO6QW3AUHGJVWKJXBCOVBYJUJRBFC/"
},
{
"name": "FEDORA-2021-b904d99ce5",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AGYO5AHSXTCKA4NQC2Z4H3XMMYNAGC77/"
},
{
"name": "GLSA-202209-14",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "https://security.gentoo.org/glsa/202209-14"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-36386",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "report_vbuild in report.c in Fetchmail before 6.4.20 sometimes omits initialization of the vsnprintf va_list argument, which might allow mail servers to cause a denial of service or possibly have unspecified other impact via long error messages. NOTE: it is unclear whether use of Fetchmail on any realistic platform results in an impact beyond an inconvenience to the client user."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.fetchmail.info/security.html",
"refsource": "MISC",
"url": "https://www.fetchmail.info/security.html"
},
{
"name": "http://www.openwall.com/lists/oss-security/2021/07/28/5",
"refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2021/07/28/5"
},
{
"name": "https://www.fetchmail.info/fetchmail-SA-2021-01.txt",
"refsource": "CONFIRM",
"url": "https://www.fetchmail.info/fetchmail-SA-2021-01.txt"
},
{
"name": "[oss-security] 20210809 fetchmail 6.4.21 released/regression fix for 6.4.20\u0027s security fix, and UPDATE: fetchmail \u003c= 6.4.19 security announcement 2021-01 (CVE-2021-36386)",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2021/08/09/1"
},
{
"name": "FEDORA-2021-47893f53ed",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIXKO6QW3AUHGJVWKJXBCOVBYJUJRBFC/"
},
{
"name": "FEDORA-2021-b904d99ce5",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AGYO5AHSXTCKA4NQC2Z4H3XMMYNAGC77/"
},
{
"name": "GLSA-202209-14",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/202209-14"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2021-36386",
"datePublished": "2021-07-29T13:59:24",
"dateReserved": "2021-07-12T00:00:00",
"dateUpdated": "2024-08-04T00:54:51.476Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2012-3482 (GCVE-0-2012-3482)
Vulnerability from cvelistv5 – Published: 2012-12-21 02:00 – Updated: 2024-08-06 20:05
VLAI?
Summary
Fetchmail 5.0.8 through 6.3.21, when using NTLM authentication in debug mode, allows remote NTLM servers to (1) cause a denial of service (crash and delayed delivery of inbound mail) via a crafted NTLM response that triggers an out-of-bounds read in the base64 decoder, or (2) obtain sensitive information from memory via an NTLM Type 2 message with a crafted Target Name structure, which triggers an out-of-bounds read.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T20:05:12.577Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "[oss-security] 20120813 Re: CVE ID request for fetchmail segfault in NTLM protocol exchange",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://seclists.org/oss-sec/2012/q3/232"
},
{
"name": "[oss-security] 20120813 CVE ID request for fetchmail segfault in NTLM protocol exchange",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://seclists.org/oss-sec/2012/q3/230"
},
{
"name": "54987",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/54987"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail"
},
{
"name": "FEDORA-2012-14451",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-October/088871.html"
},
{
"name": "FEDORA-2012-14462",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-October/088836.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.fetchmail.info/fetchmail-SA-2012-02.txt"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2012-08-13T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Fetchmail 5.0.8 through 6.3.21, when using NTLM authentication in debug mode, allows remote NTLM servers to (1) cause a denial of service (crash and delayed delivery of inbound mail) via a crafted NTLM response that triggers an out-of-bounds read in the base64 decoder, or (2) obtain sensitive information from memory via an NTLM Type 2 message with a crafted Target Name structure, which triggers an out-of-bounds read."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2013-04-05T09:00:00",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "[oss-security] 20120813 Re: CVE ID request for fetchmail segfault in NTLM protocol exchange",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://seclists.org/oss-sec/2012/q3/232"
},
{
"name": "[oss-security] 20120813 CVE ID request for fetchmail segfault in NTLM protocol exchange",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://seclists.org/oss-sec/2012/q3/230"
},
{
"name": "54987",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/54987"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail"
},
{
"name": "FEDORA-2012-14451",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-October/088871.html"
},
{
"name": "FEDORA-2012-14462",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-October/088836.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.fetchmail.info/fetchmail-SA-2012-02.txt"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2012-3482",
"datePublished": "2012-12-21T02:00:00",
"dateReserved": "2012-06-14T00:00:00",
"dateUpdated": "2024-08-06T20:05:12.577Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2011-1947 (GCVE-0-2011-1947)
Vulnerability from cvelistv5 – Published: 2011-06-02 19:00 – Updated: 2024-08-06 22:46
VLAI?
Summary
fetchmail 5.9.9 through 6.3.19 does not properly limit the wait time after issuing a (1) STARTTLS or (2) STLS request, which allows remote servers to cause a denial of service (application hang) by acknowledging the request but not sending additional packets.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T22:46:00.839Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "[oss-security] 20110531 Re: CVE request for fetchmail STARTTLS hang (Denial of Service)",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://openwall.com/lists/oss-security/2011/05/31/17"
},
{
"name": "48043",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/48043"
},
{
"name": "FEDORA-2011-8011",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061672.html"
},
{
"name": "[oss-security] 20110531 Re: CVE request for fetchmail STARTTLS hang (Denial of Service)",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://openwall.com/lists/oss-security/2011/05/31/12"
},
{
"name": "[oss-security] 20110530 CVE request for fetchmail STARTTLS hang (Denial of Service)",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://openwall.com/lists/oss-security/2011/05/30/1"
},
{
"name": "20110606 fetchmail security announcement fetchmail-SA-2011-01 (CVE-2011-1947)",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/518251/100/0/threaded"
},
{
"name": "FEDORA-2011-8059",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061634.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://gitorious.org/fetchmail/fetchmail/blobs/legacy_63/fetchmail-SA-2011-01.txt"
},
{
"name": "1025605",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1025605"
},
{
"name": "MDVSA-2011:107",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:107"
},
{
"name": "FEDORA-2011-8021",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061735.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.fetchmail.info/fetchmail-SA-2011-01.txt"
},
{
"name": "[oss-security] 20110601 Re: CVE request for fetchmail STARTTLS hang (Denial of Service)",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://openwall.com/lists/oss-security/2011/06/01/2"
},
{
"name": "fetchmail-starttls-dos(67700)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67700"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-05-30T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "fetchmail 5.9.9 through 6.3.19 does not properly limit the wait time after issuing a (1) STARTTLS or (2) STLS request, which allows remote servers to cause a denial of service (application hang) by acknowledging the request but not sending additional packets."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-09T18:57:01",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "[oss-security] 20110531 Re: CVE request for fetchmail STARTTLS hang (Denial of Service)",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://openwall.com/lists/oss-security/2011/05/31/17"
},
{
"name": "48043",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/48043"
},
{
"name": "FEDORA-2011-8011",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061672.html"
},
{
"name": "[oss-security] 20110531 Re: CVE request for fetchmail STARTTLS hang (Denial of Service)",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://openwall.com/lists/oss-security/2011/05/31/12"
},
{
"name": "[oss-security] 20110530 CVE request for fetchmail STARTTLS hang (Denial of Service)",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://openwall.com/lists/oss-security/2011/05/30/1"
},
{
"name": "20110606 fetchmail security announcement fetchmail-SA-2011-01 (CVE-2011-1947)",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/518251/100/0/threaded"
},
{
"name": "FEDORA-2011-8059",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061634.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://gitorious.org/fetchmail/fetchmail/blobs/legacy_63/fetchmail-SA-2011-01.txt"
},
{
"name": "1025605",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1025605"
},
{
"name": "MDVSA-2011:107",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:107"
},
{
"name": "FEDORA-2011-8021",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061735.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.fetchmail.info/fetchmail-SA-2011-01.txt"
},
{
"name": "[oss-security] 20110601 Re: CVE request for fetchmail STARTTLS hang (Denial of Service)",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://openwall.com/lists/oss-security/2011/06/01/2"
},
{
"name": "fetchmail-starttls-dos(67700)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67700"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-1947",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "fetchmail 5.9.9 through 6.3.19 does not properly limit the wait time after issuing a (1) STARTTLS or (2) STLS request, which allows remote servers to cause a denial of service (application hang) by acknowledging the request but not sending additional packets."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20110531 Re: CVE request for fetchmail STARTTLS hang (Denial of Service)",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/05/31/17"
},
{
"name": "48043",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/48043"
},
{
"name": "FEDORA-2011-8011",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061672.html"
},
{
"name": "[oss-security] 20110531 Re: CVE request for fetchmail STARTTLS hang (Denial of Service)",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/05/31/12"
},
{
"name": "[oss-security] 20110530 CVE request for fetchmail STARTTLS hang (Denial of Service)",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/05/30/1"
},
{
"name": "20110606 fetchmail security announcement fetchmail-SA-2011-01 (CVE-2011-1947)",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/518251/100/0/threaded"
},
{
"name": "FEDORA-2011-8059",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061634.html"
},
{
"name": "http://gitorious.org/fetchmail/fetchmail/blobs/legacy_63/fetchmail-SA-2011-01.txt",
"refsource": "CONFIRM",
"url": "http://gitorious.org/fetchmail/fetchmail/blobs/legacy_63/fetchmail-SA-2011-01.txt"
},
{
"name": "1025605",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1025605"
},
{
"name": "MDVSA-2011:107",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:107"
},
{
"name": "FEDORA-2011-8021",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061735.html"
},
{
"name": "http://www.fetchmail.info/fetchmail-SA-2011-01.txt",
"refsource": "CONFIRM",
"url": "http://www.fetchmail.info/fetchmail-SA-2011-01.txt"
},
{
"name": "[oss-security] 20110601 Re: CVE request for fetchmail STARTTLS hang (Denial of Service)",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/06/01/2"
},
{
"name": "fetchmail-starttls-dos(67700)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67700"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2011-1947",
"datePublished": "2011-06-02T19:00:00",
"dateReserved": "2011-05-09T00:00:00",
"dateUpdated": "2024-08-06T22:46:00.839Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2010-1167 (GCVE-0-2010-1167)
Vulnerability from cvelistv5 – Published: 2010-05-07 17:43 – Updated: 2024-08-07 01:14
VLAI?
Summary
fetchmail 4.6.3 through 6.3.16, when debug mode is enabled, does not properly handle invalid characters in a multi-character locale, which allows remote attackers to cause a denial of service (memory consumption and application crash) via a crafted (1) message header or (2) POP3 UIDL list.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T01:14:06.646Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "39556",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/39556"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.fetchmail.info/fetchmail-SA-2010-02.txt"
},
{
"name": "20100506 fetchmail security announcement fetchmail-SA-2010-02 (CVE-2010-1167)",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/511140/100/0/threaded"
},
{
"name": "MDVSA-2011:107",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:107"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://developer.berlios.de/project/shownotes.php?group_id=1824\u0026release_id=17512"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2010-05-06T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "fetchmail 4.6.3 through 6.3.16, when debug mode is enabled, does not properly handle invalid characters in a multi-character locale, which allows remote attackers to cause a denial of service (memory consumption and application crash) via a crafted (1) message header or (2) POP3 UIDL list."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-10T18:57:01",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "39556",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/39556"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.fetchmail.info/fetchmail-SA-2010-02.txt"
},
{
"name": "20100506 fetchmail security announcement fetchmail-SA-2010-02 (CVE-2010-1167)",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/511140/100/0/threaded"
},
{
"name": "MDVSA-2011:107",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:107"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://developer.berlios.de/project/shownotes.php?group_id=1824\u0026release_id=17512"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2010-1167",
"datePublished": "2010-05-07T17:43:00",
"dateReserved": "2010-03-29T00:00:00",
"dateUpdated": "2024-08-07T01:14:06.646Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2010-0562 (GCVE-0-2010-0562)
Vulnerability from cvelistv5 – Published: 2010-02-08 21:00 – Updated: 2024-08-07 00:52
VLAI?
Summary
The sdump function in sdump.c in fetchmail 6.3.11, 6.3.12, and 6.3.13, when running in verbose mode on platforms for which char is signed, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an SSL X.509 certificate containing non-printable characters with the high bit set, which triggers a heap-based buffer overflow during escaping.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T00:52:19.355Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "MDVSA-2010:037",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:037"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.fetchmail.info/fetchmail-SA-2010-01.txt"
},
{
"name": "38088",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/38088"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://mknod.org/svn/fetchmail/branches/BRANCH_6-3/fetchmail-SA-2010-01.txt"
},
{
"name": "1023543",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1023543"
},
{
"name": "38391",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/38391"
},
{
"name": "62114",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/62114"
},
{
"name": "ADV-2010-0296",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2010/0296"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2010-02-04T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The sdump function in sdump.c in fetchmail 6.3.11, 6.3.12, and 6.3.13, when running in verbose mode on platforms for which char is signed, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an SSL X.509 certificate containing non-printable characters with the high bit set, which triggers a heap-based buffer overflow during escaping."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2010-02-24T10:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "MDVSA-2010:037",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:037"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.fetchmail.info/fetchmail-SA-2010-01.txt"
},
{
"name": "38088",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/38088"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://mknod.org/svn/fetchmail/branches/BRANCH_6-3/fetchmail-SA-2010-01.txt"
},
{
"name": "1023543",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1023543"
},
{
"name": "38391",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/38391"
},
{
"name": "62114",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/62114"
},
{
"name": "ADV-2010-0296",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2010/0296"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2010-0562",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The sdump function in sdump.c in fetchmail 6.3.11, 6.3.12, and 6.3.13, when running in verbose mode on platforms for which char is signed, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an SSL X.509 certificate containing non-printable characters with the high bit set, which triggers a heap-based buffer overflow during escaping."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "MDVSA-2010:037",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:037"
},
{
"name": "http://www.fetchmail.info/fetchmail-SA-2010-01.txt",
"refsource": "CONFIRM",
"url": "http://www.fetchmail.info/fetchmail-SA-2010-01.txt"
},
{
"name": "38088",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/38088"
},
{
"name": "http://mknod.org/svn/fetchmail/branches/BRANCH_6-3/fetchmail-SA-2010-01.txt",
"refsource": "CONFIRM",
"url": "http://mknod.org/svn/fetchmail/branches/BRANCH_6-3/fetchmail-SA-2010-01.txt"
},
{
"name": "1023543",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1023543"
},
{
"name": "38391",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/38391"
},
{
"name": "62114",
"refsource": "OSVDB",
"url": "http://osvdb.org/62114"
},
{
"name": "ADV-2010-0296",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/0296"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2010-0562",
"datePublished": "2010-02-08T21:00:00",
"dateReserved": "2010-02-08T00:00:00",
"dateUpdated": "2024-08-07T00:52:19.355Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2009-2666 (GCVE-0-2009-2666)
Vulnerability from cvelistv5 – Published: 2009-08-07 18:33 – Updated: 2024-08-07 05:59
VLAI?
Summary
socket.c in fetchmail before 6.3.11 does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T05:59:56.877Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "MDVSA-2009:201",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:201"
},
{
"name": "36175",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/36175"
},
{
"name": "36236",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/36236"
},
{
"name": "DSA-1852",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2009/dsa-1852"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://fetchmail.berlios.de/fetchmail-SA-2009-01.txt"
},
{
"name": "[oss-security] 20090805 Re: CVE request: fetchmail \u003c= 6.3.10 SSL certificate",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://marc.info/?l=oss-security\u0026m=124949601207156\u0026w=2"
},
{
"name": "20090806 fetchmail security announcement fetchmail-SA-2009-01 (CVE-2009-2666)",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/505530/100/0/threaded"
},
{
"name": "SSA:2009-218-01",
"tags": [
"vendor-advisory",
"x_refsource_SLACKWARE",
"x_transferred"
],
"url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.543463"
},
{
"name": "36179",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/36179"
},
{
"name": "1022679",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1022679"
},
{
"name": "56855",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/56855"
},
{
"name": "oval:org.mitre.oval:def:11059",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11059"
},
{
"name": "ADV-2009-3184",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2009/3184"
},
{
"name": "ADV-2009-2155",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2009/2155"
},
{
"name": "APPLE-SA-2009-11-09-1",
"tags": [
"vendor-advisory",
"x_refsource_APPLE",
"x_transferred"
],
"url": "http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.apple.com/kb/HT3937"
},
{
"name": "35951",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/35951"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2009-08-05T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "socket.c in fetchmail before 6.3.11 does not properly handle a \u0027\\0\u0027 character in a domain name in the subject\u0027s Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-10T18:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "MDVSA-2009:201",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:201"
},
{
"name": "36175",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/36175"
},
{
"name": "36236",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/36236"
},
{
"name": "DSA-1852",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2009/dsa-1852"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://fetchmail.berlios.de/fetchmail-SA-2009-01.txt"
},
{
"name": "[oss-security] 20090805 Re: CVE request: fetchmail \u003c= 6.3.10 SSL certificate",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://marc.info/?l=oss-security\u0026m=124949601207156\u0026w=2"
},
{
"name": "20090806 fetchmail security announcement fetchmail-SA-2009-01 (CVE-2009-2666)",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/505530/100/0/threaded"
},
{
"name": "SSA:2009-218-01",
"tags": [
"vendor-advisory",
"x_refsource_SLACKWARE"
],
"url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.543463"
},
{
"name": "36179",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/36179"
},
{
"name": "1022679",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1022679"
},
{
"name": "56855",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/56855"
},
{
"name": "oval:org.mitre.oval:def:11059",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11059"
},
{
"name": "ADV-2009-3184",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2009/3184"
},
{
"name": "ADV-2009-2155",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2009/2155"
},
{
"name": "APPLE-SA-2009-11-09-1",
"tags": [
"vendor-advisory",
"x_refsource_APPLE"
],
"url": "http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.apple.com/kb/HT3937"
},
{
"name": "35951",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/35951"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2009-2666",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "socket.c in fetchmail before 6.3.11 does not properly handle a \u0027\\0\u0027 character in a domain name in the subject\u0027s Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "MDVSA-2009:201",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:201"
},
{
"name": "36175",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/36175"
},
{
"name": "36236",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/36236"
},
{
"name": "DSA-1852",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2009/dsa-1852"
},
{
"name": "http://fetchmail.berlios.de/fetchmail-SA-2009-01.txt",
"refsource": "CONFIRM",
"url": "http://fetchmail.berlios.de/fetchmail-SA-2009-01.txt"
},
{
"name": "[oss-security] 20090805 Re: CVE request: fetchmail \u003c= 6.3.10 SSL certificate",
"refsource": "MLIST",
"url": "http://marc.info/?l=oss-security\u0026m=124949601207156\u0026w=2"
},
{
"name": "20090806 fetchmail security announcement fetchmail-SA-2009-01 (CVE-2009-2666)",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/505530/100/0/threaded"
},
{
"name": "SSA:2009-218-01",
"refsource": "SLACKWARE",
"url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.543463"
},
{
"name": "36179",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/36179"
},
{
"name": "1022679",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1022679"
},
{
"name": "56855",
"refsource": "OSVDB",
"url": "http://osvdb.org/56855"
},
{
"name": "oval:org.mitre.oval:def:11059",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11059"
},
{
"name": "ADV-2009-3184",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/3184"
},
{
"name": "ADV-2009-2155",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/2155"
},
{
"name": "APPLE-SA-2009-11-09-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html"
},
{
"name": "http://support.apple.com/kb/HT3937",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT3937"
},
{
"name": "35951",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/35951"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2009-2666",
"datePublished": "2009-08-07T18:33:00",
"dateReserved": "2009-08-05T00:00:00",
"dateUpdated": "2024-08-07T05:59:56.877Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2008-2711 (GCVE-0-2008-2711)
Vulnerability from cvelistv5 – Published: 2008-06-16 21:00 – Updated: 2024-08-07 09:14
VLAI?
Summary
fetchmail 6.3.8 and earlier, when running in -v -v (aka verbose) mode, allows remote attackers to cause a denial of service (crash and persistent mail failure) via a malformed mail message with long headers, which triggers an erroneous dereference when using vsnprintf to format log messages.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T09:14:14.639Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "ADV-2008-1860",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/1860/references"
},
{
"name": "31287",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31287"
},
{
"name": "20080729 rPSA-2008-0235-1 fetchmail fetchmailconf",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/494865/100/0/threaded"
},
{
"name": "1020298",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1020298"
},
{
"name": "33937",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/33937"
},
{
"name": "20080617 fetchmail security announcement fetchmail-SA-2008-01 (CVE-2008-2711)",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/493391/100/0/threaded"
},
{
"name": "31262",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31262"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0235"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.apple.com/kb/HT3438"
},
{
"name": "APPLE-SA-2009-02-12",
"tags": [
"vendor-advisory",
"x_refsource_APPLE",
"x_transferred"
],
"url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"
},
{
"name": "30895",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/30895"
},
{
"name": "FEDORA-2008-5800",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg01095.html"
},
{
"name": "FEDORA-2008-5789",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg01091.html"
},
{
"name": "SSA:2008-210-01",
"tags": [
"vendor-advisory",
"x_refsource_SLACKWARE",
"x_transferred"
],
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.495740"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.fetchmail.info/fetchmail-SA-2008-01.txt"
},
{
"name": "ADV-2009-0422",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2009/0422"
},
{
"name": "29705",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/29705"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://issues.rpath.com/browse/RPL-2623"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://bugzilla.novell.com/show_bug.cgi?id=354291"
},
{
"name": "MDVSA-2008:117",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:117"
},
{
"name": "fetchmail-logmessage-dos(43121)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43121"
},
{
"name": "[oss-security] 20080613 CVE Id Request: fetchmail \u003c= 6.3.8 DoS when logging long headers in -v -v mode",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2008/06/13/1"
},
{
"name": "oval:org.mitre.oval:def:10950",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10950"
},
{
"name": "30742",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/30742"
},
{
"name": "[oss-security] 20210809 fetchmail 6.4.21 released/regression fix for 6.4.20\u0027s security fix, and UPDATE: fetchmail \u003c= 6.4.19 security announcement 2021-01 (CVE-2021-36386)",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2021/08/09/1"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2008-06-13T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "fetchmail 6.3.8 and earlier, when running in -v -v (aka verbose) mode, allows remote attackers to cause a denial of service (crash and persistent mail failure) via a malformed mail message with long headers, which triggers an erroneous dereference when using vsnprintf to format log messages."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-08-09T20:06:29",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "ADV-2008-1860",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/1860/references"
},
{
"name": "31287",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31287"
},
{
"name": "20080729 rPSA-2008-0235-1 fetchmail fetchmailconf",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/494865/100/0/threaded"
},
{
"name": "1020298",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1020298"
},
{
"name": "33937",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/33937"
},
{
"name": "20080617 fetchmail security announcement fetchmail-SA-2008-01 (CVE-2008-2711)",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/493391/100/0/threaded"
},
{
"name": "31262",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31262"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0235"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.apple.com/kb/HT3438"
},
{
"name": "APPLE-SA-2009-02-12",
"tags": [
"vendor-advisory",
"x_refsource_APPLE"
],
"url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"
},
{
"name": "30895",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/30895"
},
{
"name": "FEDORA-2008-5800",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg01095.html"
},
{
"name": "FEDORA-2008-5789",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg01091.html"
},
{
"name": "SSA:2008-210-01",
"tags": [
"vendor-advisory",
"x_refsource_SLACKWARE"
],
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.495740"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.fetchmail.info/fetchmail-SA-2008-01.txt"
},
{
"name": "ADV-2009-0422",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2009/0422"
},
{
"name": "29705",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/29705"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://issues.rpath.com/browse/RPL-2623"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://bugzilla.novell.com/show_bug.cgi?id=354291"
},
{
"name": "MDVSA-2008:117",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:117"
},
{
"name": "fetchmail-logmessage-dos(43121)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43121"
},
{
"name": "[oss-security] 20080613 CVE Id Request: fetchmail \u003c= 6.3.8 DoS when logging long headers in -v -v mode",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2008/06/13/1"
},
{
"name": "oval:org.mitre.oval:def:10950",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10950"
},
{
"name": "30742",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/30742"
},
{
"name": "[oss-security] 20210809 fetchmail 6.4.21 released/regression fix for 6.4.20\u0027s security fix, and UPDATE: fetchmail \u003c= 6.4.19 security announcement 2021-01 (CVE-2021-36386)",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2021/08/09/1"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2008-2711",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "fetchmail 6.3.8 and earlier, when running in -v -v (aka verbose) mode, allows remote attackers to cause a denial of service (crash and persistent mail failure) via a malformed mail message with long headers, which triggers an erroneous dereference when using vsnprintf to format log messages."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "ADV-2008-1860",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/1860/references"
},
{
"name": "31287",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31287"
},
{
"name": "20080729 rPSA-2008-0235-1 fetchmail fetchmailconf",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/494865/100/0/threaded"
},
{
"name": "1020298",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1020298"
},
{
"name": "33937",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33937"
},
{
"name": "20080617 fetchmail security announcement fetchmail-SA-2008-01 (CVE-2008-2711)",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/493391/100/0/threaded"
},
{
"name": "31262",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31262"
},
{
"name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0235",
"refsource": "CONFIRM",
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0235"
},
{
"name": "http://support.apple.com/kb/HT3438",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT3438"
},
{
"name": "APPLE-SA-2009-02-12",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"
},
{
"name": "30895",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30895"
},
{
"name": "FEDORA-2008-5800",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg01095.html"
},
{
"name": "FEDORA-2008-5789",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg01091.html"
},
{
"name": "SSA:2008-210-01",
"refsource": "SLACKWARE",
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.495740"
},
{
"name": "http://www.fetchmail.info/fetchmail-SA-2008-01.txt",
"refsource": "CONFIRM",
"url": "http://www.fetchmail.info/fetchmail-SA-2008-01.txt"
},
{
"name": "ADV-2009-0422",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/0422"
},
{
"name": "29705",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/29705"
},
{
"name": "https://issues.rpath.com/browse/RPL-2623",
"refsource": "CONFIRM",
"url": "https://issues.rpath.com/browse/RPL-2623"
},
{
"name": "https://bugzilla.novell.com/show_bug.cgi?id=354291",
"refsource": "MISC",
"url": "https://bugzilla.novell.com/show_bug.cgi?id=354291"
},
{
"name": "MDVSA-2008:117",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:117"
},
{
"name": "fetchmail-logmessage-dos(43121)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43121"
},
{
"name": "[oss-security] 20080613 CVE Id Request: fetchmail \u003c= 6.3.8 DoS when logging long headers in -v -v mode",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2008/06/13/1"
},
{
"name": "oval:org.mitre.oval:def:10950",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10950"
},
{
"name": "30742",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30742"
},
{
"name": "[oss-security] 20210809 fetchmail 6.4.21 released/regression fix for 6.4.20\u0027s security fix, and UPDATE: fetchmail \u003c= 6.4.19 security announcement 2021-01 (CVE-2021-36386)",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2021/08/09/1"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2008-2711",
"datePublished": "2008-06-16T21:00:00",
"dateReserved": "2008-06-16T00:00:00",
"dateUpdated": "2024-08-07T09:14:14.639Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2007-4565 (GCVE-0-2007-4565)
Vulnerability from cvelistv5 – Published: 2007-08-28 01:00 – Updated: 2024-08-07 15:01
VLAI?
Summary
sink.c in fetchmail before 6.3.9 allows context-dependent attackers to cause a denial of service (NULL dereference and application crash) by refusing certain warning messages that are sent over SMTP.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T15:01:09.632Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "33937",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/33937"
},
{
"name": "3074",
"tags": [
"third-party-advisory",
"x_refsource_SREASON",
"x_transferred"
],
"url": "http://securityreason.com/securityalert/3074"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://fetchmail.berlios.de/fetchmail-SA-2007-02.txt"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://mknod.org/svn/fetchmail/branches/BRANCH_6-3/fetchmail-SA-2007-02.txt"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.apple.com/kb/HT3438"
},
{
"name": "1018627",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1018627"
},
{
"name": "APPLE-SA-2009-02-12",
"tags": [
"vendor-advisory",
"x_refsource_APPLE",
"x_transferred"
],
"url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"
},
{
"name": "20080617 fetchmail security announcement fetchmail-SA-2007-02 (CVE-2007-4565)",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/493388/100/0/threaded"
},
{
"name": "2007-0028",
"tags": [
"vendor-advisory",
"x_refsource_TRUSTIX",
"x_transferred"
],
"url": "http://www.trustix.org/errata/2007/0028/"
},
{
"name": "oval:org.mitre.oval:def:10528",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10528"
},
{
"name": "25495",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/25495"
},
{
"name": "ADV-2007-3032",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2007/3032"
},
{
"name": "ADV-2009-0422",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2009/0422"
},
{
"name": "20070907 FLEA-2007-0053-1 fetchmail",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/478798/100/0/threaded"
},
{
"name": "27399",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/27399"
},
{
"name": "fetchmail-warning-dos(36385)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36385"
},
{
"name": "DSA-1377",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2007/dsa-1377"
},
{
"name": "MDKSA-2007:179",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:179"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://issues.rpath.com/browse/RPL-1690"
},
{
"name": "USN-520-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/usn-520-1"
},
{
"name": "SUSE-SR:2007:022",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00008.html"
},
{
"name": "45833",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/45833"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2007-07-29T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "sink.c in fetchmail before 6.3.9 allows context-dependent attackers to cause a denial of service (NULL dereference and application crash) by refusing certain warning messages that are sent over SMTP."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-15T20:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "33937",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/33937"
},
{
"name": "3074",
"tags": [
"third-party-advisory",
"x_refsource_SREASON"
],
"url": "http://securityreason.com/securityalert/3074"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://fetchmail.berlios.de/fetchmail-SA-2007-02.txt"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://mknod.org/svn/fetchmail/branches/BRANCH_6-3/fetchmail-SA-2007-02.txt"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.apple.com/kb/HT3438"
},
{
"name": "1018627",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1018627"
},
{
"name": "APPLE-SA-2009-02-12",
"tags": [
"vendor-advisory",
"x_refsource_APPLE"
],
"url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"
},
{
"name": "20080617 fetchmail security announcement fetchmail-SA-2007-02 (CVE-2007-4565)",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/493388/100/0/threaded"
},
{
"name": "2007-0028",
"tags": [
"vendor-advisory",
"x_refsource_TRUSTIX"
],
"url": "http://www.trustix.org/errata/2007/0028/"
},
{
"name": "oval:org.mitre.oval:def:10528",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10528"
},
{
"name": "25495",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/25495"
},
{
"name": "ADV-2007-3032",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2007/3032"
},
{
"name": "ADV-2009-0422",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2009/0422"
},
{
"name": "20070907 FLEA-2007-0053-1 fetchmail",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/478798/100/0/threaded"
},
{
"name": "27399",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/27399"
},
{
"name": "fetchmail-warning-dos(36385)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36385"
},
{
"name": "DSA-1377",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2007/dsa-1377"
},
{
"name": "MDKSA-2007:179",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:179"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://issues.rpath.com/browse/RPL-1690"
},
{
"name": "USN-520-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/usn-520-1"
},
{
"name": "SUSE-SR:2007:022",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00008.html"
},
{
"name": "45833",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/45833"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2007-4565",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "sink.c in fetchmail before 6.3.9 allows context-dependent attackers to cause a denial of service (NULL dereference and application crash) by refusing certain warning messages that are sent over SMTP."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "33937",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33937"
},
{
"name": "3074",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/3074"
},
{
"name": "http://fetchmail.berlios.de/fetchmail-SA-2007-02.txt",
"refsource": "CONFIRM",
"url": "http://fetchmail.berlios.de/fetchmail-SA-2007-02.txt"
},
{
"name": "http://mknod.org/svn/fetchmail/branches/BRANCH_6-3/fetchmail-SA-2007-02.txt",
"refsource": "CONFIRM",
"url": "http://mknod.org/svn/fetchmail/branches/BRANCH_6-3/fetchmail-SA-2007-02.txt"
},
{
"name": "http://support.apple.com/kb/HT3438",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT3438"
},
{
"name": "1018627",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1018627"
},
{
"name": "APPLE-SA-2009-02-12",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"
},
{
"name": "20080617 fetchmail security announcement fetchmail-SA-2007-02 (CVE-2007-4565)",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/493388/100/0/threaded"
},
{
"name": "2007-0028",
"refsource": "TRUSTIX",
"url": "http://www.trustix.org/errata/2007/0028/"
},
{
"name": "oval:org.mitre.oval:def:10528",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10528"
},
{
"name": "25495",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/25495"
},
{
"name": "ADV-2007-3032",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3032"
},
{
"name": "ADV-2009-0422",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/0422"
},
{
"name": "20070907 FLEA-2007-0053-1 fetchmail",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/478798/100/0/threaded"
},
{
"name": "27399",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27399"
},
{
"name": "fetchmail-warning-dos(36385)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36385"
},
{
"name": "DSA-1377",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2007/dsa-1377"
},
{
"name": "MDKSA-2007:179",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:179"
},
{
"name": "https://issues.rpath.com/browse/RPL-1690",
"refsource": "CONFIRM",
"url": "https://issues.rpath.com/browse/RPL-1690"
},
{
"name": "USN-520-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-520-1"
},
{
"name": "SUSE-SR:2007:022",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00008.html"
},
{
"name": "45833",
"refsource": "OSVDB",
"url": "http://osvdb.org/45833"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2007-4565",
"datePublished": "2007-08-28T01:00:00",
"dateReserved": "2007-08-27T00:00:00",
"dateUpdated": "2024-08-07T15:01:09.632Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2006-5974 (GCVE-0-2006-5974)
Vulnerability from cvelistv5 – Published: 2007-01-09 00:00 – Updated: 2024-08-07 20:12
VLAI?
Summary
fetchmail 6.3.5 and 6.3.6 before 6.3.6-rc4, when refusing a message delivered via the mda option, allows remote attackers to cause a denial of service (crash) via unknown vectors that trigger a NULL pointer dereference when calling the (1) ferror or (2) fflush functions.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T20:12:31.425Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "1017479",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1017479"
},
{
"name": "SSA:2007-024-01",
"tags": [
"vendor-advisory",
"x_refsource_SLACKWARE",
"x_transferred"
],
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.517995"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://fetchmail.berlios.de/fetchmail-SA-2006-03.txt"
},
{
"name": "23838",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/23838"
},
{
"name": "24151",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/24151"
},
{
"name": "20070105 fetchmail security announcement 2006-03 (CVE-2006-5974)",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/456114/100/0/threaded"
},
{
"name": "23631",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/23631"
},
{
"name": "23804",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/23804"
},
{
"name": "ADV-2007-0088",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2007/0088"
},
{
"name": "SUSE-SR:2007:004",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://www.novell.com/linux/security/advisories/2007_4_sr.html"
},
{
"name": "FEDORA-2007-041",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://fedoranews.org/cms/node/2429"
},
{
"name": "23923",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/23923"
},
{
"name": "31836",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/31836"
},
{
"name": "OpenPKG-SA-2007.004",
"tags": [
"vendor-advisory",
"x_refsource_OPENPKG",
"x_transferred"
],
"url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.004.html"
},
{
"name": "2007-0007",
"tags": [
"vendor-advisory",
"x_refsource_TRUSTIX",
"x_transferred"
],
"url": "http://www.trustix.org/errata/2007/0007"
},
{
"name": "GLSA-200701-13",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "http://security.gentoo.org/glsa/glsa-200701-13.xml"
},
{
"name": "ADV-2007-0087",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2007/0087"
},
{
"name": "21902",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/21902"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2007-01-04T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "fetchmail 6.3.5 and 6.3.6 before 6.3.6-rc4, when refusing a message delivered via the mda option, allows remote attackers to cause a denial of service (crash) via unknown vectors that trigger a NULL pointer dereference when calling the (1) ferror or (2) fflush functions."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-17T20:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "1017479",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1017479"
},
{
"name": "SSA:2007-024-01",
"tags": [
"vendor-advisory",
"x_refsource_SLACKWARE"
],
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.517995"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://fetchmail.berlios.de/fetchmail-SA-2006-03.txt"
},
{
"name": "23838",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/23838"
},
{
"name": "24151",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/24151"
},
{
"name": "20070105 fetchmail security announcement 2006-03 (CVE-2006-5974)",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/456114/100/0/threaded"
},
{
"name": "23631",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/23631"
},
{
"name": "23804",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/23804"
},
{
"name": "ADV-2007-0088",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2007/0088"
},
{
"name": "SUSE-SR:2007:004",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://www.novell.com/linux/security/advisories/2007_4_sr.html"
},
{
"name": "FEDORA-2007-041",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://fedoranews.org/cms/node/2429"
},
{
"name": "23923",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/23923"
},
{
"name": "31836",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/31836"
},
{
"name": "OpenPKG-SA-2007.004",
"tags": [
"vendor-advisory",
"x_refsource_OPENPKG"
],
"url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.004.html"
},
{
"name": "2007-0007",
"tags": [
"vendor-advisory",
"x_refsource_TRUSTIX"
],
"url": "http://www.trustix.org/errata/2007/0007"
},
{
"name": "GLSA-200701-13",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "http://security.gentoo.org/glsa/glsa-200701-13.xml"
},
{
"name": "ADV-2007-0087",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2007/0087"
},
{
"name": "21902",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/21902"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-5974",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "fetchmail 6.3.5 and 6.3.6 before 6.3.6-rc4, when refusing a message delivered via the mda option, allows remote attackers to cause a denial of service (crash) via unknown vectors that trigger a NULL pointer dereference when calling the (1) ferror or (2) fflush functions."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "1017479",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1017479"
},
{
"name": "SSA:2007-024-01",
"refsource": "SLACKWARE",
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.517995"
},
{
"name": "http://fetchmail.berlios.de/fetchmail-SA-2006-03.txt",
"refsource": "CONFIRM",
"url": "http://fetchmail.berlios.de/fetchmail-SA-2006-03.txt"
},
{
"name": "23838",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23838"
},
{
"name": "24151",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24151"
},
{
"name": "20070105 fetchmail security announcement 2006-03 (CVE-2006-5974)",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/456114/100/0/threaded"
},
{
"name": "23631",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23631"
},
{
"name": "23804",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23804"
},
{
"name": "ADV-2007-0088",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0088"
},
{
"name": "SUSE-SR:2007:004",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2007_4_sr.html"
},
{
"name": "FEDORA-2007-041",
"refsource": "FEDORA",
"url": "http://fedoranews.org/cms/node/2429"
},
{
"name": "23923",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23923"
},
{
"name": "31836",
"refsource": "OSVDB",
"url": "http://osvdb.org/31836"
},
{
"name": "OpenPKG-SA-2007.004",
"refsource": "OPENPKG",
"url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.004.html"
},
{
"name": "2007-0007",
"refsource": "TRUSTIX",
"url": "http://www.trustix.org/errata/2007/0007"
},
{
"name": "GLSA-200701-13",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200701-13.xml"
},
{
"name": "ADV-2007-0087",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0087"
},
{
"name": "21902",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/21902"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2006-5974",
"datePublished": "2007-01-09T00:00:00",
"dateReserved": "2006-11-20T00:00:00",
"dateUpdated": "2024-08-07T20:12:31.425Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-61962 (GCVE-0-2025-61962)
Vulnerability from nvd – Published: 2025-10-04 00:00 – Updated: 2025-11-04 21:14
VLAI?
Summary
In fetchmail before 6.5.6, the SMTP client can crash when authenticating upon receiving a 334 status code in a malformed context.
Severity ?
5.9 (Medium)
CWE
- CWE-142 - Improper Neutralization of Value Delimiters
Assigner
References
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-61962",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-10-06T14:20:46.927097Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-10-06T14:20:57.032Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2025-11-04T21:14:11.806Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2025/10/04/3"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "fetchmail",
"vendor": "fetchmail",
"versions": [
{
"lessThan": "6.5.6",
"status": "affected",
"version": "5.9.9",
"versionType": "semver"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.5.6",
"versionStartIncluding": "5.9.9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In fetchmail before 6.5.6, the SMTP client can crash when authenticating upon receiving a 334 status code in a malformed context."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-142",
"description": "CWE-142 Improper Neutralization of Value Delimiters",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-10-04T02:51:57.449Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://www.openwall.com/lists/oss-security/2025/10/03/2"
},
{
"url": "https://www.fetchmail.info/fetchmail-SA-2025-01.txt"
},
{
"url": "https://gitlab.com/fetchmail/fetchmail/-/commit/4c3cebfa4e659fb778ca2cae0ccb3f69201609a8"
}
],
"source": {
"discovery": "INTERNAL"
},
"x_generator": {
"engine": "enrichogram 0.0.1"
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2025-61962",
"datePublished": "2025-10-04T00:00:00.000Z",
"dateReserved": "2025-10-04T00:00:00.000Z",
"dateUpdated": "2025-11-04T21:14:11.806Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2021-39272 (GCVE-0-2021-39272)
Vulnerability from nvd – Published: 2021-08-30 05:05 – Updated: 2024-08-04 02:06
VLAI?
Summary
Fetchmail before 6.4.22 fails to enforce STARTTLS session encryption in some circumstances, such as a certain situation with IMAP and PREAUTH.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T02:06:41.615Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.fetchmail.info/security.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://nostarttls.secvuln.info/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2021/08/27/3"
},
{
"name": "FEDORA-2021-ddefbdbb46",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3XJ6XLEJCEZCAM5LGGD6XBCC522QLG4/"
},
{
"name": "FEDORA-2021-9998719311",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZYCYLL73NP7ALJWSDICIVSA47ZIXWSSA/"
},
{
"name": "FEDORA-2021-e61a978fef",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VXMKSEHAQSEDCWZMAOJEGX3P3JW6QY6H/"
},
{
"name": "GLSA-202209-14",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/202209-14"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Fetchmail before 6.4.22 fails to enforce STARTTLS session encryption in some circumstances, such as a certain situation with IMAP and PREAUTH."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-09-25T15:07:04",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.fetchmail.info/security.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://nostarttls.secvuln.info/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.openwall.com/lists/oss-security/2021/08/27/3"
},
{
"name": "FEDORA-2021-ddefbdbb46",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3XJ6XLEJCEZCAM5LGGD6XBCC522QLG4/"
},
{
"name": "FEDORA-2021-9998719311",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZYCYLL73NP7ALJWSDICIVSA47ZIXWSSA/"
},
{
"name": "FEDORA-2021-e61a978fef",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VXMKSEHAQSEDCWZMAOJEGX3P3JW6QY6H/"
},
{
"name": "GLSA-202209-14",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "https://security.gentoo.org/glsa/202209-14"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-39272",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Fetchmail before 6.4.22 fails to enforce STARTTLS session encryption in some circumstances, such as a certain situation with IMAP and PREAUTH."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.fetchmail.info/security.html",
"refsource": "MISC",
"url": "https://www.fetchmail.info/security.html"
},
{
"name": "https://nostarttls.secvuln.info/",
"refsource": "MISC",
"url": "https://nostarttls.secvuln.info/"
},
{
"name": "http://www.openwall.com/lists/oss-security/2021/08/27/3",
"refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2021/08/27/3"
},
{
"name": "FEDORA-2021-ddefbdbb46",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L3XJ6XLEJCEZCAM5LGGD6XBCC522QLG4/"
},
{
"name": "FEDORA-2021-9998719311",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZYCYLL73NP7ALJWSDICIVSA47ZIXWSSA/"
},
{
"name": "FEDORA-2021-e61a978fef",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXMKSEHAQSEDCWZMAOJEGX3P3JW6QY6H/"
},
{
"name": "GLSA-202209-14",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/202209-14"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2021-39272",
"datePublished": "2021-08-30T05:05:26",
"dateReserved": "2021-08-18T00:00:00",
"dateUpdated": "2024-08-04T02:06:41.615Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-36386 (GCVE-0-2021-36386)
Vulnerability from nvd – Published: 2021-07-29 13:59 – Updated: 2024-08-04 00:54
VLAI?
Summary
report_vbuild in report.c in Fetchmail before 6.4.20 sometimes omits initialization of the vsnprintf va_list argument, which might allow mail servers to cause a denial of service or possibly have unspecified other impact via long error messages. NOTE: it is unclear whether use of Fetchmail on any realistic platform results in an impact beyond an inconvenience to the client user.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T00:54:51.476Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.fetchmail.info/security.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2021/07/28/5"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.fetchmail.info/fetchmail-SA-2021-01.txt"
},
{
"name": "[oss-security] 20210809 fetchmail 6.4.21 released/regression fix for 6.4.20\u0027s security fix, and UPDATE: fetchmail \u003c= 6.4.19 security announcement 2021-01 (CVE-2021-36386)",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2021/08/09/1"
},
{
"name": "FEDORA-2021-47893f53ed",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OIXKO6QW3AUHGJVWKJXBCOVBYJUJRBFC/"
},
{
"name": "FEDORA-2021-b904d99ce5",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AGYO5AHSXTCKA4NQC2Z4H3XMMYNAGC77/"
},
{
"name": "GLSA-202209-14",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/202209-14"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "report_vbuild in report.c in Fetchmail before 6.4.20 sometimes omits initialization of the vsnprintf va_list argument, which might allow mail servers to cause a denial of service or possibly have unspecified other impact via long error messages. NOTE: it is unclear whether use of Fetchmail on any realistic platform results in an impact beyond an inconvenience to the client user."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-09-25T15:07:03",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.fetchmail.info/security.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.openwall.com/lists/oss-security/2021/07/28/5"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.fetchmail.info/fetchmail-SA-2021-01.txt"
},
{
"name": "[oss-security] 20210809 fetchmail 6.4.21 released/regression fix for 6.4.20\u0027s security fix, and UPDATE: fetchmail \u003c= 6.4.19 security announcement 2021-01 (CVE-2021-36386)",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2021/08/09/1"
},
{
"name": "FEDORA-2021-47893f53ed",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OIXKO6QW3AUHGJVWKJXBCOVBYJUJRBFC/"
},
{
"name": "FEDORA-2021-b904d99ce5",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AGYO5AHSXTCKA4NQC2Z4H3XMMYNAGC77/"
},
{
"name": "GLSA-202209-14",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "https://security.gentoo.org/glsa/202209-14"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-36386",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "report_vbuild in report.c in Fetchmail before 6.4.20 sometimes omits initialization of the vsnprintf va_list argument, which might allow mail servers to cause a denial of service or possibly have unspecified other impact via long error messages. NOTE: it is unclear whether use of Fetchmail on any realistic platform results in an impact beyond an inconvenience to the client user."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.fetchmail.info/security.html",
"refsource": "MISC",
"url": "https://www.fetchmail.info/security.html"
},
{
"name": "http://www.openwall.com/lists/oss-security/2021/07/28/5",
"refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2021/07/28/5"
},
{
"name": "https://www.fetchmail.info/fetchmail-SA-2021-01.txt",
"refsource": "CONFIRM",
"url": "https://www.fetchmail.info/fetchmail-SA-2021-01.txt"
},
{
"name": "[oss-security] 20210809 fetchmail 6.4.21 released/regression fix for 6.4.20\u0027s security fix, and UPDATE: fetchmail \u003c= 6.4.19 security announcement 2021-01 (CVE-2021-36386)",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2021/08/09/1"
},
{
"name": "FEDORA-2021-47893f53ed",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIXKO6QW3AUHGJVWKJXBCOVBYJUJRBFC/"
},
{
"name": "FEDORA-2021-b904d99ce5",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AGYO5AHSXTCKA4NQC2Z4H3XMMYNAGC77/"
},
{
"name": "GLSA-202209-14",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/202209-14"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2021-36386",
"datePublished": "2021-07-29T13:59:24",
"dateReserved": "2021-07-12T00:00:00",
"dateUpdated": "2024-08-04T00:54:51.476Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2012-3482 (GCVE-0-2012-3482)
Vulnerability from nvd – Published: 2012-12-21 02:00 – Updated: 2024-08-06 20:05
VLAI?
Summary
Fetchmail 5.0.8 through 6.3.21, when using NTLM authentication in debug mode, allows remote NTLM servers to (1) cause a denial of service (crash and delayed delivery of inbound mail) via a crafted NTLM response that triggers an out-of-bounds read in the base64 decoder, or (2) obtain sensitive information from memory via an NTLM Type 2 message with a crafted Target Name structure, which triggers an out-of-bounds read.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T20:05:12.577Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "[oss-security] 20120813 Re: CVE ID request for fetchmail segfault in NTLM protocol exchange",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://seclists.org/oss-sec/2012/q3/232"
},
{
"name": "[oss-security] 20120813 CVE ID request for fetchmail segfault in NTLM protocol exchange",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://seclists.org/oss-sec/2012/q3/230"
},
{
"name": "54987",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/54987"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail"
},
{
"name": "FEDORA-2012-14451",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-October/088871.html"
},
{
"name": "FEDORA-2012-14462",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-October/088836.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.fetchmail.info/fetchmail-SA-2012-02.txt"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2012-08-13T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Fetchmail 5.0.8 through 6.3.21, when using NTLM authentication in debug mode, allows remote NTLM servers to (1) cause a denial of service (crash and delayed delivery of inbound mail) via a crafted NTLM response that triggers an out-of-bounds read in the base64 decoder, or (2) obtain sensitive information from memory via an NTLM Type 2 message with a crafted Target Name structure, which triggers an out-of-bounds read."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2013-04-05T09:00:00",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "[oss-security] 20120813 Re: CVE ID request for fetchmail segfault in NTLM protocol exchange",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://seclists.org/oss-sec/2012/q3/232"
},
{
"name": "[oss-security] 20120813 CVE ID request for fetchmail segfault in NTLM protocol exchange",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://seclists.org/oss-sec/2012/q3/230"
},
{
"name": "54987",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/54987"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail"
},
{
"name": "FEDORA-2012-14451",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-October/088871.html"
},
{
"name": "FEDORA-2012-14462",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-October/088836.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.fetchmail.info/fetchmail-SA-2012-02.txt"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2012-3482",
"datePublished": "2012-12-21T02:00:00",
"dateReserved": "2012-06-14T00:00:00",
"dateUpdated": "2024-08-06T20:05:12.577Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2011-1947 (GCVE-0-2011-1947)
Vulnerability from nvd – Published: 2011-06-02 19:00 – Updated: 2024-08-06 22:46
VLAI?
Summary
fetchmail 5.9.9 through 6.3.19 does not properly limit the wait time after issuing a (1) STARTTLS or (2) STLS request, which allows remote servers to cause a denial of service (application hang) by acknowledging the request but not sending additional packets.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T22:46:00.839Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "[oss-security] 20110531 Re: CVE request for fetchmail STARTTLS hang (Denial of Service)",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://openwall.com/lists/oss-security/2011/05/31/17"
},
{
"name": "48043",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/48043"
},
{
"name": "FEDORA-2011-8011",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061672.html"
},
{
"name": "[oss-security] 20110531 Re: CVE request for fetchmail STARTTLS hang (Denial of Service)",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://openwall.com/lists/oss-security/2011/05/31/12"
},
{
"name": "[oss-security] 20110530 CVE request for fetchmail STARTTLS hang (Denial of Service)",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://openwall.com/lists/oss-security/2011/05/30/1"
},
{
"name": "20110606 fetchmail security announcement fetchmail-SA-2011-01 (CVE-2011-1947)",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/518251/100/0/threaded"
},
{
"name": "FEDORA-2011-8059",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061634.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://gitorious.org/fetchmail/fetchmail/blobs/legacy_63/fetchmail-SA-2011-01.txt"
},
{
"name": "1025605",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1025605"
},
{
"name": "MDVSA-2011:107",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:107"
},
{
"name": "FEDORA-2011-8021",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061735.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.fetchmail.info/fetchmail-SA-2011-01.txt"
},
{
"name": "[oss-security] 20110601 Re: CVE request for fetchmail STARTTLS hang (Denial of Service)",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://openwall.com/lists/oss-security/2011/06/01/2"
},
{
"name": "fetchmail-starttls-dos(67700)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67700"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-05-30T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "fetchmail 5.9.9 through 6.3.19 does not properly limit the wait time after issuing a (1) STARTTLS or (2) STLS request, which allows remote servers to cause a denial of service (application hang) by acknowledging the request but not sending additional packets."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-09T18:57:01",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "[oss-security] 20110531 Re: CVE request for fetchmail STARTTLS hang (Denial of Service)",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://openwall.com/lists/oss-security/2011/05/31/17"
},
{
"name": "48043",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/48043"
},
{
"name": "FEDORA-2011-8011",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061672.html"
},
{
"name": "[oss-security] 20110531 Re: CVE request for fetchmail STARTTLS hang (Denial of Service)",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://openwall.com/lists/oss-security/2011/05/31/12"
},
{
"name": "[oss-security] 20110530 CVE request for fetchmail STARTTLS hang (Denial of Service)",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://openwall.com/lists/oss-security/2011/05/30/1"
},
{
"name": "20110606 fetchmail security announcement fetchmail-SA-2011-01 (CVE-2011-1947)",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/518251/100/0/threaded"
},
{
"name": "FEDORA-2011-8059",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061634.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://gitorious.org/fetchmail/fetchmail/blobs/legacy_63/fetchmail-SA-2011-01.txt"
},
{
"name": "1025605",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1025605"
},
{
"name": "MDVSA-2011:107",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:107"
},
{
"name": "FEDORA-2011-8021",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061735.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.fetchmail.info/fetchmail-SA-2011-01.txt"
},
{
"name": "[oss-security] 20110601 Re: CVE request for fetchmail STARTTLS hang (Denial of Service)",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://openwall.com/lists/oss-security/2011/06/01/2"
},
{
"name": "fetchmail-starttls-dos(67700)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67700"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-1947",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "fetchmail 5.9.9 through 6.3.19 does not properly limit the wait time after issuing a (1) STARTTLS or (2) STLS request, which allows remote servers to cause a denial of service (application hang) by acknowledging the request but not sending additional packets."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20110531 Re: CVE request for fetchmail STARTTLS hang (Denial of Service)",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/05/31/17"
},
{
"name": "48043",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/48043"
},
{
"name": "FEDORA-2011-8011",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061672.html"
},
{
"name": "[oss-security] 20110531 Re: CVE request for fetchmail STARTTLS hang (Denial of Service)",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/05/31/12"
},
{
"name": "[oss-security] 20110530 CVE request for fetchmail STARTTLS hang (Denial of Service)",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/05/30/1"
},
{
"name": "20110606 fetchmail security announcement fetchmail-SA-2011-01 (CVE-2011-1947)",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/518251/100/0/threaded"
},
{
"name": "FEDORA-2011-8059",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061634.html"
},
{
"name": "http://gitorious.org/fetchmail/fetchmail/blobs/legacy_63/fetchmail-SA-2011-01.txt",
"refsource": "CONFIRM",
"url": "http://gitorious.org/fetchmail/fetchmail/blobs/legacy_63/fetchmail-SA-2011-01.txt"
},
{
"name": "1025605",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1025605"
},
{
"name": "MDVSA-2011:107",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:107"
},
{
"name": "FEDORA-2011-8021",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061735.html"
},
{
"name": "http://www.fetchmail.info/fetchmail-SA-2011-01.txt",
"refsource": "CONFIRM",
"url": "http://www.fetchmail.info/fetchmail-SA-2011-01.txt"
},
{
"name": "[oss-security] 20110601 Re: CVE request for fetchmail STARTTLS hang (Denial of Service)",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/06/01/2"
},
{
"name": "fetchmail-starttls-dos(67700)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67700"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2011-1947",
"datePublished": "2011-06-02T19:00:00",
"dateReserved": "2011-05-09T00:00:00",
"dateUpdated": "2024-08-06T22:46:00.839Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2010-1167 (GCVE-0-2010-1167)
Vulnerability from nvd – Published: 2010-05-07 17:43 – Updated: 2024-08-07 01:14
VLAI?
Summary
fetchmail 4.6.3 through 6.3.16, when debug mode is enabled, does not properly handle invalid characters in a multi-character locale, which allows remote attackers to cause a denial of service (memory consumption and application crash) via a crafted (1) message header or (2) POP3 UIDL list.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T01:14:06.646Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "39556",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/39556"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.fetchmail.info/fetchmail-SA-2010-02.txt"
},
{
"name": "20100506 fetchmail security announcement fetchmail-SA-2010-02 (CVE-2010-1167)",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/511140/100/0/threaded"
},
{
"name": "MDVSA-2011:107",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:107"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://developer.berlios.de/project/shownotes.php?group_id=1824\u0026release_id=17512"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2010-05-06T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "fetchmail 4.6.3 through 6.3.16, when debug mode is enabled, does not properly handle invalid characters in a multi-character locale, which allows remote attackers to cause a denial of service (memory consumption and application crash) via a crafted (1) message header or (2) POP3 UIDL list."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-10T18:57:01",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "39556",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/39556"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.fetchmail.info/fetchmail-SA-2010-02.txt"
},
{
"name": "20100506 fetchmail security announcement fetchmail-SA-2010-02 (CVE-2010-1167)",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/511140/100/0/threaded"
},
{
"name": "MDVSA-2011:107",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:107"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://developer.berlios.de/project/shownotes.php?group_id=1824\u0026release_id=17512"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2010-1167",
"datePublished": "2010-05-07T17:43:00",
"dateReserved": "2010-03-29T00:00:00",
"dateUpdated": "2024-08-07T01:14:06.646Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2010-0562 (GCVE-0-2010-0562)
Vulnerability from nvd – Published: 2010-02-08 21:00 – Updated: 2024-08-07 00:52
VLAI?
Summary
The sdump function in sdump.c in fetchmail 6.3.11, 6.3.12, and 6.3.13, when running in verbose mode on platforms for which char is signed, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an SSL X.509 certificate containing non-printable characters with the high bit set, which triggers a heap-based buffer overflow during escaping.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T00:52:19.355Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "MDVSA-2010:037",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:037"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.fetchmail.info/fetchmail-SA-2010-01.txt"
},
{
"name": "38088",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/38088"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://mknod.org/svn/fetchmail/branches/BRANCH_6-3/fetchmail-SA-2010-01.txt"
},
{
"name": "1023543",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1023543"
},
{
"name": "38391",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/38391"
},
{
"name": "62114",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/62114"
},
{
"name": "ADV-2010-0296",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2010/0296"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2010-02-04T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The sdump function in sdump.c in fetchmail 6.3.11, 6.3.12, and 6.3.13, when running in verbose mode on platforms for which char is signed, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an SSL X.509 certificate containing non-printable characters with the high bit set, which triggers a heap-based buffer overflow during escaping."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2010-02-24T10:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "MDVSA-2010:037",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:037"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.fetchmail.info/fetchmail-SA-2010-01.txt"
},
{
"name": "38088",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/38088"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://mknod.org/svn/fetchmail/branches/BRANCH_6-3/fetchmail-SA-2010-01.txt"
},
{
"name": "1023543",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1023543"
},
{
"name": "38391",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/38391"
},
{
"name": "62114",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/62114"
},
{
"name": "ADV-2010-0296",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2010/0296"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2010-0562",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The sdump function in sdump.c in fetchmail 6.3.11, 6.3.12, and 6.3.13, when running in verbose mode on platforms for which char is signed, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an SSL X.509 certificate containing non-printable characters with the high bit set, which triggers a heap-based buffer overflow during escaping."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "MDVSA-2010:037",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:037"
},
{
"name": "http://www.fetchmail.info/fetchmail-SA-2010-01.txt",
"refsource": "CONFIRM",
"url": "http://www.fetchmail.info/fetchmail-SA-2010-01.txt"
},
{
"name": "38088",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/38088"
},
{
"name": "http://mknod.org/svn/fetchmail/branches/BRANCH_6-3/fetchmail-SA-2010-01.txt",
"refsource": "CONFIRM",
"url": "http://mknod.org/svn/fetchmail/branches/BRANCH_6-3/fetchmail-SA-2010-01.txt"
},
{
"name": "1023543",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1023543"
},
{
"name": "38391",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/38391"
},
{
"name": "62114",
"refsource": "OSVDB",
"url": "http://osvdb.org/62114"
},
{
"name": "ADV-2010-0296",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/0296"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2010-0562",
"datePublished": "2010-02-08T21:00:00",
"dateReserved": "2010-02-08T00:00:00",
"dateUpdated": "2024-08-07T00:52:19.355Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2009-2666 (GCVE-0-2009-2666)
Vulnerability from nvd – Published: 2009-08-07 18:33 – Updated: 2024-08-07 05:59
VLAI?
Summary
socket.c in fetchmail before 6.3.11 does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T05:59:56.877Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "MDVSA-2009:201",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:201"
},
{
"name": "36175",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/36175"
},
{
"name": "36236",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/36236"
},
{
"name": "DSA-1852",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2009/dsa-1852"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://fetchmail.berlios.de/fetchmail-SA-2009-01.txt"
},
{
"name": "[oss-security] 20090805 Re: CVE request: fetchmail \u003c= 6.3.10 SSL certificate",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://marc.info/?l=oss-security\u0026m=124949601207156\u0026w=2"
},
{
"name": "20090806 fetchmail security announcement fetchmail-SA-2009-01 (CVE-2009-2666)",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/505530/100/0/threaded"
},
{
"name": "SSA:2009-218-01",
"tags": [
"vendor-advisory",
"x_refsource_SLACKWARE",
"x_transferred"
],
"url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.543463"
},
{
"name": "36179",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/36179"
},
{
"name": "1022679",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1022679"
},
{
"name": "56855",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/56855"
},
{
"name": "oval:org.mitre.oval:def:11059",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11059"
},
{
"name": "ADV-2009-3184",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2009/3184"
},
{
"name": "ADV-2009-2155",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2009/2155"
},
{
"name": "APPLE-SA-2009-11-09-1",
"tags": [
"vendor-advisory",
"x_refsource_APPLE",
"x_transferred"
],
"url": "http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.apple.com/kb/HT3937"
},
{
"name": "35951",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/35951"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2009-08-05T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "socket.c in fetchmail before 6.3.11 does not properly handle a \u0027\\0\u0027 character in a domain name in the subject\u0027s Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-10T18:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "MDVSA-2009:201",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:201"
},
{
"name": "36175",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/36175"
},
{
"name": "36236",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/36236"
},
{
"name": "DSA-1852",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2009/dsa-1852"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://fetchmail.berlios.de/fetchmail-SA-2009-01.txt"
},
{
"name": "[oss-security] 20090805 Re: CVE request: fetchmail \u003c= 6.3.10 SSL certificate",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://marc.info/?l=oss-security\u0026m=124949601207156\u0026w=2"
},
{
"name": "20090806 fetchmail security announcement fetchmail-SA-2009-01 (CVE-2009-2666)",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/505530/100/0/threaded"
},
{
"name": "SSA:2009-218-01",
"tags": [
"vendor-advisory",
"x_refsource_SLACKWARE"
],
"url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.543463"
},
{
"name": "36179",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/36179"
},
{
"name": "1022679",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1022679"
},
{
"name": "56855",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/56855"
},
{
"name": "oval:org.mitre.oval:def:11059",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11059"
},
{
"name": "ADV-2009-3184",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2009/3184"
},
{
"name": "ADV-2009-2155",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2009/2155"
},
{
"name": "APPLE-SA-2009-11-09-1",
"tags": [
"vendor-advisory",
"x_refsource_APPLE"
],
"url": "http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.apple.com/kb/HT3937"
},
{
"name": "35951",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/35951"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2009-2666",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "socket.c in fetchmail before 6.3.11 does not properly handle a \u0027\\0\u0027 character in a domain name in the subject\u0027s Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "MDVSA-2009:201",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:201"
},
{
"name": "36175",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/36175"
},
{
"name": "36236",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/36236"
},
{
"name": "DSA-1852",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2009/dsa-1852"
},
{
"name": "http://fetchmail.berlios.de/fetchmail-SA-2009-01.txt",
"refsource": "CONFIRM",
"url": "http://fetchmail.berlios.de/fetchmail-SA-2009-01.txt"
},
{
"name": "[oss-security] 20090805 Re: CVE request: fetchmail \u003c= 6.3.10 SSL certificate",
"refsource": "MLIST",
"url": "http://marc.info/?l=oss-security\u0026m=124949601207156\u0026w=2"
},
{
"name": "20090806 fetchmail security announcement fetchmail-SA-2009-01 (CVE-2009-2666)",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/505530/100/0/threaded"
},
{
"name": "SSA:2009-218-01",
"refsource": "SLACKWARE",
"url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.543463"
},
{
"name": "36179",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/36179"
},
{
"name": "1022679",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1022679"
},
{
"name": "56855",
"refsource": "OSVDB",
"url": "http://osvdb.org/56855"
},
{
"name": "oval:org.mitre.oval:def:11059",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11059"
},
{
"name": "ADV-2009-3184",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/3184"
},
{
"name": "ADV-2009-2155",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/2155"
},
{
"name": "APPLE-SA-2009-11-09-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html"
},
{
"name": "http://support.apple.com/kb/HT3937",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT3937"
},
{
"name": "35951",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/35951"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2009-2666",
"datePublished": "2009-08-07T18:33:00",
"dateReserved": "2009-08-05T00:00:00",
"dateUpdated": "2024-08-07T05:59:56.877Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2008-2711 (GCVE-0-2008-2711)
Vulnerability from nvd – Published: 2008-06-16 21:00 – Updated: 2024-08-07 09:14
VLAI?
Summary
fetchmail 6.3.8 and earlier, when running in -v -v (aka verbose) mode, allows remote attackers to cause a denial of service (crash and persistent mail failure) via a malformed mail message with long headers, which triggers an erroneous dereference when using vsnprintf to format log messages.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T09:14:14.639Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "ADV-2008-1860",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/1860/references"
},
{
"name": "31287",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31287"
},
{
"name": "20080729 rPSA-2008-0235-1 fetchmail fetchmailconf",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/494865/100/0/threaded"
},
{
"name": "1020298",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1020298"
},
{
"name": "33937",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/33937"
},
{
"name": "20080617 fetchmail security announcement fetchmail-SA-2008-01 (CVE-2008-2711)",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/493391/100/0/threaded"
},
{
"name": "31262",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31262"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0235"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.apple.com/kb/HT3438"
},
{
"name": "APPLE-SA-2009-02-12",
"tags": [
"vendor-advisory",
"x_refsource_APPLE",
"x_transferred"
],
"url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"
},
{
"name": "30895",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/30895"
},
{
"name": "FEDORA-2008-5800",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg01095.html"
},
{
"name": "FEDORA-2008-5789",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg01091.html"
},
{
"name": "SSA:2008-210-01",
"tags": [
"vendor-advisory",
"x_refsource_SLACKWARE",
"x_transferred"
],
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.495740"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.fetchmail.info/fetchmail-SA-2008-01.txt"
},
{
"name": "ADV-2009-0422",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2009/0422"
},
{
"name": "29705",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/29705"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://issues.rpath.com/browse/RPL-2623"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://bugzilla.novell.com/show_bug.cgi?id=354291"
},
{
"name": "MDVSA-2008:117",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:117"
},
{
"name": "fetchmail-logmessage-dos(43121)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43121"
},
{
"name": "[oss-security] 20080613 CVE Id Request: fetchmail \u003c= 6.3.8 DoS when logging long headers in -v -v mode",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2008/06/13/1"
},
{
"name": "oval:org.mitre.oval:def:10950",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10950"
},
{
"name": "30742",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/30742"
},
{
"name": "[oss-security] 20210809 fetchmail 6.4.21 released/regression fix for 6.4.20\u0027s security fix, and UPDATE: fetchmail \u003c= 6.4.19 security announcement 2021-01 (CVE-2021-36386)",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2021/08/09/1"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2008-06-13T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "fetchmail 6.3.8 and earlier, when running in -v -v (aka verbose) mode, allows remote attackers to cause a denial of service (crash and persistent mail failure) via a malformed mail message with long headers, which triggers an erroneous dereference when using vsnprintf to format log messages."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-08-09T20:06:29",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "ADV-2008-1860",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/1860/references"
},
{
"name": "31287",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31287"
},
{
"name": "20080729 rPSA-2008-0235-1 fetchmail fetchmailconf",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/494865/100/0/threaded"
},
{
"name": "1020298",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1020298"
},
{
"name": "33937",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/33937"
},
{
"name": "20080617 fetchmail security announcement fetchmail-SA-2008-01 (CVE-2008-2711)",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/493391/100/0/threaded"
},
{
"name": "31262",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31262"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0235"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.apple.com/kb/HT3438"
},
{
"name": "APPLE-SA-2009-02-12",
"tags": [
"vendor-advisory",
"x_refsource_APPLE"
],
"url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"
},
{
"name": "30895",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/30895"
},
{
"name": "FEDORA-2008-5800",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg01095.html"
},
{
"name": "FEDORA-2008-5789",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg01091.html"
},
{
"name": "SSA:2008-210-01",
"tags": [
"vendor-advisory",
"x_refsource_SLACKWARE"
],
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.495740"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.fetchmail.info/fetchmail-SA-2008-01.txt"
},
{
"name": "ADV-2009-0422",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2009/0422"
},
{
"name": "29705",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/29705"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://issues.rpath.com/browse/RPL-2623"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://bugzilla.novell.com/show_bug.cgi?id=354291"
},
{
"name": "MDVSA-2008:117",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:117"
},
{
"name": "fetchmail-logmessage-dos(43121)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43121"
},
{
"name": "[oss-security] 20080613 CVE Id Request: fetchmail \u003c= 6.3.8 DoS when logging long headers in -v -v mode",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2008/06/13/1"
},
{
"name": "oval:org.mitre.oval:def:10950",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10950"
},
{
"name": "30742",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/30742"
},
{
"name": "[oss-security] 20210809 fetchmail 6.4.21 released/regression fix for 6.4.20\u0027s security fix, and UPDATE: fetchmail \u003c= 6.4.19 security announcement 2021-01 (CVE-2021-36386)",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2021/08/09/1"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2008-2711",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "fetchmail 6.3.8 and earlier, when running in -v -v (aka verbose) mode, allows remote attackers to cause a denial of service (crash and persistent mail failure) via a malformed mail message with long headers, which triggers an erroneous dereference when using vsnprintf to format log messages."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "ADV-2008-1860",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/1860/references"
},
{
"name": "31287",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31287"
},
{
"name": "20080729 rPSA-2008-0235-1 fetchmail fetchmailconf",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/494865/100/0/threaded"
},
{
"name": "1020298",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1020298"
},
{
"name": "33937",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33937"
},
{
"name": "20080617 fetchmail security announcement fetchmail-SA-2008-01 (CVE-2008-2711)",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/493391/100/0/threaded"
},
{
"name": "31262",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31262"
},
{
"name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0235",
"refsource": "CONFIRM",
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0235"
},
{
"name": "http://support.apple.com/kb/HT3438",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT3438"
},
{
"name": "APPLE-SA-2009-02-12",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"
},
{
"name": "30895",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30895"
},
{
"name": "FEDORA-2008-5800",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg01095.html"
},
{
"name": "FEDORA-2008-5789",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg01091.html"
},
{
"name": "SSA:2008-210-01",
"refsource": "SLACKWARE",
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.495740"
},
{
"name": "http://www.fetchmail.info/fetchmail-SA-2008-01.txt",
"refsource": "CONFIRM",
"url": "http://www.fetchmail.info/fetchmail-SA-2008-01.txt"
},
{
"name": "ADV-2009-0422",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/0422"
},
{
"name": "29705",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/29705"
},
{
"name": "https://issues.rpath.com/browse/RPL-2623",
"refsource": "CONFIRM",
"url": "https://issues.rpath.com/browse/RPL-2623"
},
{
"name": "https://bugzilla.novell.com/show_bug.cgi?id=354291",
"refsource": "MISC",
"url": "https://bugzilla.novell.com/show_bug.cgi?id=354291"
},
{
"name": "MDVSA-2008:117",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:117"
},
{
"name": "fetchmail-logmessage-dos(43121)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43121"
},
{
"name": "[oss-security] 20080613 CVE Id Request: fetchmail \u003c= 6.3.8 DoS when logging long headers in -v -v mode",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2008/06/13/1"
},
{
"name": "oval:org.mitre.oval:def:10950",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10950"
},
{
"name": "30742",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30742"
},
{
"name": "[oss-security] 20210809 fetchmail 6.4.21 released/regression fix for 6.4.20\u0027s security fix, and UPDATE: fetchmail \u003c= 6.4.19 security announcement 2021-01 (CVE-2021-36386)",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2021/08/09/1"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2008-2711",
"datePublished": "2008-06-16T21:00:00",
"dateReserved": "2008-06-16T00:00:00",
"dateUpdated": "2024-08-07T09:14:14.639Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2007-4565 (GCVE-0-2007-4565)
Vulnerability from nvd – Published: 2007-08-28 01:00 – Updated: 2024-08-07 15:01
VLAI?
Summary
sink.c in fetchmail before 6.3.9 allows context-dependent attackers to cause a denial of service (NULL dereference and application crash) by refusing certain warning messages that are sent over SMTP.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T15:01:09.632Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "33937",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/33937"
},
{
"name": "3074",
"tags": [
"third-party-advisory",
"x_refsource_SREASON",
"x_transferred"
],
"url": "http://securityreason.com/securityalert/3074"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://fetchmail.berlios.de/fetchmail-SA-2007-02.txt"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://mknod.org/svn/fetchmail/branches/BRANCH_6-3/fetchmail-SA-2007-02.txt"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.apple.com/kb/HT3438"
},
{
"name": "1018627",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1018627"
},
{
"name": "APPLE-SA-2009-02-12",
"tags": [
"vendor-advisory",
"x_refsource_APPLE",
"x_transferred"
],
"url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"
},
{
"name": "20080617 fetchmail security announcement fetchmail-SA-2007-02 (CVE-2007-4565)",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/493388/100/0/threaded"
},
{
"name": "2007-0028",
"tags": [
"vendor-advisory",
"x_refsource_TRUSTIX",
"x_transferred"
],
"url": "http://www.trustix.org/errata/2007/0028/"
},
{
"name": "oval:org.mitre.oval:def:10528",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10528"
},
{
"name": "25495",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/25495"
},
{
"name": "ADV-2007-3032",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2007/3032"
},
{
"name": "ADV-2009-0422",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2009/0422"
},
{
"name": "20070907 FLEA-2007-0053-1 fetchmail",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/478798/100/0/threaded"
},
{
"name": "27399",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/27399"
},
{
"name": "fetchmail-warning-dos(36385)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36385"
},
{
"name": "DSA-1377",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2007/dsa-1377"
},
{
"name": "MDKSA-2007:179",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:179"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://issues.rpath.com/browse/RPL-1690"
},
{
"name": "USN-520-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/usn-520-1"
},
{
"name": "SUSE-SR:2007:022",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00008.html"
},
{
"name": "45833",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/45833"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2007-07-29T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "sink.c in fetchmail before 6.3.9 allows context-dependent attackers to cause a denial of service (NULL dereference and application crash) by refusing certain warning messages that are sent over SMTP."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-15T20:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "33937",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/33937"
},
{
"name": "3074",
"tags": [
"third-party-advisory",
"x_refsource_SREASON"
],
"url": "http://securityreason.com/securityalert/3074"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://fetchmail.berlios.de/fetchmail-SA-2007-02.txt"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://mknod.org/svn/fetchmail/branches/BRANCH_6-3/fetchmail-SA-2007-02.txt"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.apple.com/kb/HT3438"
},
{
"name": "1018627",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1018627"
},
{
"name": "APPLE-SA-2009-02-12",
"tags": [
"vendor-advisory",
"x_refsource_APPLE"
],
"url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"
},
{
"name": "20080617 fetchmail security announcement fetchmail-SA-2007-02 (CVE-2007-4565)",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/493388/100/0/threaded"
},
{
"name": "2007-0028",
"tags": [
"vendor-advisory",
"x_refsource_TRUSTIX"
],
"url": "http://www.trustix.org/errata/2007/0028/"
},
{
"name": "oval:org.mitre.oval:def:10528",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10528"
},
{
"name": "25495",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/25495"
},
{
"name": "ADV-2007-3032",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2007/3032"
},
{
"name": "ADV-2009-0422",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2009/0422"
},
{
"name": "20070907 FLEA-2007-0053-1 fetchmail",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/478798/100/0/threaded"
},
{
"name": "27399",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/27399"
},
{
"name": "fetchmail-warning-dos(36385)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36385"
},
{
"name": "DSA-1377",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2007/dsa-1377"
},
{
"name": "MDKSA-2007:179",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:179"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://issues.rpath.com/browse/RPL-1690"
},
{
"name": "USN-520-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/usn-520-1"
},
{
"name": "SUSE-SR:2007:022",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00008.html"
},
{
"name": "45833",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/45833"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2007-4565",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "sink.c in fetchmail before 6.3.9 allows context-dependent attackers to cause a denial of service (NULL dereference and application crash) by refusing certain warning messages that are sent over SMTP."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "33937",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33937"
},
{
"name": "3074",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/3074"
},
{
"name": "http://fetchmail.berlios.de/fetchmail-SA-2007-02.txt",
"refsource": "CONFIRM",
"url": "http://fetchmail.berlios.de/fetchmail-SA-2007-02.txt"
},
{
"name": "http://mknod.org/svn/fetchmail/branches/BRANCH_6-3/fetchmail-SA-2007-02.txt",
"refsource": "CONFIRM",
"url": "http://mknod.org/svn/fetchmail/branches/BRANCH_6-3/fetchmail-SA-2007-02.txt"
},
{
"name": "http://support.apple.com/kb/HT3438",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT3438"
},
{
"name": "1018627",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1018627"
},
{
"name": "APPLE-SA-2009-02-12",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"
},
{
"name": "20080617 fetchmail security announcement fetchmail-SA-2007-02 (CVE-2007-4565)",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/493388/100/0/threaded"
},
{
"name": "2007-0028",
"refsource": "TRUSTIX",
"url": "http://www.trustix.org/errata/2007/0028/"
},
{
"name": "oval:org.mitre.oval:def:10528",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10528"
},
{
"name": "25495",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/25495"
},
{
"name": "ADV-2007-3032",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3032"
},
{
"name": "ADV-2009-0422",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/0422"
},
{
"name": "20070907 FLEA-2007-0053-1 fetchmail",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/478798/100/0/threaded"
},
{
"name": "27399",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27399"
},
{
"name": "fetchmail-warning-dos(36385)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36385"
},
{
"name": "DSA-1377",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2007/dsa-1377"
},
{
"name": "MDKSA-2007:179",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:179"
},
{
"name": "https://issues.rpath.com/browse/RPL-1690",
"refsource": "CONFIRM",
"url": "https://issues.rpath.com/browse/RPL-1690"
},
{
"name": "USN-520-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-520-1"
},
{
"name": "SUSE-SR:2007:022",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00008.html"
},
{
"name": "45833",
"refsource": "OSVDB",
"url": "http://osvdb.org/45833"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2007-4565",
"datePublished": "2007-08-28T01:00:00",
"dateReserved": "2007-08-27T00:00:00",
"dateUpdated": "2024-08-07T15:01:09.632Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
FKIE_CVE-2021-39272
Vulnerability from fkie_nvd - Published: 2021-08-30 06:15 - Updated: 2024-11-21 06:19
Severity ?
Summary
Fetchmail before 6.4.22 fails to enforce STARTTLS session encryption in some circumstances, such as a certain situation with IMAP and PREAUTH.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | http://www.openwall.com/lists/oss-security/2021/08/27/3 | Mailing List, Third Party Advisory | |
| cve@mitre.org | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3XJ6XLEJCEZCAM5LGGD6XBCC522QLG4/ | ||
| cve@mitre.org | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VXMKSEHAQSEDCWZMAOJEGX3P3JW6QY6H/ | ||
| cve@mitre.org | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZYCYLL73NP7ALJWSDICIVSA47ZIXWSSA/ | ||
| cve@mitre.org | https://nostarttls.secvuln.info/ | Third Party Advisory | |
| cve@mitre.org | https://security.gentoo.org/glsa/202209-14 | Third Party Advisory | |
| cve@mitre.org | https://www.fetchmail.info/security.html | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2021/08/27/3 | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3XJ6XLEJCEZCAM5LGGD6XBCC522QLG4/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VXMKSEHAQSEDCWZMAOJEGX3P3JW6QY6H/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZYCYLL73NP7ALJWSDICIVSA47ZIXWSSA/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://nostarttls.secvuln.info/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/202209-14 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.fetchmail.info/security.html | Vendor Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| fetchmail | fetchmail | * | |
| fedoraproject | fedora | 33 | |
| fedoraproject | fedora | 34 | |
| fedoraproject | fedora | 35 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4AD13C43-606A-433C-98D9-1A24397CD739",
"versionEndExcluding": "6.4.22",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Fetchmail before 6.4.22 fails to enforce STARTTLS session encryption in some circumstances, such as a certain situation with IMAP and PREAUTH."
},
{
"lang": "es",
"value": "Fetchmail versiones anteriores a 6.4.22, no puede aplicar el cifrado de sesi\u00f3n STARTTLS en determinadas circunstancias, como una situaci\u00f3n con IMAP y PREAUTH."
}
],
"id": "CVE-2021-39272",
"lastModified": "2024-11-21T06:19:05.287",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-08-30T06:15:06.450",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2021/08/27/3"
},
{
"source": "cve@mitre.org",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3XJ6XLEJCEZCAM5LGGD6XBCC522QLG4/"
},
{
"source": "cve@mitre.org",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VXMKSEHAQSEDCWZMAOJEGX3P3JW6QY6H/"
},
{
"source": "cve@mitre.org",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZYCYLL73NP7ALJWSDICIVSA47ZIXWSSA/"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://nostarttls.secvuln.info/"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202209-14"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://www.fetchmail.info/security.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2021/08/27/3"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3XJ6XLEJCEZCAM5LGGD6XBCC522QLG4/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VXMKSEHAQSEDCWZMAOJEGX3P3JW6QY6H/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZYCYLL73NP7ALJWSDICIVSA47ZIXWSSA/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://nostarttls.secvuln.info/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202209-14"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.fetchmail.info/security.html"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-319"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2021-36386
Vulnerability from fkie_nvd - Published: 2021-07-30 14:15 - Updated: 2024-11-21 06:13
Severity ?
Summary
report_vbuild in report.c in Fetchmail before 6.4.20 sometimes omits initialization of the vsnprintf va_list argument, which might allow mail servers to cause a denial of service or possibly have unspecified other impact via long error messages. NOTE: it is unclear whether use of Fetchmail on any realistic platform results in an impact beyond an inconvenience to the client user.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | http://www.openwall.com/lists/oss-security/2021/07/28/5 | Mailing List, Patch, Third Party Advisory | |
| cve@mitre.org | http://www.openwall.com/lists/oss-security/2021/08/09/1 | Mailing List | |
| cve@mitre.org | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AGYO5AHSXTCKA4NQC2Z4H3XMMYNAGC77/ | ||
| cve@mitre.org | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OIXKO6QW3AUHGJVWKJXBCOVBYJUJRBFC/ | ||
| cve@mitre.org | https://security.gentoo.org/glsa/202209-14 | Third Party Advisory | |
| cve@mitre.org | https://www.fetchmail.info/fetchmail-SA-2021-01.txt | Vendor Advisory | |
| cve@mitre.org | https://www.fetchmail.info/security.html | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2021/07/28/5 | Mailing List, Patch, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2021/08/09/1 | Mailing List | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AGYO5AHSXTCKA4NQC2Z4H3XMMYNAGC77/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OIXKO6QW3AUHGJVWKJXBCOVBYJUJRBFC/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/202209-14 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.fetchmail.info/fetchmail-SA-2021-01.txt | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.fetchmail.info/security.html | Vendor Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| fetchmail | fetchmail | * | |
| fedoraproject | fedora | 33 | |
| fedoraproject | fedora | 34 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8F3BEF4E-E90A-482F-AFC9-C0CE0619ACB1",
"versionEndExcluding": "6.4.20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "report_vbuild in report.c in Fetchmail before 6.4.20 sometimes omits initialization of the vsnprintf va_list argument, which might allow mail servers to cause a denial of service or possibly have unspecified other impact via long error messages. NOTE: it is unclear whether use of Fetchmail on any realistic platform results in an impact beyond an inconvenience to the client user."
},
{
"lang": "es",
"value": "Una funci\u00f3n report_vbuild en el archivo report.c en Fetchmail versiones anteriores a 6.4.20, a veces omite la inicializaci\u00f3n del argumento vsnprintf va_list, lo que podr\u00eda permitir a servidores de correo causar una denegaci\u00f3n de servicio o posiblemente tener otro impacto no especificado por medio de largos mensajes de error. NOTA: no est\u00e1 claro si el uso de Fetchmail en cualquier plataforma realista presenta un impacto m\u00e1s all\u00e1 de un inconveniente para el usuario cliente"
}
],
"id": "CVE-2021-36386",
"lastModified": "2024-11-21T06:13:39.480",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-07-30T14:15:18.140",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Patch",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2021/07/28/5"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List"
],
"url": "http://www.openwall.com/lists/oss-security/2021/08/09/1"
},
{
"source": "cve@mitre.org",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AGYO5AHSXTCKA4NQC2Z4H3XMMYNAGC77/"
},
{
"source": "cve@mitre.org",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OIXKO6QW3AUHGJVWKJXBCOVBYJUJRBFC/"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202209-14"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://www.fetchmail.info/fetchmail-SA-2021-01.txt"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://www.fetchmail.info/security.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Patch",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2021/07/28/5"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
],
"url": "http://www.openwall.com/lists/oss-security/2021/08/09/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AGYO5AHSXTCKA4NQC2Z4H3XMMYNAGC77/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OIXKO6QW3AUHGJVWKJXBCOVBYJUJRBFC/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202209-14"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.fetchmail.info/fetchmail-SA-2021-01.txt"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.fetchmail.info/security.html"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-909"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2012-3482
Vulnerability from fkie_nvd - Published: 2012-12-21 05:46 - Updated: 2025-04-11 00:51
Severity ?
Summary
Fetchmail 5.0.8 through 6.3.21, when using NTLM authentication in debug mode, allows remote NTLM servers to (1) cause a denial of service (crash and delayed delivery of inbound mail) via a crafted NTLM response that triggers an out-of-bounds read in the base64 decoder, or (2) obtain sensitive information from memory via an NTLM Type 2 message with a crafted Target Name structure, which triggers an out-of-bounds read.
References
| URL | Tags | ||
|---|---|---|---|
| secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2012-October/088836.html | ||
| secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2012-October/088871.html | ||
| secalert@redhat.com | http://seclists.org/oss-sec/2012/q3/230 | ||
| secalert@redhat.com | http://seclists.org/oss-sec/2012/q3/232 | ||
| secalert@redhat.com | http://www.fetchmail.info/fetchmail-SA-2012-02.txt | Patch, Vendor Advisory | |
| secalert@redhat.com | http://www.securityfocus.com/bid/54987 | ||
| secalert@redhat.com | https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2012-October/088836.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2012-October/088871.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/oss-sec/2012/q3/230 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/oss-sec/2012/q3/232 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.fetchmail.info/fetchmail-SA-2012-02.txt | Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/54987 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| fetchmail | fetchmail | 5.0.8 | |
| fetchmail | fetchmail | 5.1.0 | |
| fetchmail | fetchmail | 5.1.4 | |
| fetchmail | fetchmail | 5.2.0 | |
| fetchmail | fetchmail | 5.2.1 | |
| fetchmail | fetchmail | 5.2.3 | |
| fetchmail | fetchmail | 5.2.4 | |
| fetchmail | fetchmail | 5.2.7 | |
| fetchmail | fetchmail | 5.2.8 | |
| fetchmail | fetchmail | 5.3.0 | |
| fetchmail | fetchmail | 5.3.1 | |
| fetchmail | fetchmail | 5.3.3 | |
| fetchmail | fetchmail | 5.3.8 | |
| fetchmail | fetchmail | 5.4.0 | |
| fetchmail | fetchmail | 5.4.3 | |
| fetchmail | fetchmail | 5.4.4 | |
| fetchmail | fetchmail | 5.4.5 | |
| fetchmail | fetchmail | 5.5.0 | |
| fetchmail | fetchmail | 5.5.2 | |
| fetchmail | fetchmail | 5.5.3 | |
| fetchmail | fetchmail | 5.5.5 | |
| fetchmail | fetchmail | 5.5.6 | |
| fetchmail | fetchmail | 5.6.0 | |
| fetchmail | fetchmail | 5.7.0 | |
| fetchmail | fetchmail | 5.7.2 | |
| fetchmail | fetchmail | 5.7.4 | |
| fetchmail | fetchmail | 5.8 | |
| fetchmail | fetchmail | 5.8.1 | |
| fetchmail | fetchmail | 5.8.2 | |
| fetchmail | fetchmail | 5.8.3 | |
| fetchmail | fetchmail | 5.8.4 | |
| fetchmail | fetchmail | 5.8.5 | |
| fetchmail | fetchmail | 5.8.6 | |
| fetchmail | fetchmail | 5.8.11 | |
| fetchmail | fetchmail | 5.8.13 | |
| fetchmail | fetchmail | 5.8.14 | |
| fetchmail | fetchmail | 5.8.17 | |
| fetchmail | fetchmail | 5.9.0 | |
| fetchmail | fetchmail | 5.9.4 | |
| fetchmail | fetchmail | 5.9.5 | |
| fetchmail | fetchmail | 5.9.8 | |
| fetchmail | fetchmail | 5.9.10 | |
| fetchmail | fetchmail | 5.9.11 | |
| fetchmail | fetchmail | 5.9.13 | |
| fetchmail | fetchmail | 6.0.0 | |
| fetchmail | fetchmail | 6.1.0 | |
| fetchmail | fetchmail | 6.1.3 | |
| fetchmail | fetchmail | 6.2.0 | |
| fetchmail | fetchmail | 6.2.1 | |
| fetchmail | fetchmail | 6.2.2 | |
| fetchmail | fetchmail | 6.2.3 | |
| fetchmail | fetchmail | 6.2.4 | |
| fetchmail | fetchmail | 6.2.5 | |
| fetchmail | fetchmail | 6.2.5.1 | |
| fetchmail | fetchmail | 6.2.5.2 | |
| fetchmail | fetchmail | 6.2.5.4 | |
| fetchmail | fetchmail | 6.2.6 | |
| fetchmail | fetchmail | 6.2.6 | |
| fetchmail | fetchmail | 6.2.6 | |
| fetchmail | fetchmail | 6.2.9 | |
| fetchmail | fetchmail | 6.2.9 | |
| fetchmail | fetchmail | 6.2.9 | |
| fetchmail | fetchmail | 6.2.9 | |
| fetchmail | fetchmail | 6.2.9 | |
| fetchmail | fetchmail | 6.2.9 | |
| fetchmail | fetchmail | 6.2.9 | |
| fetchmail | fetchmail | 6.3.0 | |
| fetchmail | fetchmail | 6.3.1 | |
| fetchmail | fetchmail | 6.3.2 | |
| fetchmail | fetchmail | 6.3.3 | |
| fetchmail | fetchmail | 6.3.4 | |
| fetchmail | fetchmail | 6.3.5 | |
| fetchmail | fetchmail | 6.3.6 | |
| fetchmail | fetchmail | 6.3.6 | |
| fetchmail | fetchmail | 6.3.6 | |
| fetchmail | fetchmail | 6.3.6 | |
| fetchmail | fetchmail | 6.3.6 | |
| fetchmail | fetchmail | 6.3.6 | |
| fetchmail | fetchmail | 6.3.7 | |
| fetchmail | fetchmail | 6.3.8 | |
| fetchmail | fetchmail | 6.3.9 | |
| fetchmail | fetchmail | 6.3.9 | |
| fetchmail | fetchmail | 6.3.10 | |
| fetchmail | fetchmail | 6.3.11 | |
| fetchmail | fetchmail | 6.3.12 | |
| fetchmail | fetchmail | 6.3.13 | |
| fetchmail | fetchmail | 6.3.14 | |
| fetchmail | fetchmail | 6.3.15 | |
| fetchmail | fetchmail | 6.3.16 | |
| fetchmail | fetchmail | 6.3.17 | |
| fetchmail | fetchmail | 6.3.18 | |
| fetchmail | fetchmail | 6.3.19 | |
| fetchmail | fetchmail | 6.3.21 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "EF18219F-0406-4D46-90DE-EA2A17C8EFF7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "87B56DFD-BDA9-4D8B-BE54-BF59B762D574",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "33EA0CA8-468F-4A94-8DA3-5D820AB65973",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BA21C847-57ED-4E7D-9366-6038467D9080",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0450BD04-15D2-4122-A210-6225B89BDA7F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "18428805-AEB2-4BA4-9762-906B59CE74D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "AFCCBB15-DFFE-4A57-A029-E57707D15E04",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "0427B5C8-265C-47C3-9BAB-B2A0EAA1DEE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "89A4B962-BE5B-471C-83EF-674525C5AE83",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7166ECCB-54FB-44EA-BA80-4D2AAF494AF2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6B309C89-99E2-4F0B-976C-95E44A45ADC5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A3DE7EE7-F627-4955-8D95-1F00F1F85C7D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.8:*:*:*:*:*:*:*",
"matchCriteriaId": "D549098D-FE16-4BCB-91C4-D71A8C8D2E9F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "57BFA165-6E2E-49AF-9E2D-3D8923CF36C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F5C67DFF-A1BE-4486-A11F-CD3729927220",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "1D365E6E-8777-4084-BEC8-7CBF4997D976",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "20C4FF28-0DBA-4995-8252-2D62FF896BC4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F80C6B9B-AFCE-46A1-8DEF-51C1B526EB18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BF667DB5-F41E-4E73-A01F-4EC3F60BAD0C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "D2B144FA-A901-4CDF-AC3D-7F5E820B7A4B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.5:*:*:*:*:*:*:*",
"matchCriteriaId": "96774635-9A12-4DAB-BCF6-2D678F244CE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.6:*:*:*:*:*:*:*",
"matchCriteriaId": "EFD2EE7A-36CB-4A26-8EEB-DACA2864D921",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C3898EBC-75A9-4DDD-A0AF-2CDEC72DAE4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4267DCE8-985C-416D-A6B7-536585E5A573",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "50E63EDF-FF0A-447C-A3FC-7BA2414C15CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "61DDD4A1-6185-41B6-A715-4C70F0AA2631",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8:*:*:*:*:*:*:*",
"matchCriteriaId": "B10A7E3C-07CD-48A6-9075-5314B4E1EEAB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "319955A4-27A8-46FF-ACE7-97E6DF27B2DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "925CF3DD-682B-40E6-900C-23F784CD9239",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.3:*:*:*:*:*:*:*",
"matchCriteriaId": "16366780-611E-4217-A614-EBA01421D148",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.4:*:*:*:*:*:*:*",
"matchCriteriaId": "43AEA36F-E730-4305-9CB6-738A7152F02E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.5:*:*:*:*:*:*:*",
"matchCriteriaId": "2B9536BA-6334-4957-9632-6D64365B88AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.6:*:*:*:*:*:*:*",
"matchCriteriaId": "F52FA32B-8048-4FD7-9D20-20DC5E52098B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.11:*:*:*:*:*:*:*",
"matchCriteriaId": "9FA92DF1-3AAD-46AC-A9E4-E9386C977818",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.13:*:*:*:*:*:*:*",
"matchCriteriaId": "837D66DB-F9CB-41F1-A091-BCFBAC2F45B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.14:*:*:*:*:*:*:*",
"matchCriteriaId": "74D12B67-6E66-419A-A28F-6306402931EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.17:*:*:*:*:*:*:*",
"matchCriteriaId": "A71FCBED-B25D-48E3-916C-FBA9E0DE8D12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1A17995E-DCAF-465A-8ABD-F1EA0D538784",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.4:*:*:*:*:*:*:*",
"matchCriteriaId": "93D03D78-C56E-4189-97FC-916C918EDFEE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.5:*:*:*:*:*:*:*",
"matchCriteriaId": "19A66C77-041F-4A12-8A36-233A6B50641C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.8:*:*:*:*:*:*:*",
"matchCriteriaId": "C945059C-EF39-486D-A804-FBB8704AB927",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.10:*:*:*:*:*:*:*",
"matchCriteriaId": "1258CA65-FBC1-4848-A9E5-A8F5E5D6FBD5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.11:*:*:*:*:*:*:*",
"matchCriteriaId": "A91C6418-41F0-46EB-ACFC-FCE907F5AA87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.13:*:*:*:*:*:*:*",
"matchCriteriaId": "0C020534-7596-496C-B9B0-739F58F6F4EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0A77D40C-6FF5-42BD-9EFB-B532824D7606",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F04C6A76-2718-4DBA-8972-A3EECDDB1A17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "38ACD96E-5582-4ED0-BBB1-C891094D8217",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "264386DA-747F-492C-B660-D49BE9DB7139",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DC4066AC-BE10-4189-86F6-BF94443738DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1C25A146-50D5-4BA2-ABA2-20BF8784D7DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "72E76256-997F-4229-9B03-7BC3074F359D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7A717C50-2C5A-4CD1-B2E6-8CDF450940CE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "61F908FF-9986-4F71-B0B6-D6A86555EF56",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B0C1F99C-A246-40D3-B84A-5D11FF24AC1B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "028F7F83-AF15-443B-A7DB-4E695E62EAFB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "B418C3CE-E6E6-401D-AD83-5BB181009A7F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.6:pre4:*:*:*:*:*:*",
"matchCriteriaId": "8BF06FD2-0A4C-4557-B8EF-F0F021179498",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.6:pre8:*:*:*:*:*:*",
"matchCriteriaId": "38C949C2-07A0-4FE4-8FBF-86215CB999CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.6:pre9:*:*:*:*:*:*",
"matchCriteriaId": "88B23630-79DD-4B69-BB01-286193BA562E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc10:*:*:*:*:*:*",
"matchCriteriaId": "5FE21564-68C0-4765-BA40-9D3046C4CB14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc3:*:*:*:*:*:*",
"matchCriteriaId": "208102ED-6F22-44C5-BAF1-FD85EACF208F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc4:*:*:*:*:*:*",
"matchCriteriaId": "C1CF7767-EB24-44E2-8E59-B4DBC99AFD23",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc5:*:*:*:*:*:*",
"matchCriteriaId": "CF3D6D4C-5FD8-4EE1-A34A-99D397F09E85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc7:*:*:*:*:*:*",
"matchCriteriaId": "D63D88C1-B201-4D48-9659-5802DC4FD3EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc8:*:*:*:*:*:*",
"matchCriteriaId": "16463B23-E884-467E-9F63-6B57EED39856",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc9:*:*:*:*:*:*",
"matchCriteriaId": "9F2C03AF-666D-4AF6-BC69-F8B081EB41AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "84F90AFA-4B13-46A0-89D7-4065300C94C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5DAD0F05-8B55-43ED-89D5-61A19F41EDFF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "99053698-7F8B-4E71-8647-1A8B0DF7CEB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "9314F22D-22A8-4374-A2BF-3C64CF1F69BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "816E9640-A932-4E2F-9793-689F80D2AA89",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "5D09BB43-6CBA-499B-91D1-BA256A65E40D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "ABE76611-08CE-4D85-B57A-021909835A81",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc1:*:*:*:*:*:*",
"matchCriteriaId": "B98AFEDF-2BAB-4588-94E0-35AEA5F1B514",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc2:*:*:*:*:*:*",
"matchCriteriaId": "4E8BAB5B-4DBC-4D05-B5E2-591573BC05FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc3:*:*:*:*:*:*",
"matchCriteriaId": "02F6E729-A2F2-42AC-A941-F57A0A4E84A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc4:*:*:*:*:*:*",
"matchCriteriaId": "4143D519-4B49-4E71-8686-FC6A095F0999",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc5:*:*:*:*:*:*",
"matchCriteriaId": "387ADB82-4FAD-44DA-ABF2-2F4645C4F1E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "CED4FBCB-B6DF-429D-871D-2A9F7F59E63B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.8:*:*:*:*:*:*:*",
"matchCriteriaId": "237F86BD-82CD-4A37-BF64-F103B1304F0C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.9:*:*:*:*:*:*:*",
"matchCriteriaId": "667847D9-58DD-4693-B544-593AC6D7746D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.9:rc2:*:*:*:*:*:*",
"matchCriteriaId": "12BA2E29-5547-45F5-BC46-1A7B4A222055",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.10:*:*:*:*:*:*:*",
"matchCriteriaId": "C44EA07A-D8A9-4E43-AE2D-B9E41944CB07",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "F9882EBF-72D0-4C4F-99BA-929418B5D86B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.12:*:*:*:*:*:*:*",
"matchCriteriaId": "EE474E7E-EEE8-45E4-A995-A437CE7C08CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.13:*:*:*:*:*:*:*",
"matchCriteriaId": "2F96F2F2-B6CC-4138-8F9C-4CB906EDACDD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.14:*:*:*:*:*:*:*",
"matchCriteriaId": "22D580D8-FE6D-40E9-88A5-751A9C8CBAA7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.15:*:*:*:*:*:*:*",
"matchCriteriaId": "7C7E909A-F8F7-4FB1-8659-41A47C9B7C5A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.16:*:*:*:*:*:*:*",
"matchCriteriaId": "FDBC29B9-EC76-4F2C-BD00-A57C0D4B99EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.17:*:*:*:*:*:*:*",
"matchCriteriaId": "4C8896BE-EF89-4F2C-9356-96745005E3AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.18:*:*:*:*:*:*:*",
"matchCriteriaId": "39E249FA-4A13-4945-A632-0A8D24CE594A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.19:*:*:*:*:*:*:*",
"matchCriteriaId": "6126F184-8470-49B7-A801-F671DEF24247",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.21:*:*:*:*:*:*:*",
"matchCriteriaId": "66992896-2958-47CA-A70A-A8B0B9B5FBA6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Fetchmail 5.0.8 through 6.3.21, when using NTLM authentication in debug mode, allows remote NTLM servers to (1) cause a denial of service (crash and delayed delivery of inbound mail) via a crafted NTLM response that triggers an out-of-bounds read in the base64 decoder, or (2) obtain sensitive information from memory via an NTLM Type 2 message with a crafted Target Name structure, which triggers an out-of-bounds read."
},
{
"lang": "es",
"value": "Fetchmail v5.0.8 hasta v6.3.21, cuando se utiliza la autenticaci\u00f3n NTLM en modo de depuraci\u00f3n, permite a servidores remotos NTLM (1) causar una denegaci\u00f3n de servicio (ca\u00edda y retraso en la entrega de correo entrante) a trav\u00e9s de una respuesta NTLM manipulada que desencadena una lectura fuera de limites en el decodificador base64, o (2) obtener informaci\u00f3n confidencial de la memoria a trav\u00e9s de un mensaje tipo NTLM 2 con una estructura Target Name modificada, lo que desencadena una lectura fuera de limites."
}
],
"id": "CVE-2012-3482",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2012-12-21T05:46:16.167",
"references": [
{
"source": "secalert@redhat.com",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-October/088836.html"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-October/088871.html"
},
{
"source": "secalert@redhat.com",
"url": "http://seclists.org/oss-sec/2012/q3/230"
},
{
"source": "secalert@redhat.com",
"url": "http://seclists.org/oss-sec/2012/q3/232"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.fetchmail.info/fetchmail-SA-2012-02.txt"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/bid/54987"
},
{
"source": "secalert@redhat.com",
"url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-October/088836.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-October/088871.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://seclists.org/oss-sec/2012/q3/230"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://seclists.org/oss-sec/2012/q3/232"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.fetchmail.info/fetchmail-SA-2012-02.txt"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/54987"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2011-1947
Vulnerability from fkie_nvd - Published: 2011-06-02 19:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
fetchmail 5.9.9 through 6.3.19 does not properly limit the wait time after issuing a (1) STARTTLS or (2) STLS request, which allows remote servers to cause a denial of service (application hang) by acknowledging the request but not sending additional packets.
References
| URL | Tags | ||
|---|---|---|---|
| secalert@redhat.com | http://gitorious.org/fetchmail/fetchmail/blobs/legacy_63/fetchmail-SA-2011-01.txt | ||
| secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061634.html | ||
| secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061672.html | ||
| secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061735.html | ||
| secalert@redhat.com | http://openwall.com/lists/oss-security/2011/05/30/1 | ||
| secalert@redhat.com | http://openwall.com/lists/oss-security/2011/05/31/12 | ||
| secalert@redhat.com | http://openwall.com/lists/oss-security/2011/05/31/17 | ||
| secalert@redhat.com | http://openwall.com/lists/oss-security/2011/06/01/2 | ||
| secalert@redhat.com | http://www.fetchmail.info/fetchmail-SA-2011-01.txt | ||
| secalert@redhat.com | http://www.mandriva.com/security/advisories?name=MDVSA-2011:107 | ||
| secalert@redhat.com | http://www.securityfocus.com/archive/1/518251/100/0/threaded | ||
| secalert@redhat.com | http://www.securityfocus.com/bid/48043 | ||
| secalert@redhat.com | http://www.securitytracker.com/id?1025605 | ||
| secalert@redhat.com | https://exchange.xforce.ibmcloud.com/vulnerabilities/67700 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://gitorious.org/fetchmail/fetchmail/blobs/legacy_63/fetchmail-SA-2011-01.txt | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061634.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061672.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061735.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://openwall.com/lists/oss-security/2011/05/30/1 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://openwall.com/lists/oss-security/2011/05/31/12 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://openwall.com/lists/oss-security/2011/05/31/17 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://openwall.com/lists/oss-security/2011/06/01/2 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.fetchmail.info/fetchmail-SA-2011-01.txt | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2011:107 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/518251/100/0/threaded | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/48043 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1025605 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/67700 |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| fetchmail | fetchmail | 5.9.9 | |
| fetchmail | fetchmail | 5.9.10 | |
| fetchmail | fetchmail | 5.9.11 | |
| fetchmail | fetchmail | 5.9.13 | |
| fetchmail | fetchmail | 6.0.0 | |
| fetchmail | fetchmail | 6.1.0 | |
| fetchmail | fetchmail | 6.1.3 | |
| fetchmail | fetchmail | 6.2.0 | |
| fetchmail | fetchmail | 6.2.1 | |
| fetchmail | fetchmail | 6.2.2 | |
| fetchmail | fetchmail | 6.2.3 | |
| fetchmail | fetchmail | 6.2.4 | |
| fetchmail | fetchmail | 6.2.5 | |
| fetchmail | fetchmail | 6.2.5.1 | |
| fetchmail | fetchmail | 6.2.5.2 | |
| fetchmail | fetchmail | 6.2.5.4 | |
| fetchmail | fetchmail | 6.2.6 | |
| fetchmail | fetchmail | 6.2.6 | |
| fetchmail | fetchmail | 6.2.6 | |
| fetchmail | fetchmail | 6.2.9 | |
| fetchmail | fetchmail | 6.2.9 | |
| fetchmail | fetchmail | 6.2.9 | |
| fetchmail | fetchmail | 6.2.9 | |
| fetchmail | fetchmail | 6.2.9 | |
| fetchmail | fetchmail | 6.2.9 | |
| fetchmail | fetchmail | 6.2.9 | |
| fetchmail | fetchmail | 6.3.0 | |
| fetchmail | fetchmail | 6.3.1 | |
| fetchmail | fetchmail | 6.3.2 | |
| fetchmail | fetchmail | 6.3.3 | |
| fetchmail | fetchmail | 6.3.4 | |
| fetchmail | fetchmail | 6.3.5 | |
| fetchmail | fetchmail | 6.3.6 | |
| fetchmail | fetchmail | 6.3.6 | |
| fetchmail | fetchmail | 6.3.6 | |
| fetchmail | fetchmail | 6.3.6 | |
| fetchmail | fetchmail | 6.3.6 | |
| fetchmail | fetchmail | 6.3.6 | |
| fetchmail | fetchmail | 6.3.7 | |
| fetchmail | fetchmail | 6.3.8 | |
| fetchmail | fetchmail | 6.3.9 | |
| fetchmail | fetchmail | 6.3.9 | |
| fetchmail | fetchmail | 6.3.10 | |
| fetchmail | fetchmail | 6.3.11 | |
| fetchmail | fetchmail | 6.3.12 | |
| fetchmail | fetchmail | 6.3.13 | |
| fetchmail | fetchmail | 6.3.14 | |
| fetchmail | fetchmail | 6.3.15 | |
| fetchmail | fetchmail | 6.3.16 | |
| fetchmail | fetchmail | 6.3.17 | |
| fetchmail | fetchmail | 6.3.18 | |
| fetchmail | fetchmail | 6.3.19 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.9:*:*:*:*:*:*:*",
"matchCriteriaId": "6163235A-1041-40D2-A5FA-1D4B80F40347",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.10:*:*:*:*:*:*:*",
"matchCriteriaId": "1258CA65-FBC1-4848-A9E5-A8F5E5D6FBD5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.11:*:*:*:*:*:*:*",
"matchCriteriaId": "A91C6418-41F0-46EB-ACFC-FCE907F5AA87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.13:*:*:*:*:*:*:*",
"matchCriteriaId": "0C020534-7596-496C-B9B0-739F58F6F4EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0A77D40C-6FF5-42BD-9EFB-B532824D7606",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F04C6A76-2718-4DBA-8972-A3EECDDB1A17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "38ACD96E-5582-4ED0-BBB1-C891094D8217",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "264386DA-747F-492C-B660-D49BE9DB7139",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DC4066AC-BE10-4189-86F6-BF94443738DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1C25A146-50D5-4BA2-ABA2-20BF8784D7DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "72E76256-997F-4229-9B03-7BC3074F359D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7A717C50-2C5A-4CD1-B2E6-8CDF450940CE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "61F908FF-9986-4F71-B0B6-D6A86555EF56",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B0C1F99C-A246-40D3-B84A-5D11FF24AC1B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "028F7F83-AF15-443B-A7DB-4E695E62EAFB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "B418C3CE-E6E6-401D-AD83-5BB181009A7F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.6:pre4:*:*:*:*:*:*",
"matchCriteriaId": "8BF06FD2-0A4C-4557-B8EF-F0F021179498",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.6:pre8:*:*:*:*:*:*",
"matchCriteriaId": "38C949C2-07A0-4FE4-8FBF-86215CB999CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.6:pre9:*:*:*:*:*:*",
"matchCriteriaId": "88B23630-79DD-4B69-BB01-286193BA562E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc10:*:*:*:*:*:*",
"matchCriteriaId": "5FE21564-68C0-4765-BA40-9D3046C4CB14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc3:*:*:*:*:*:*",
"matchCriteriaId": "208102ED-6F22-44C5-BAF1-FD85EACF208F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc4:*:*:*:*:*:*",
"matchCriteriaId": "C1CF7767-EB24-44E2-8E59-B4DBC99AFD23",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc5:*:*:*:*:*:*",
"matchCriteriaId": "CF3D6D4C-5FD8-4EE1-A34A-99D397F09E85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc7:*:*:*:*:*:*",
"matchCriteriaId": "D63D88C1-B201-4D48-9659-5802DC4FD3EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc8:*:*:*:*:*:*",
"matchCriteriaId": "16463B23-E884-467E-9F63-6B57EED39856",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc9:*:*:*:*:*:*",
"matchCriteriaId": "9F2C03AF-666D-4AF6-BC69-F8B081EB41AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "84F90AFA-4B13-46A0-89D7-4065300C94C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5DAD0F05-8B55-43ED-89D5-61A19F41EDFF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "99053698-7F8B-4E71-8647-1A8B0DF7CEB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "9314F22D-22A8-4374-A2BF-3C64CF1F69BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "816E9640-A932-4E2F-9793-689F80D2AA89",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "5D09BB43-6CBA-499B-91D1-BA256A65E40D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "ABE76611-08CE-4D85-B57A-021909835A81",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc1:*:*:*:*:*:*",
"matchCriteriaId": "B98AFEDF-2BAB-4588-94E0-35AEA5F1B514",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc2:*:*:*:*:*:*",
"matchCriteriaId": "4E8BAB5B-4DBC-4D05-B5E2-591573BC05FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc3:*:*:*:*:*:*",
"matchCriteriaId": "02F6E729-A2F2-42AC-A941-F57A0A4E84A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc4:*:*:*:*:*:*",
"matchCriteriaId": "4143D519-4B49-4E71-8686-FC6A095F0999",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc5:*:*:*:*:*:*",
"matchCriteriaId": "387ADB82-4FAD-44DA-ABF2-2F4645C4F1E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "CED4FBCB-B6DF-429D-871D-2A9F7F59E63B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.8:*:*:*:*:*:*:*",
"matchCriteriaId": "237F86BD-82CD-4A37-BF64-F103B1304F0C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.9:*:*:*:*:*:*:*",
"matchCriteriaId": "667847D9-58DD-4693-B544-593AC6D7746D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.9:rc2:*:*:*:*:*:*",
"matchCriteriaId": "12BA2E29-5547-45F5-BC46-1A7B4A222055",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.10:*:*:*:*:*:*:*",
"matchCriteriaId": "C44EA07A-D8A9-4E43-AE2D-B9E41944CB07",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "F9882EBF-72D0-4C4F-99BA-929418B5D86B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.12:*:*:*:*:*:*:*",
"matchCriteriaId": "EE474E7E-EEE8-45E4-A995-A437CE7C08CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.13:*:*:*:*:*:*:*",
"matchCriteriaId": "2F96F2F2-B6CC-4138-8F9C-4CB906EDACDD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.14:*:*:*:*:*:*:*",
"matchCriteriaId": "22D580D8-FE6D-40E9-88A5-751A9C8CBAA7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.15:*:*:*:*:*:*:*",
"matchCriteriaId": "7C7E909A-F8F7-4FB1-8659-41A47C9B7C5A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.16:*:*:*:*:*:*:*",
"matchCriteriaId": "FDBC29B9-EC76-4F2C-BD00-A57C0D4B99EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.17:*:*:*:*:*:*:*",
"matchCriteriaId": "4C8896BE-EF89-4F2C-9356-96745005E3AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.18:*:*:*:*:*:*:*",
"matchCriteriaId": "39E249FA-4A13-4945-A632-0A8D24CE594A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.19:*:*:*:*:*:*:*",
"matchCriteriaId": "6126F184-8470-49B7-A801-F671DEF24247",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "fetchmail 5.9.9 through 6.3.19 does not properly limit the wait time after issuing a (1) STARTTLS or (2) STLS request, which allows remote servers to cause a denial of service (application hang) by acknowledging the request but not sending additional packets."
},
{
"lang": "es",
"value": "fetchmail v5.9.9 a la v6.3.19 no limita correctamente el tiempo de espera despu\u00e9s de la emisi\u00f3n de una solicitud (1) STARTTLS o (2) STLS, lo que permite a los servidores remotos provocar una denegaci\u00f3n de servicio (bloqueo de la aplicaci\u00f3n) al hacer un ACK de la solicitud y no enviando posteriormente paquetes adicionales."
}
],
"id": "CVE-2011-1947",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2011-06-02T19:55:03.903",
"references": [
{
"source": "secalert@redhat.com",
"url": "http://gitorious.org/fetchmail/fetchmail/blobs/legacy_63/fetchmail-SA-2011-01.txt"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061634.html"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061672.html"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061735.html"
},
{
"source": "secalert@redhat.com",
"url": "http://openwall.com/lists/oss-security/2011/05/30/1"
},
{
"source": "secalert@redhat.com",
"url": "http://openwall.com/lists/oss-security/2011/05/31/12"
},
{
"source": "secalert@redhat.com",
"url": "http://openwall.com/lists/oss-security/2011/05/31/17"
},
{
"source": "secalert@redhat.com",
"url": "http://openwall.com/lists/oss-security/2011/06/01/2"
},
{
"source": "secalert@redhat.com",
"url": "http://www.fetchmail.info/fetchmail-SA-2011-01.txt"
},
{
"source": "secalert@redhat.com",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:107"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/archive/1/518251/100/0/threaded"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/bid/48043"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securitytracker.com/id?1025605"
},
{
"source": "secalert@redhat.com",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67700"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://gitorious.org/fetchmail/fetchmail/blobs/legacy_63/fetchmail-SA-2011-01.txt"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061634.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061672.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061735.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://openwall.com/lists/oss-security/2011/05/30/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://openwall.com/lists/oss-security/2011/05/31/12"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://openwall.com/lists/oss-security/2011/05/31/17"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://openwall.com/lists/oss-security/2011/06/01/2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.fetchmail.info/fetchmail-SA-2011-01.txt"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:107"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/518251/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/48043"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1025605"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67700"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-399"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2010-1167
Vulnerability from fkie_nvd - Published: 2010-05-07 18:24 - Updated: 2025-04-11 00:51
Severity ?
Summary
fetchmail 4.6.3 through 6.3.16, when debug mode is enabled, does not properly handle invalid characters in a multi-character locale, which allows remote attackers to cause a denial of service (memory consumption and application crash) via a crafted (1) message header or (2) POP3 UIDL list.
References
| URL | Tags | ||
|---|---|---|---|
| secalert@redhat.com | http://developer.berlios.de/project/shownotes.php?group_id=1824&release_id=17512 | ||
| secalert@redhat.com | http://www.fetchmail.info/fetchmail-SA-2010-02.txt | Patch | |
| secalert@redhat.com | http://www.mandriva.com/security/advisories?name=MDVSA-2011:107 | ||
| secalert@redhat.com | http://www.securityfocus.com/archive/1/511140/100/0/threaded | ||
| secalert@redhat.com | http://www.securityfocus.com/bid/39556 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://developer.berlios.de/project/shownotes.php?group_id=1824&release_id=17512 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.fetchmail.info/fetchmail-SA-2010-02.txt | Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2011:107 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/511140/100/0/threaded | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/39556 |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| fetchmail | fetchmail | * | |
| fetchmail | fetchmail | 4.6.3 | |
| fetchmail | fetchmail | 4.6.4 | |
| fetchmail | fetchmail | 4.6.5 | |
| fetchmail | fetchmail | 4.6.6 | |
| fetchmail | fetchmail | 4.6.7 | |
| fetchmail | fetchmail | 4.6.8 | |
| fetchmail | fetchmail | 4.6.9 | |
| fetchmail | fetchmail | 4.7.0 | |
| fetchmail | fetchmail | 4.7.1 | |
| fetchmail | fetchmail | 4.7.2 | |
| fetchmail | fetchmail | 4.7.3 | |
| fetchmail | fetchmail | 4.7.4 | |
| fetchmail | fetchmail | 4.7.5 | |
| fetchmail | fetchmail | 4.7.6 | |
| fetchmail | fetchmail | 4.7.7 | |
| fetchmail | fetchmail | 5.0.0 | |
| fetchmail | fetchmail | 5.0.1 | |
| fetchmail | fetchmail | 5.0.2 | |
| fetchmail | fetchmail | 5.0.3 | |
| fetchmail | fetchmail | 5.0.4 | |
| fetchmail | fetchmail | 5.0.5 | |
| fetchmail | fetchmail | 5.0.6 | |
| fetchmail | fetchmail | 5.0.7 | |
| fetchmail | fetchmail | 5.0.8 | |
| fetchmail | fetchmail | 5.1.0 | |
| fetchmail | fetchmail | 5.1.4 | |
| fetchmail | fetchmail | 5.2.0 | |
| fetchmail | fetchmail | 5.2.1 | |
| fetchmail | fetchmail | 5.2.3 | |
| fetchmail | fetchmail | 5.2.4 | |
| fetchmail | fetchmail | 5.2.7 | |
| fetchmail | fetchmail | 5.2.8 | |
| fetchmail | fetchmail | 5.3.0 | |
| fetchmail | fetchmail | 5.3.1 | |
| fetchmail | fetchmail | 5.3.3 | |
| fetchmail | fetchmail | 5.3.8 | |
| fetchmail | fetchmail | 5.4.0 | |
| fetchmail | fetchmail | 5.4.3 | |
| fetchmail | fetchmail | 5.4.4 | |
| fetchmail | fetchmail | 5.4.5 | |
| fetchmail | fetchmail | 5.5.0 | |
| fetchmail | fetchmail | 5.5.2 | |
| fetchmail | fetchmail | 5.5.3 | |
| fetchmail | fetchmail | 5.5.5 | |
| fetchmail | fetchmail | 5.5.6 | |
| fetchmail | fetchmail | 5.6.0 | |
| fetchmail | fetchmail | 5.7.0 | |
| fetchmail | fetchmail | 5.7.2 | |
| fetchmail | fetchmail | 5.7.4 | |
| fetchmail | fetchmail | 5.8 | |
| fetchmail | fetchmail | 5.8.1 | |
| fetchmail | fetchmail | 5.8.2 | |
| fetchmail | fetchmail | 5.8.3 | |
| fetchmail | fetchmail | 5.8.4 | |
| fetchmail | fetchmail | 5.8.5 | |
| fetchmail | fetchmail | 5.8.6 | |
| fetchmail | fetchmail | 5.8.11 | |
| fetchmail | fetchmail | 5.8.13 | |
| fetchmail | fetchmail | 5.8.14 | |
| fetchmail | fetchmail | 5.8.17 | |
| fetchmail | fetchmail | 5.9.0 | |
| fetchmail | fetchmail | 5.9.4 | |
| fetchmail | fetchmail | 5.9.5 | |
| fetchmail | fetchmail | 5.9.8 | |
| fetchmail | fetchmail | 5.9.10 | |
| fetchmail | fetchmail | 5.9.11 | |
| fetchmail | fetchmail | 5.9.13 | |
| fetchmail | fetchmail | 6.0.0 | |
| fetchmail | fetchmail | 6.1.0 | |
| fetchmail | fetchmail | 6.1.3 | |
| fetchmail | fetchmail | 6.2.0 | |
| fetchmail | fetchmail | 6.2.1 | |
| fetchmail | fetchmail | 6.2.2 | |
| fetchmail | fetchmail | 6.2.3 | |
| fetchmail | fetchmail | 6.2.4 | |
| fetchmail | fetchmail | 6.2.5 | |
| fetchmail | fetchmail | 6.2.5.1 | |
| fetchmail | fetchmail | 6.2.5.2 | |
| fetchmail | fetchmail | 6.2.5.4 | |
| fetchmail | fetchmail | 6.2.6 | |
| fetchmail | fetchmail | 6.2.6 | |
| fetchmail | fetchmail | 6.2.6 | |
| fetchmail | fetchmail | 6.2.9 | |
| fetchmail | fetchmail | 6.2.9 | |
| fetchmail | fetchmail | 6.2.9 | |
| fetchmail | fetchmail | 6.2.9 | |
| fetchmail | fetchmail | 6.2.9 | |
| fetchmail | fetchmail | 6.2.9 | |
| fetchmail | fetchmail | 6.2.9 | |
| fetchmail | fetchmail | 6.3.0 | |
| fetchmail | fetchmail | 6.3.1 | |
| fetchmail | fetchmail | 6.3.2 | |
| fetchmail | fetchmail | 6.3.3 | |
| fetchmail | fetchmail | 6.3.4 | |
| fetchmail | fetchmail | 6.3.5 | |
| fetchmail | fetchmail | 6.3.6 | |
| fetchmail | fetchmail | 6.3.6 | |
| fetchmail | fetchmail | 6.3.6 | |
| fetchmail | fetchmail | 6.3.6 | |
| fetchmail | fetchmail | 6.3.6 | |
| fetchmail | fetchmail | 6.3.6 | |
| fetchmail | fetchmail | 6.3.7 | |
| fetchmail | fetchmail | 6.3.8 | |
| fetchmail | fetchmail | 6.3.9 | |
| fetchmail | fetchmail | 6.3.10 | |
| fetchmail | fetchmail | 6.3.11 | |
| fetchmail | fetchmail | 6.3.12 | |
| fetchmail | fetchmail | 6.3.13 | |
| fetchmail | fetchmail | 6.3.14 | |
| fetchmail | fetchmail | 6.3.15 | |
| fetchmail | fetchmail | 6.3.16 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:*:rc2:*:*:*:*:*:*",
"matchCriteriaId": "6089D7C8-8651-4C85-9F03-96A2C2BBD380",
"versionEndIncluding": "6.3.9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E7EB9B1D-C6B0-494B-8A8C-752E5659EA1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "CC13DE1B-1428-4842-9567-BBE5EEF7042F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "215ED879-1E26-4FF4-8857-18499C5DE3A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "72604F3D-2DE8-4BFF-97D5-4AFA64399201",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "8792F7FF-9E56-4201-89FD-F0146D4F0DF9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.8:*:*:*:*:*:*:*",
"matchCriteriaId": "B12812E8-1C5B-46CF-A266-EE19C5CD3B12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.9:*:*:*:*:*:*:*",
"matchCriteriaId": "4DEAA0E8-746D-446D-AAEA-0ED287766332",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7D3E14C3-82AE-4D4A-8963-438BECBA5678",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4DCFB7BB-2879-4EB7-BE1D-163238E313C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6ED223B6-1864-415C-96D6-64E1EDE4C840",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "14CBC8ED-CC10-40B6-8AA7-9F1342432ECB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "D3417C2E-1117-4FE7-B2FA-74CAB57235B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.5:*:*:*:*:*:*:*",
"matchCriteriaId": "07C61DC4-50D5-44B2-92F8-A59C65144108",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.6:*:*:*:*:*:*:*",
"matchCriteriaId": "31A37E19-1E07-4FD0-AC6D-6AC3ED954787",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.7:*:*:*:*:*:*:*",
"matchCriteriaId": "570C9443-81CE-42AC-B4A6-3B2ABAD97EC5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "853DD3E0-668F-4FAC-BA0B-D4E9C416D646",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "CEF70FCA-5DA4-4C0B-B876-0345FA077D44",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BF0C4F7C-0003-4C77-AE22-A9C2FCBFAF3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "78D12F53-07DE-447D-8403-40EB75B91955",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "19ECB844-F378-4A94-B9FC-A731B8186013",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "3169AA63-79F6-4B89-9405-8F6A2FB6FD64",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "88D1D54C-81A4-44CE-BE12-798CF7DD2CC4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "D6615C7D-09B5-4943-A124-2FF9A0F4B927",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "EF18219F-0406-4D46-90DE-EA2A17C8EFF7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "87B56DFD-BDA9-4D8B-BE54-BF59B762D574",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "33EA0CA8-468F-4A94-8DA3-5D820AB65973",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BA21C847-57ED-4E7D-9366-6038467D9080",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0450BD04-15D2-4122-A210-6225B89BDA7F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "18428805-AEB2-4BA4-9762-906B59CE74D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "AFCCBB15-DFFE-4A57-A029-E57707D15E04",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "0427B5C8-265C-47C3-9BAB-B2A0EAA1DEE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "89A4B962-BE5B-471C-83EF-674525C5AE83",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7166ECCB-54FB-44EA-BA80-4D2AAF494AF2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6B309C89-99E2-4F0B-976C-95E44A45ADC5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A3DE7EE7-F627-4955-8D95-1F00F1F85C7D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.8:*:*:*:*:*:*:*",
"matchCriteriaId": "D549098D-FE16-4BCB-91C4-D71A8C8D2E9F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "57BFA165-6E2E-49AF-9E2D-3D8923CF36C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F5C67DFF-A1BE-4486-A11F-CD3729927220",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "1D365E6E-8777-4084-BEC8-7CBF4997D976",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "20C4FF28-0DBA-4995-8252-2D62FF896BC4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F80C6B9B-AFCE-46A1-8DEF-51C1B526EB18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BF667DB5-F41E-4E73-A01F-4EC3F60BAD0C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "D2B144FA-A901-4CDF-AC3D-7F5E820B7A4B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.5:*:*:*:*:*:*:*",
"matchCriteriaId": "96774635-9A12-4DAB-BCF6-2D678F244CE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.6:*:*:*:*:*:*:*",
"matchCriteriaId": "EFD2EE7A-36CB-4A26-8EEB-DACA2864D921",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C3898EBC-75A9-4DDD-A0AF-2CDEC72DAE4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4267DCE8-985C-416D-A6B7-536585E5A573",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "50E63EDF-FF0A-447C-A3FC-7BA2414C15CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "61DDD4A1-6185-41B6-A715-4C70F0AA2631",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8:*:*:*:*:*:*:*",
"matchCriteriaId": "B10A7E3C-07CD-48A6-9075-5314B4E1EEAB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "319955A4-27A8-46FF-ACE7-97E6DF27B2DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "925CF3DD-682B-40E6-900C-23F784CD9239",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.3:*:*:*:*:*:*:*",
"matchCriteriaId": "16366780-611E-4217-A614-EBA01421D148",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.4:*:*:*:*:*:*:*",
"matchCriteriaId": "43AEA36F-E730-4305-9CB6-738A7152F02E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.5:*:*:*:*:*:*:*",
"matchCriteriaId": "2B9536BA-6334-4957-9632-6D64365B88AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.6:*:*:*:*:*:*:*",
"matchCriteriaId": "F52FA32B-8048-4FD7-9D20-20DC5E52098B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.11:*:*:*:*:*:*:*",
"matchCriteriaId": "9FA92DF1-3AAD-46AC-A9E4-E9386C977818",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.13:*:*:*:*:*:*:*",
"matchCriteriaId": "837D66DB-F9CB-41F1-A091-BCFBAC2F45B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.14:*:*:*:*:*:*:*",
"matchCriteriaId": "74D12B67-6E66-419A-A28F-6306402931EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.17:*:*:*:*:*:*:*",
"matchCriteriaId": "A71FCBED-B25D-48E3-916C-FBA9E0DE8D12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1A17995E-DCAF-465A-8ABD-F1EA0D538784",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.4:*:*:*:*:*:*:*",
"matchCriteriaId": "93D03D78-C56E-4189-97FC-916C918EDFEE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.5:*:*:*:*:*:*:*",
"matchCriteriaId": "19A66C77-041F-4A12-8A36-233A6B50641C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.8:*:*:*:*:*:*:*",
"matchCriteriaId": "C945059C-EF39-486D-A804-FBB8704AB927",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.10:*:*:*:*:*:*:*",
"matchCriteriaId": "1258CA65-FBC1-4848-A9E5-A8F5E5D6FBD5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.11:*:*:*:*:*:*:*",
"matchCriteriaId": "A91C6418-41F0-46EB-ACFC-FCE907F5AA87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.13:*:*:*:*:*:*:*",
"matchCriteriaId": "0C020534-7596-496C-B9B0-739F58F6F4EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0A77D40C-6FF5-42BD-9EFB-B532824D7606",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F04C6A76-2718-4DBA-8972-A3EECDDB1A17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "38ACD96E-5582-4ED0-BBB1-C891094D8217",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "264386DA-747F-492C-B660-D49BE9DB7139",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DC4066AC-BE10-4189-86F6-BF94443738DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1C25A146-50D5-4BA2-ABA2-20BF8784D7DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "72E76256-997F-4229-9B03-7BC3074F359D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7A717C50-2C5A-4CD1-B2E6-8CDF450940CE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "61F908FF-9986-4F71-B0B6-D6A86555EF56",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B0C1F99C-A246-40D3-B84A-5D11FF24AC1B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "028F7F83-AF15-443B-A7DB-4E695E62EAFB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "B418C3CE-E6E6-401D-AD83-5BB181009A7F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.6:pre4:*:*:*:*:*:*",
"matchCriteriaId": "8BF06FD2-0A4C-4557-B8EF-F0F021179498",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.6:pre8:*:*:*:*:*:*",
"matchCriteriaId": "38C949C2-07A0-4FE4-8FBF-86215CB999CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.6:pre9:*:*:*:*:*:*",
"matchCriteriaId": "88B23630-79DD-4B69-BB01-286193BA562E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc10:*:*:*:*:*:*",
"matchCriteriaId": "5FE21564-68C0-4765-BA40-9D3046C4CB14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc3:*:*:*:*:*:*",
"matchCriteriaId": "208102ED-6F22-44C5-BAF1-FD85EACF208F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc4:*:*:*:*:*:*",
"matchCriteriaId": "C1CF7767-EB24-44E2-8E59-B4DBC99AFD23",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc5:*:*:*:*:*:*",
"matchCriteriaId": "CF3D6D4C-5FD8-4EE1-A34A-99D397F09E85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc7:*:*:*:*:*:*",
"matchCriteriaId": "D63D88C1-B201-4D48-9659-5802DC4FD3EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc8:*:*:*:*:*:*",
"matchCriteriaId": "16463B23-E884-467E-9F63-6B57EED39856",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc9:*:*:*:*:*:*",
"matchCriteriaId": "9F2C03AF-666D-4AF6-BC69-F8B081EB41AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "84F90AFA-4B13-46A0-89D7-4065300C94C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5DAD0F05-8B55-43ED-89D5-61A19F41EDFF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "99053698-7F8B-4E71-8647-1A8B0DF7CEB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "9314F22D-22A8-4374-A2BF-3C64CF1F69BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "816E9640-A932-4E2F-9793-689F80D2AA89",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "5D09BB43-6CBA-499B-91D1-BA256A65E40D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "ABE76611-08CE-4D85-B57A-021909835A81",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc1:*:*:*:*:*:*",
"matchCriteriaId": "B98AFEDF-2BAB-4588-94E0-35AEA5F1B514",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc2:*:*:*:*:*:*",
"matchCriteriaId": "4E8BAB5B-4DBC-4D05-B5E2-591573BC05FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc3:*:*:*:*:*:*",
"matchCriteriaId": "02F6E729-A2F2-42AC-A941-F57A0A4E84A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc4:*:*:*:*:*:*",
"matchCriteriaId": "4143D519-4B49-4E71-8686-FC6A095F0999",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc5:*:*:*:*:*:*",
"matchCriteriaId": "387ADB82-4FAD-44DA-ABF2-2F4645C4F1E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "CED4FBCB-B6DF-429D-871D-2A9F7F59E63B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.8:*:*:*:*:*:*:*",
"matchCriteriaId": "237F86BD-82CD-4A37-BF64-F103B1304F0C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.9:*:*:*:*:*:*:*",
"matchCriteriaId": "667847D9-58DD-4693-B544-593AC6D7746D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.10:*:*:*:*:*:*:*",
"matchCriteriaId": "C44EA07A-D8A9-4E43-AE2D-B9E41944CB07",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "F9882EBF-72D0-4C4F-99BA-929418B5D86B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.12:*:*:*:*:*:*:*",
"matchCriteriaId": "EE474E7E-EEE8-45E4-A995-A437CE7C08CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.13:*:*:*:*:*:*:*",
"matchCriteriaId": "2F96F2F2-B6CC-4138-8F9C-4CB906EDACDD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.14:*:*:*:*:*:*:*",
"matchCriteriaId": "22D580D8-FE6D-40E9-88A5-751A9C8CBAA7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.15:*:*:*:*:*:*:*",
"matchCriteriaId": "7C7E909A-F8F7-4FB1-8659-41A47C9B7C5A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.16:*:*:*:*:*:*:*",
"matchCriteriaId": "FDBC29B9-EC76-4F2C-BD00-A57C0D4B99EB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "fetchmail 4.6.3 through 6.3.16, when debug mode is enabled, does not properly handle invalid characters in a multi-character locale, which allows remote attackers to cause a denial of service (memory consumption and application crash) via a crafted (1) message header or (2) POP3 UIDL list."
},
{
"lang": "es",
"value": "fetchmail v4.6.3 hasta v6.3.16, cuando el modo depuraci\u00f3n est\u00e1 activo, no maneja de forma adecuada los caracteres inv\u00e1lidos en un multicaracter locale, lo que permite a atacantes provocar una denegaci\u00f3n de servicio (consumo de memoria y ca\u00edda de aplicaci\u00f3n) a trav\u00e9s de (1) cabecera de mensaje manipulada o (2) lista POP3 UIDL manipulada."
}
],
"id": "CVE-2010-1167",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2010-05-07T18:24:15.780",
"references": [
{
"source": "secalert@redhat.com",
"url": "http://developer.berlios.de/project/shownotes.php?group_id=1824\u0026release_id=17512"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch"
],
"url": "http://www.fetchmail.info/fetchmail-SA-2010-02.txt"
},
{
"source": "secalert@redhat.com",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:107"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/archive/1/511140/100/0/threaded"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/bid/39556"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://developer.berlios.de/project/shownotes.php?group_id=1824\u0026release_id=17512"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.fetchmail.info/fetchmail-SA-2010-02.txt"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:107"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/511140/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/39556"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vendorComments": [
{
"comment": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-1167\n\nThe Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw.",
"lastModified": "2010-05-10T00:00:00",
"organization": "Red Hat"
}
],
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2010-0562
Vulnerability from fkie_nvd - Published: 2010-02-08 21:30 - Updated: 2025-04-11 00:51
Severity ?
Summary
The sdump function in sdump.c in fetchmail 6.3.11, 6.3.12, and 6.3.13, when running in verbose mode on platforms for which char is signed, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an SSL X.509 certificate containing non-printable characters with the high bit set, which triggers a heap-based buffer overflow during escaping.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | http://mknod.org/svn/fetchmail/branches/BRANCH_6-3/fetchmail-SA-2010-01.txt | ||
| cve@mitre.org | http://osvdb.org/62114 | ||
| cve@mitre.org | http://secunia.com/advisories/38391 | Vendor Advisory | |
| cve@mitre.org | http://www.fetchmail.info/fetchmail-SA-2010-01.txt | Vendor Advisory | |
| cve@mitre.org | http://www.mandriva.com/security/advisories?name=MDVSA-2010:037 | ||
| cve@mitre.org | http://www.securityfocus.com/bid/38088 | ||
| cve@mitre.org | http://www.securitytracker.com/id?1023543 | ||
| cve@mitre.org | http://www.vupen.com/english/advisories/2010/0296 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://mknod.org/svn/fetchmail/branches/BRANCH_6-3/fetchmail-SA-2010-01.txt | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/62114 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/38391 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.fetchmail.info/fetchmail-SA-2010-01.txt | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2010:037 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/38088 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1023543 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/0296 | Vendor Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "F9882EBF-72D0-4C4F-99BA-929418B5D86B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.12:*:*:*:*:*:*:*",
"matchCriteriaId": "EE474E7E-EEE8-45E4-A995-A437CE7C08CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.13:*:*:*:*:*:*:*",
"matchCriteriaId": "2F96F2F2-B6CC-4138-8F9C-4CB906EDACDD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The sdump function in sdump.c in fetchmail 6.3.11, 6.3.12, and 6.3.13, when running in verbose mode on platforms for which char is signed, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an SSL X.509 certificate containing non-printable characters with the high bit set, which triggers a heap-based buffer overflow during escaping."
},
{
"lang": "es",
"value": "La funci\u00f3n sdump en sdum.c en fetchmail v6.3.11, v6.3.12 y v6.3.13, cuando est\u00e1 ejecutado en modo verbose sobre plataformas para las que los caracteres van firmados, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda de aplicaci\u00f3n) o posiblemente la ejecuci\u00f3n de c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un certificado X.509 que contiene caracteres no imprimibles con el bit m\u00e1s alto asignado, lo que provoca un desbordamiento de b\u00fafer basado en memoria din\u00e1mica (heap) durante el escape."
}
],
"id": "CVE-2010-0562",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2010-02-08T21:30:00.483",
"references": [
{
"source": "cve@mitre.org",
"url": "http://mknod.org/svn/fetchmail/branches/BRANCH_6-3/fetchmail-SA-2010-01.txt"
},
{
"source": "cve@mitre.org",
"url": "http://osvdb.org/62114"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/38391"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.fetchmail.info/fetchmail-SA-2010-01.txt"
},
{
"source": "cve@mitre.org",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:037"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/38088"
},
{
"source": "cve@mitre.org",
"url": "http://www.securitytracker.com/id?1023543"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2010/0296"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://mknod.org/svn/fetchmail/branches/BRANCH_6-3/fetchmail-SA-2010-01.txt"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://osvdb.org/62114"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/38391"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.fetchmail.info/fetchmail-SA-2010-01.txt"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:037"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/38088"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1023543"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2010/0296"
}
],
"sourceIdentifier": "cve@mitre.org",
"vendorComments": [
{
"comment": "Not vulnerable. This issue did not affect the versions of fetchmail as shipped with Red Hat Enterprise Linux 3, 4, or 5.",
"lastModified": "2010-02-09T00:00:00",
"organization": "Red Hat"
}
],
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2009-2666
Vulnerability from fkie_nvd - Published: 2009-08-07 19:00 - Updated: 2025-04-09 00:30
Severity ?
Summary
socket.c in fetchmail before 6.3.11 does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | http://fetchmail.berlios.de/fetchmail-SA-2009-01.txt | ||
| cve@mitre.org | http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html | ||
| cve@mitre.org | http://marc.info/?l=oss-security&m=124949601207156&w=2 | ||
| cve@mitre.org | http://osvdb.org/56855 | ||
| cve@mitre.org | http://secunia.com/advisories/36175 | Vendor Advisory | |
| cve@mitre.org | http://secunia.com/advisories/36179 | Vendor Advisory | |
| cve@mitre.org | http://secunia.com/advisories/36236 | Vendor Advisory | |
| cve@mitre.org | http://support.apple.com/kb/HT3937 | ||
| cve@mitre.org | http://www.debian.org/security/2009/dsa-1852 | ||
| cve@mitre.org | http://www.mandriva.com/security/advisories?name=MDVSA-2009:201 | ||
| cve@mitre.org | http://www.securityfocus.com/archive/1/505530/100/0/threaded | ||
| cve@mitre.org | http://www.securityfocus.com/bid/35951 | ||
| cve@mitre.org | http://www.securitytracker.com/id?1022679 | ||
| cve@mitre.org | http://www.slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.543463 | ||
| cve@mitre.org | http://www.vupen.com/english/advisories/2009/2155 | Vendor Advisory | |
| cve@mitre.org | http://www.vupen.com/english/advisories/2009/3184 | Vendor Advisory | |
| cve@mitre.org | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11059 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://fetchmail.berlios.de/fetchmail-SA-2009-01.txt | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=oss-security&m=124949601207156&w=2 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/56855 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/36175 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/36179 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/36236 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://support.apple.com/kb/HT3937 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2009/dsa-1852 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2009:201 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/505530/100/0/threaded | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/35951 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1022679 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.543463 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2009/2155 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2009/3184 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11059 |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| fetchmail | fetchmail | * | |
| fetchmail | fetchmail | 4.5.1 | |
| fetchmail | fetchmail | 4.5.2 | |
| fetchmail | fetchmail | 4.5.3 | |
| fetchmail | fetchmail | 4.5.4 | |
| fetchmail | fetchmail | 4.5.5 | |
| fetchmail | fetchmail | 4.5.6 | |
| fetchmail | fetchmail | 4.5.7 | |
| fetchmail | fetchmail | 4.5.8 | |
| fetchmail | fetchmail | 4.6.0 | |
| fetchmail | fetchmail | 4.6.1 | |
| fetchmail | fetchmail | 4.6.2 | |
| fetchmail | fetchmail | 4.6.3 | |
| fetchmail | fetchmail | 4.6.4 | |
| fetchmail | fetchmail | 4.6.5 | |
| fetchmail | fetchmail | 4.6.6 | |
| fetchmail | fetchmail | 4.6.7 | |
| fetchmail | fetchmail | 4.6.8 | |
| fetchmail | fetchmail | 4.6.9 | |
| fetchmail | fetchmail | 4.7.0 | |
| fetchmail | fetchmail | 4.7.1 | |
| fetchmail | fetchmail | 4.7.2 | |
| fetchmail | fetchmail | 4.7.3 | |
| fetchmail | fetchmail | 4.7.4 | |
| fetchmail | fetchmail | 4.7.5 | |
| fetchmail | fetchmail | 4.7.6 | |
| fetchmail | fetchmail | 4.7.7 | |
| fetchmail | fetchmail | 5.0.0 | |
| fetchmail | fetchmail | 5.0.1 | |
| fetchmail | fetchmail | 5.0.2 | |
| fetchmail | fetchmail | 5.0.3 | |
| fetchmail | fetchmail | 5.0.4 | |
| fetchmail | fetchmail | 5.0.5 | |
| fetchmail | fetchmail | 5.0.6 | |
| fetchmail | fetchmail | 5.0.7 | |
| fetchmail | fetchmail | 5.0.8 | |
| fetchmail | fetchmail | 5.1.0 | |
| fetchmail | fetchmail | 5.1.4 | |
| fetchmail | fetchmail | 5.2.0 | |
| fetchmail | fetchmail | 5.2.1 | |
| fetchmail | fetchmail | 5.2.3 | |
| fetchmail | fetchmail | 5.2.4 | |
| fetchmail | fetchmail | 5.2.7 | |
| fetchmail | fetchmail | 5.2.8 | |
| fetchmail | fetchmail | 5.3.0 | |
| fetchmail | fetchmail | 5.3.1 | |
| fetchmail | fetchmail | 5.3.3 | |
| fetchmail | fetchmail | 5.3.8 | |
| fetchmail | fetchmail | 5.4.0 | |
| fetchmail | fetchmail | 5.4.3 | |
| fetchmail | fetchmail | 5.4.4 | |
| fetchmail | fetchmail | 5.4.5 | |
| fetchmail | fetchmail | 5.5.0 | |
| fetchmail | fetchmail | 5.5.2 | |
| fetchmail | fetchmail | 5.5.3 | |
| fetchmail | fetchmail | 5.5.5 | |
| fetchmail | fetchmail | 5.5.6 | |
| fetchmail | fetchmail | 5.6.0 | |
| fetchmail | fetchmail | 5.7.0 | |
| fetchmail | fetchmail | 5.7.2 | |
| fetchmail | fetchmail | 5.7.4 | |
| fetchmail | fetchmail | 5.8 | |
| fetchmail | fetchmail | 5.8.1 | |
| fetchmail | fetchmail | 5.8.2 | |
| fetchmail | fetchmail | 5.8.3 | |
| fetchmail | fetchmail | 5.8.4 | |
| fetchmail | fetchmail | 5.8.5 | |
| fetchmail | fetchmail | 5.8.6 | |
| fetchmail | fetchmail | 5.8.11 | |
| fetchmail | fetchmail | 5.8.13 | |
| fetchmail | fetchmail | 5.8.14 | |
| fetchmail | fetchmail | 5.8.17 | |
| fetchmail | fetchmail | 5.9.0 | |
| fetchmail | fetchmail | 5.9.4 | |
| fetchmail | fetchmail | 5.9.5 | |
| fetchmail | fetchmail | 5.9.8 | |
| fetchmail | fetchmail | 5.9.10 | |
| fetchmail | fetchmail | 5.9.11 | |
| fetchmail | fetchmail | 5.9.13 | |
| fetchmail | fetchmail | 6.0.0 | |
| fetchmail | fetchmail | 6.1.0 | |
| fetchmail | fetchmail | 6.1.3 | |
| fetchmail | fetchmail | 6.2.0 | |
| fetchmail | fetchmail | 6.2.1 | |
| fetchmail | fetchmail | 6.2.2 | |
| fetchmail | fetchmail | 6.2.3 | |
| fetchmail | fetchmail | 6.2.4 | |
| fetchmail | fetchmail | 6.2.5 | |
| fetchmail | fetchmail | 6.2.5.1 | |
| fetchmail | fetchmail | 6.2.5.2 | |
| fetchmail | fetchmail | 6.2.5.4 | |
| fetchmail | fetchmail | 6.2.6 | |
| fetchmail | fetchmail | 6.2.6 | |
| fetchmail | fetchmail | 6.2.6 | |
| fetchmail | fetchmail | 6.2.9 | |
| fetchmail | fetchmail | 6.2.9 | |
| fetchmail | fetchmail | 6.2.9 | |
| fetchmail | fetchmail | 6.2.9 | |
| fetchmail | fetchmail | 6.2.9 | |
| fetchmail | fetchmail | 6.2.9 | |
| fetchmail | fetchmail | 6.2.9 | |
| fetchmail | fetchmail | 6.3.0 | |
| fetchmail | fetchmail | 6.3.1 | |
| fetchmail | fetchmail | 6.3.2 | |
| fetchmail | fetchmail | 6.3.3 | |
| fetchmail | fetchmail | 6.3.4 | |
| fetchmail | fetchmail | 6.3.5 | |
| fetchmail | fetchmail | 6.3.6 | |
| fetchmail | fetchmail | 6.3.6 | |
| fetchmail | fetchmail | 6.3.6 | |
| fetchmail | fetchmail | 6.3.6 | |
| fetchmail | fetchmail | 6.3.6 | |
| fetchmail | fetchmail | 6.3.6 | |
| fetchmail | fetchmail | 6.3.7 | |
| fetchmail | fetchmail | 6.3.8 | |
| fetchmail | fetchmail | 6.3.9 | |
| fetchmail | fetchmail | 6.3.9 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:*:*:*:*:*:*:*:*",
"matchCriteriaId": "21F26EF3-6F31-46C9-9D08-396B3708E498",
"versionEndIncluding": "6.3.10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BF519D04-7596-42C6-A1D8-FC1018D1A414",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9AFEC739-BDFA-4D14-9A04-96FFB71AE330",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E1923712-7B88-483E-B38A-0EA6FB38EB38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "C9608A96-D131-401B-B041-09ADEEB59354",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.5:*:*:*:*:*:*:*",
"matchCriteriaId": "F4555DBB-B63B-4637-86A9-399B34B27D14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.6:*:*:*:*:*:*:*",
"matchCriteriaId": "D8AB8504-8CD1-4013-9413-1378F3BAE0AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.7:*:*:*:*:*:*:*",
"matchCriteriaId": "3DC47DA9-D110-4E6B-9F5B-D17ECB942B40",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.8:*:*:*:*:*:*:*",
"matchCriteriaId": "345D0848-958F-4B44-8F31-0793C36A5ADD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7E179061-FB6A-44AA-8EAC-4916719D9A28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "58A6B5F4-C799-45C4-9EAD-A55023767033",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "54FDB8B9-5537-4E08-8FA0-931D4BED43E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E7EB9B1D-C6B0-494B-8A8C-752E5659EA1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "CC13DE1B-1428-4842-9567-BBE5EEF7042F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "215ED879-1E26-4FF4-8857-18499C5DE3A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "72604F3D-2DE8-4BFF-97D5-4AFA64399201",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "8792F7FF-9E56-4201-89FD-F0146D4F0DF9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.8:*:*:*:*:*:*:*",
"matchCriteriaId": "B12812E8-1C5B-46CF-A266-EE19C5CD3B12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.9:*:*:*:*:*:*:*",
"matchCriteriaId": "4DEAA0E8-746D-446D-AAEA-0ED287766332",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7D3E14C3-82AE-4D4A-8963-438BECBA5678",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4DCFB7BB-2879-4EB7-BE1D-163238E313C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6ED223B6-1864-415C-96D6-64E1EDE4C840",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "14CBC8ED-CC10-40B6-8AA7-9F1342432ECB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "D3417C2E-1117-4FE7-B2FA-74CAB57235B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.5:*:*:*:*:*:*:*",
"matchCriteriaId": "07C61DC4-50D5-44B2-92F8-A59C65144108",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.6:*:*:*:*:*:*:*",
"matchCriteriaId": "31A37E19-1E07-4FD0-AC6D-6AC3ED954787",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.7:*:*:*:*:*:*:*",
"matchCriteriaId": "570C9443-81CE-42AC-B4A6-3B2ABAD97EC5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "853DD3E0-668F-4FAC-BA0B-D4E9C416D646",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "CEF70FCA-5DA4-4C0B-B876-0345FA077D44",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BF0C4F7C-0003-4C77-AE22-A9C2FCBFAF3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "78D12F53-07DE-447D-8403-40EB75B91955",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "19ECB844-F378-4A94-B9FC-A731B8186013",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "3169AA63-79F6-4B89-9405-8F6A2FB6FD64",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "88D1D54C-81A4-44CE-BE12-798CF7DD2CC4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "D6615C7D-09B5-4943-A124-2FF9A0F4B927",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "EF18219F-0406-4D46-90DE-EA2A17C8EFF7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "87B56DFD-BDA9-4D8B-BE54-BF59B762D574",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "33EA0CA8-468F-4A94-8DA3-5D820AB65973",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BA21C847-57ED-4E7D-9366-6038467D9080",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0450BD04-15D2-4122-A210-6225B89BDA7F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "18428805-AEB2-4BA4-9762-906B59CE74D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "AFCCBB15-DFFE-4A57-A029-E57707D15E04",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "0427B5C8-265C-47C3-9BAB-B2A0EAA1DEE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "89A4B962-BE5B-471C-83EF-674525C5AE83",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7166ECCB-54FB-44EA-BA80-4D2AAF494AF2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6B309C89-99E2-4F0B-976C-95E44A45ADC5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A3DE7EE7-F627-4955-8D95-1F00F1F85C7D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.8:*:*:*:*:*:*:*",
"matchCriteriaId": "D549098D-FE16-4BCB-91C4-D71A8C8D2E9F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "57BFA165-6E2E-49AF-9E2D-3D8923CF36C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F5C67DFF-A1BE-4486-A11F-CD3729927220",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "1D365E6E-8777-4084-BEC8-7CBF4997D976",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "20C4FF28-0DBA-4995-8252-2D62FF896BC4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F80C6B9B-AFCE-46A1-8DEF-51C1B526EB18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BF667DB5-F41E-4E73-A01F-4EC3F60BAD0C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "D2B144FA-A901-4CDF-AC3D-7F5E820B7A4B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.5:*:*:*:*:*:*:*",
"matchCriteriaId": "96774635-9A12-4DAB-BCF6-2D678F244CE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.6:*:*:*:*:*:*:*",
"matchCriteriaId": "EFD2EE7A-36CB-4A26-8EEB-DACA2864D921",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C3898EBC-75A9-4DDD-A0AF-2CDEC72DAE4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4267DCE8-985C-416D-A6B7-536585E5A573",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "50E63EDF-FF0A-447C-A3FC-7BA2414C15CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "61DDD4A1-6185-41B6-A715-4C70F0AA2631",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8:*:*:*:*:*:*:*",
"matchCriteriaId": "B10A7E3C-07CD-48A6-9075-5314B4E1EEAB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "319955A4-27A8-46FF-ACE7-97E6DF27B2DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "925CF3DD-682B-40E6-900C-23F784CD9239",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.3:*:*:*:*:*:*:*",
"matchCriteriaId": "16366780-611E-4217-A614-EBA01421D148",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.4:*:*:*:*:*:*:*",
"matchCriteriaId": "43AEA36F-E730-4305-9CB6-738A7152F02E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.5:*:*:*:*:*:*:*",
"matchCriteriaId": "2B9536BA-6334-4957-9632-6D64365B88AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.6:*:*:*:*:*:*:*",
"matchCriteriaId": "F52FA32B-8048-4FD7-9D20-20DC5E52098B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.11:*:*:*:*:*:*:*",
"matchCriteriaId": "9FA92DF1-3AAD-46AC-A9E4-E9386C977818",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.13:*:*:*:*:*:*:*",
"matchCriteriaId": "837D66DB-F9CB-41F1-A091-BCFBAC2F45B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.14:*:*:*:*:*:*:*",
"matchCriteriaId": "74D12B67-6E66-419A-A28F-6306402931EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.17:*:*:*:*:*:*:*",
"matchCriteriaId": "A71FCBED-B25D-48E3-916C-FBA9E0DE8D12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1A17995E-DCAF-465A-8ABD-F1EA0D538784",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.4:*:*:*:*:*:*:*",
"matchCriteriaId": "93D03D78-C56E-4189-97FC-916C918EDFEE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.5:*:*:*:*:*:*:*",
"matchCriteriaId": "19A66C77-041F-4A12-8A36-233A6B50641C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.8:*:*:*:*:*:*:*",
"matchCriteriaId": "C945059C-EF39-486D-A804-FBB8704AB927",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.10:*:*:*:*:*:*:*",
"matchCriteriaId": "1258CA65-FBC1-4848-A9E5-A8F5E5D6FBD5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.11:*:*:*:*:*:*:*",
"matchCriteriaId": "A91C6418-41F0-46EB-ACFC-FCE907F5AA87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.13:*:*:*:*:*:*:*",
"matchCriteriaId": "0C020534-7596-496C-B9B0-739F58F6F4EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0A77D40C-6FF5-42BD-9EFB-B532824D7606",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F04C6A76-2718-4DBA-8972-A3EECDDB1A17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "38ACD96E-5582-4ED0-BBB1-C891094D8217",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "264386DA-747F-492C-B660-D49BE9DB7139",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DC4066AC-BE10-4189-86F6-BF94443738DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1C25A146-50D5-4BA2-ABA2-20BF8784D7DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "72E76256-997F-4229-9B03-7BC3074F359D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7A717C50-2C5A-4CD1-B2E6-8CDF450940CE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "61F908FF-9986-4F71-B0B6-D6A86555EF56",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B0C1F99C-A246-40D3-B84A-5D11FF24AC1B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "028F7F83-AF15-443B-A7DB-4E695E62EAFB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "B418C3CE-E6E6-401D-AD83-5BB181009A7F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.6:pre4:*:*:*:*:*:*",
"matchCriteriaId": "8BF06FD2-0A4C-4557-B8EF-F0F021179498",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.6:pre8:*:*:*:*:*:*",
"matchCriteriaId": "38C949C2-07A0-4FE4-8FBF-86215CB999CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.6:pre9:*:*:*:*:*:*",
"matchCriteriaId": "88B23630-79DD-4B69-BB01-286193BA562E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc10:*:*:*:*:*:*",
"matchCriteriaId": "5FE21564-68C0-4765-BA40-9D3046C4CB14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc3:*:*:*:*:*:*",
"matchCriteriaId": "208102ED-6F22-44C5-BAF1-FD85EACF208F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc4:*:*:*:*:*:*",
"matchCriteriaId": "C1CF7767-EB24-44E2-8E59-B4DBC99AFD23",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc5:*:*:*:*:*:*",
"matchCriteriaId": "CF3D6D4C-5FD8-4EE1-A34A-99D397F09E85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc7:*:*:*:*:*:*",
"matchCriteriaId": "D63D88C1-B201-4D48-9659-5802DC4FD3EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc8:*:*:*:*:*:*",
"matchCriteriaId": "16463B23-E884-467E-9F63-6B57EED39856",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc9:*:*:*:*:*:*",
"matchCriteriaId": "9F2C03AF-666D-4AF6-BC69-F8B081EB41AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "84F90AFA-4B13-46A0-89D7-4065300C94C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5DAD0F05-8B55-43ED-89D5-61A19F41EDFF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "99053698-7F8B-4E71-8647-1A8B0DF7CEB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "9314F22D-22A8-4374-A2BF-3C64CF1F69BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "816E9640-A932-4E2F-9793-689F80D2AA89",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "5D09BB43-6CBA-499B-91D1-BA256A65E40D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "ABE76611-08CE-4D85-B57A-021909835A81",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc1:*:*:*:*:*:*",
"matchCriteriaId": "B98AFEDF-2BAB-4588-94E0-35AEA5F1B514",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc2:*:*:*:*:*:*",
"matchCriteriaId": "4E8BAB5B-4DBC-4D05-B5E2-591573BC05FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc3:*:*:*:*:*:*",
"matchCriteriaId": "02F6E729-A2F2-42AC-A941-F57A0A4E84A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc4:*:*:*:*:*:*",
"matchCriteriaId": "4143D519-4B49-4E71-8686-FC6A095F0999",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc5:*:*:*:*:*:*",
"matchCriteriaId": "387ADB82-4FAD-44DA-ABF2-2F4645C4F1E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "CED4FBCB-B6DF-429D-871D-2A9F7F59E63B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.8:*:*:*:*:*:*:*",
"matchCriteriaId": "237F86BD-82CD-4A37-BF64-F103B1304F0C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.9:*:*:*:*:*:*:*",
"matchCriteriaId": "667847D9-58DD-4693-B544-593AC6D7746D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.9:rc2:*:*:*:*:*:*",
"matchCriteriaId": "12BA2E29-5547-45F5-BC46-1A7B4A222055",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "socket.c in fetchmail before 6.3.11 does not properly handle a \u0027\\0\u0027 character in a domain name in the subject\u0027s Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408."
},
{
"lang": "es",
"value": "socket.c en fetchmail antes de v6.3.11 no maneja correctamente un caracter \u0027\\ 0\u0027 en el nombre de dominio en el campo Common Name (CN) de un certificado X.509, lo cual permite a atacacantes hombre-en-el-medio (man-in-the-middle) suplantar servidores SSL a su elecci\u00f3n a trav\u00e9s de certificados manipulados expedidos por una Autoridad de Certificaci\u00f3n (CA) leg\u00edtima, una cuesti\u00f3n relacionada con CVE-2009-2408."
}
],
"id": "CVE-2009-2666",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2009-08-07T19:00:01.063",
"references": [
{
"source": "cve@mitre.org",
"url": "http://fetchmail.berlios.de/fetchmail-SA-2009-01.txt"
},
{
"source": "cve@mitre.org",
"url": "http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html"
},
{
"source": "cve@mitre.org",
"url": "http://marc.info/?l=oss-security\u0026m=124949601207156\u0026w=2"
},
{
"source": "cve@mitre.org",
"url": "http://osvdb.org/56855"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/36175"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/36179"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/36236"
},
{
"source": "cve@mitre.org",
"url": "http://support.apple.com/kb/HT3937"
},
{
"source": "cve@mitre.org",
"url": "http://www.debian.org/security/2009/dsa-1852"
},
{
"source": "cve@mitre.org",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:201"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/archive/1/505530/100/0/threaded"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/35951"
},
{
"source": "cve@mitre.org",
"url": "http://www.securitytracker.com/id?1022679"
},
{
"source": "cve@mitre.org",
"url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.543463"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/2155"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/3184"
},
{
"source": "cve@mitre.org",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11059"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://fetchmail.berlios.de/fetchmail-SA-2009-01.txt"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://marc.info/?l=oss-security\u0026m=124949601207156\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://osvdb.org/56855"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/36175"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/36179"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/36236"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://support.apple.com/kb/HT3937"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2009/dsa-1852"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:201"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/505530/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/35951"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1022679"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.543463"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/2155"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/3184"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11059"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-310"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2008-2711
Vulnerability from fkie_nvd - Published: 2008-06-16 21:41 - Updated: 2025-04-09 00:30
Severity ?
Summary
fetchmail 6.3.8 and earlier, when running in -v -v (aka verbose) mode, allows remote attackers to cause a denial of service (crash and persistent mail failure) via a malformed mail message with long headers, which triggers an erroneous dereference when using vsnprintf to format log messages.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html | ||
| cve@mitre.org | http://secunia.com/advisories/30742 | Vendor Advisory | |
| cve@mitre.org | http://secunia.com/advisories/30895 | Vendor Advisory | |
| cve@mitre.org | http://secunia.com/advisories/31262 | Vendor Advisory | |
| cve@mitre.org | http://secunia.com/advisories/31287 | Vendor Advisory | |
| cve@mitre.org | http://secunia.com/advisories/33937 | Vendor Advisory | |
| cve@mitre.org | http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.495740 | ||
| cve@mitre.org | http://support.apple.com/kb/HT3438 | ||
| cve@mitre.org | http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0235 | ||
| cve@mitre.org | http://www.fetchmail.info/fetchmail-SA-2008-01.txt | ||
| cve@mitre.org | http://www.mandriva.com/security/advisories?name=MDVSA-2008:117 | ||
| cve@mitre.org | http://www.openwall.com/lists/oss-security/2008/06/13/1 | ||
| cve@mitre.org | http://www.openwall.com/lists/oss-security/2021/08/09/1 | ||
| cve@mitre.org | http://www.securityfocus.com/archive/1/493391/100/0/threaded | ||
| cve@mitre.org | http://www.securityfocus.com/archive/1/494865/100/0/threaded | ||
| cve@mitre.org | http://www.securityfocus.com/bid/29705 | ||
| cve@mitre.org | http://www.securitytracker.com/id?1020298 | ||
| cve@mitre.org | http://www.vupen.com/english/advisories/2008/1860/references | ||
| cve@mitre.org | http://www.vupen.com/english/advisories/2009/0422 | ||
| cve@mitre.org | https://bugzilla.novell.com/show_bug.cgi?id=354291 | ||
| cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/43121 | ||
| cve@mitre.org | https://issues.rpath.com/browse/RPL-2623 | ||
| cve@mitre.org | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10950 | ||
| cve@mitre.org | https://www.redhat.com/archives/fedora-package-announce/2008-June/msg01091.html | ||
| cve@mitre.org | https://www.redhat.com/archives/fedora-package-announce/2008-June/msg01095.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/30742 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/30895 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/31262 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/31287 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/33937 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.495740 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://support.apple.com/kb/HT3438 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0235 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.fetchmail.info/fetchmail-SA-2008-01.txt | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2008:117 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2008/06/13/1 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2021/08/09/1 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/493391/100/0/threaded | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/494865/100/0/threaded | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/29705 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1020298 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/1860/references | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2009/0422 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.novell.com/show_bug.cgi?id=354291 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/43121 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://issues.rpath.com/browse/RPL-2623 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10950 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://www.redhat.com/archives/fedora-package-announce/2008-June/msg01091.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://www.redhat.com/archives/fedora-package-announce/2008-June/msg01095.html |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| fetchmail | fetchmail | * | |
| fetchmail | fetchmail | 4.5.1 | |
| fetchmail | fetchmail | 4.5.2 | |
| fetchmail | fetchmail | 4.5.3 | |
| fetchmail | fetchmail | 4.5.4 | |
| fetchmail | fetchmail | 4.5.5 | |
| fetchmail | fetchmail | 4.5.6 | |
| fetchmail | fetchmail | 4.5.7 | |
| fetchmail | fetchmail | 4.5.8 | |
| fetchmail | fetchmail | 4.6.0 | |
| fetchmail | fetchmail | 4.6.1 | |
| fetchmail | fetchmail | 4.6.2 | |
| fetchmail | fetchmail | 4.6.3 | |
| fetchmail | fetchmail | 4.6.4 | |
| fetchmail | fetchmail | 4.6.5 | |
| fetchmail | fetchmail | 4.6.6 | |
| fetchmail | fetchmail | 4.6.7 | |
| fetchmail | fetchmail | 4.6.8 | |
| fetchmail | fetchmail | 4.6.9 | |
| fetchmail | fetchmail | 4.7.0 | |
| fetchmail | fetchmail | 4.7.1 | |
| fetchmail | fetchmail | 4.7.2 | |
| fetchmail | fetchmail | 4.7.3 | |
| fetchmail | fetchmail | 4.7.4 | |
| fetchmail | fetchmail | 4.7.5 | |
| fetchmail | fetchmail | 4.7.6 | |
| fetchmail | fetchmail | 4.7.7 | |
| fetchmail | fetchmail | 5.0.0 | |
| fetchmail | fetchmail | 5.0.1 | |
| fetchmail | fetchmail | 5.0.2 | |
| fetchmail | fetchmail | 5.0.3 | |
| fetchmail | fetchmail | 5.0.4 | |
| fetchmail | fetchmail | 5.0.5 | |
| fetchmail | fetchmail | 5.0.6 | |
| fetchmail | fetchmail | 5.0.7 | |
| fetchmail | fetchmail | 5.0.8 | |
| fetchmail | fetchmail | 5.1.0 | |
| fetchmail | fetchmail | 5.1.4 | |
| fetchmail | fetchmail | 5.2.0 | |
| fetchmail | fetchmail | 5.2.1 | |
| fetchmail | fetchmail | 5.2.3 | |
| fetchmail | fetchmail | 5.2.4 | |
| fetchmail | fetchmail | 5.2.7 | |
| fetchmail | fetchmail | 5.2.8 | |
| fetchmail | fetchmail | 5.3.0 | |
| fetchmail | fetchmail | 5.3.1 | |
| fetchmail | fetchmail | 5.3.3 | |
| fetchmail | fetchmail | 5.3.8 | |
| fetchmail | fetchmail | 5.4.0 | |
| fetchmail | fetchmail | 5.4.3 | |
| fetchmail | fetchmail | 5.4.4 | |
| fetchmail | fetchmail | 5.4.5 | |
| fetchmail | fetchmail | 5.5.0 | |
| fetchmail | fetchmail | 5.5.2 | |
| fetchmail | fetchmail | 5.5.3 | |
| fetchmail | fetchmail | 5.5.5 | |
| fetchmail | fetchmail | 5.5.6 | |
| fetchmail | fetchmail | 5.6.0 | |
| fetchmail | fetchmail | 5.7.0 | |
| fetchmail | fetchmail | 5.7.2 | |
| fetchmail | fetchmail | 5.7.4 | |
| fetchmail | fetchmail | 5.8 | |
| fetchmail | fetchmail | 5.8.1 | |
| fetchmail | fetchmail | 5.8.2 | |
| fetchmail | fetchmail | 5.8.3 | |
| fetchmail | fetchmail | 5.8.4 | |
| fetchmail | fetchmail | 5.8.5 | |
| fetchmail | fetchmail | 5.8.6 | |
| fetchmail | fetchmail | 5.8.11 | |
| fetchmail | fetchmail | 5.8.13 | |
| fetchmail | fetchmail | 5.8.14 | |
| fetchmail | fetchmail | 5.8.17 | |
| fetchmail | fetchmail | 5.9.0 | |
| fetchmail | fetchmail | 5.9.4 | |
| fetchmail | fetchmail | 5.9.5 | |
| fetchmail | fetchmail | 5.9.8 | |
| fetchmail | fetchmail | 5.9.10 | |
| fetchmail | fetchmail | 5.9.11 | |
| fetchmail | fetchmail | 5.9.13 | |
| fetchmail | fetchmail | 6.0.0 | |
| fetchmail | fetchmail | 6.1.0 | |
| fetchmail | fetchmail | 6.1.3 | |
| fetchmail | fetchmail | 6.2.0 | |
| fetchmail | fetchmail | 6.2.1 | |
| fetchmail | fetchmail | 6.2.2 | |
| fetchmail | fetchmail | 6.2.3 | |
| fetchmail | fetchmail | 6.2.4 | |
| fetchmail | fetchmail | 6.2.5 | |
| fetchmail | fetchmail | 6.2.5.1 | |
| fetchmail | fetchmail | 6.2.5.2 | |
| fetchmail | fetchmail | 6.2.5.4 | |
| fetchmail | fetchmail | 6.2.6 | |
| fetchmail | fetchmail | 6.2.6 | |
| fetchmail | fetchmail | 6.2.6 | |
| fetchmail | fetchmail | 6.2.9 | |
| fetchmail | fetchmail | 6.2.9 | |
| fetchmail | fetchmail | 6.2.9 | |
| fetchmail | fetchmail | 6.2.9 | |
| fetchmail | fetchmail | 6.2.9 | |
| fetchmail | fetchmail | 6.2.9 | |
| fetchmail | fetchmail | 6.2.9 | |
| fetchmail | fetchmail | 6.3.0 | |
| fetchmail | fetchmail | 6.3.1 | |
| fetchmail | fetchmail | 6.3.2 | |
| fetchmail | fetchmail | 6.3.3 | |
| fetchmail | fetchmail | 6.3.4 | |
| fetchmail | fetchmail | 6.3.5 | |
| fetchmail | fetchmail | 6.3.6 | |
| fetchmail | fetchmail | 6.3.6 | |
| fetchmail | fetchmail | 6.3.6 | |
| fetchmail | fetchmail | 6.3.6 | |
| fetchmail | fetchmail | 6.3.6 | |
| fetchmail | fetchmail | 6.3.6 | |
| fetchmail | fetchmail | 6.3.7 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BB18D768-33CE-4CB0-84A9-1D8CAF1080E1",
"versionEndIncluding": "6.3.8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BF519D04-7596-42C6-A1D8-FC1018D1A414",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9AFEC739-BDFA-4D14-9A04-96FFB71AE330",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E1923712-7B88-483E-B38A-0EA6FB38EB38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "C9608A96-D131-401B-B041-09ADEEB59354",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.5:*:*:*:*:*:*:*",
"matchCriteriaId": "F4555DBB-B63B-4637-86A9-399B34B27D14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.6:*:*:*:*:*:*:*",
"matchCriteriaId": "D8AB8504-8CD1-4013-9413-1378F3BAE0AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.7:*:*:*:*:*:*:*",
"matchCriteriaId": "3DC47DA9-D110-4E6B-9F5B-D17ECB942B40",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.8:*:*:*:*:*:*:*",
"matchCriteriaId": "345D0848-958F-4B44-8F31-0793C36A5ADD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7E179061-FB6A-44AA-8EAC-4916719D9A28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "58A6B5F4-C799-45C4-9EAD-A55023767033",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "54FDB8B9-5537-4E08-8FA0-931D4BED43E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E7EB9B1D-C6B0-494B-8A8C-752E5659EA1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "CC13DE1B-1428-4842-9567-BBE5EEF7042F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "215ED879-1E26-4FF4-8857-18499C5DE3A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "72604F3D-2DE8-4BFF-97D5-4AFA64399201",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "8792F7FF-9E56-4201-89FD-F0146D4F0DF9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.8:*:*:*:*:*:*:*",
"matchCriteriaId": "B12812E8-1C5B-46CF-A266-EE19C5CD3B12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.9:*:*:*:*:*:*:*",
"matchCriteriaId": "4DEAA0E8-746D-446D-AAEA-0ED287766332",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7D3E14C3-82AE-4D4A-8963-438BECBA5678",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4DCFB7BB-2879-4EB7-BE1D-163238E313C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6ED223B6-1864-415C-96D6-64E1EDE4C840",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "14CBC8ED-CC10-40B6-8AA7-9F1342432ECB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "D3417C2E-1117-4FE7-B2FA-74CAB57235B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.5:*:*:*:*:*:*:*",
"matchCriteriaId": "07C61DC4-50D5-44B2-92F8-A59C65144108",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.6:*:*:*:*:*:*:*",
"matchCriteriaId": "31A37E19-1E07-4FD0-AC6D-6AC3ED954787",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.7:*:*:*:*:*:*:*",
"matchCriteriaId": "570C9443-81CE-42AC-B4A6-3B2ABAD97EC5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "853DD3E0-668F-4FAC-BA0B-D4E9C416D646",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "CEF70FCA-5DA4-4C0B-B876-0345FA077D44",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BF0C4F7C-0003-4C77-AE22-A9C2FCBFAF3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "78D12F53-07DE-447D-8403-40EB75B91955",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "19ECB844-F378-4A94-B9FC-A731B8186013",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "3169AA63-79F6-4B89-9405-8F6A2FB6FD64",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "88D1D54C-81A4-44CE-BE12-798CF7DD2CC4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "D6615C7D-09B5-4943-A124-2FF9A0F4B927",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "EF18219F-0406-4D46-90DE-EA2A17C8EFF7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "87B56DFD-BDA9-4D8B-BE54-BF59B762D574",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "33EA0CA8-468F-4A94-8DA3-5D820AB65973",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BA21C847-57ED-4E7D-9366-6038467D9080",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0450BD04-15D2-4122-A210-6225B89BDA7F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "18428805-AEB2-4BA4-9762-906B59CE74D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "AFCCBB15-DFFE-4A57-A029-E57707D15E04",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "0427B5C8-265C-47C3-9BAB-B2A0EAA1DEE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "89A4B962-BE5B-471C-83EF-674525C5AE83",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7166ECCB-54FB-44EA-BA80-4D2AAF494AF2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6B309C89-99E2-4F0B-976C-95E44A45ADC5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A3DE7EE7-F627-4955-8D95-1F00F1F85C7D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.8:*:*:*:*:*:*:*",
"matchCriteriaId": "D549098D-FE16-4BCB-91C4-D71A8C8D2E9F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "57BFA165-6E2E-49AF-9E2D-3D8923CF36C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F5C67DFF-A1BE-4486-A11F-CD3729927220",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "1D365E6E-8777-4084-BEC8-7CBF4997D976",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "20C4FF28-0DBA-4995-8252-2D62FF896BC4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F80C6B9B-AFCE-46A1-8DEF-51C1B526EB18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BF667DB5-F41E-4E73-A01F-4EC3F60BAD0C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "D2B144FA-A901-4CDF-AC3D-7F5E820B7A4B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.5:*:*:*:*:*:*:*",
"matchCriteriaId": "96774635-9A12-4DAB-BCF6-2D678F244CE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.6:*:*:*:*:*:*:*",
"matchCriteriaId": "EFD2EE7A-36CB-4A26-8EEB-DACA2864D921",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C3898EBC-75A9-4DDD-A0AF-2CDEC72DAE4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4267DCE8-985C-416D-A6B7-536585E5A573",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "50E63EDF-FF0A-447C-A3FC-7BA2414C15CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "61DDD4A1-6185-41B6-A715-4C70F0AA2631",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8:*:*:*:*:*:*:*",
"matchCriteriaId": "B10A7E3C-07CD-48A6-9075-5314B4E1EEAB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "319955A4-27A8-46FF-ACE7-97E6DF27B2DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "925CF3DD-682B-40E6-900C-23F784CD9239",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.3:*:*:*:*:*:*:*",
"matchCriteriaId": "16366780-611E-4217-A614-EBA01421D148",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.4:*:*:*:*:*:*:*",
"matchCriteriaId": "43AEA36F-E730-4305-9CB6-738A7152F02E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.5:*:*:*:*:*:*:*",
"matchCriteriaId": "2B9536BA-6334-4957-9632-6D64365B88AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.6:*:*:*:*:*:*:*",
"matchCriteriaId": "F52FA32B-8048-4FD7-9D20-20DC5E52098B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.11:*:*:*:*:*:*:*",
"matchCriteriaId": "9FA92DF1-3AAD-46AC-A9E4-E9386C977818",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.13:*:*:*:*:*:*:*",
"matchCriteriaId": "837D66DB-F9CB-41F1-A091-BCFBAC2F45B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.14:*:*:*:*:*:*:*",
"matchCriteriaId": "74D12B67-6E66-419A-A28F-6306402931EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.17:*:*:*:*:*:*:*",
"matchCriteriaId": "A71FCBED-B25D-48E3-916C-FBA9E0DE8D12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1A17995E-DCAF-465A-8ABD-F1EA0D538784",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.4:*:*:*:*:*:*:*",
"matchCriteriaId": "93D03D78-C56E-4189-97FC-916C918EDFEE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.5:*:*:*:*:*:*:*",
"matchCriteriaId": "19A66C77-041F-4A12-8A36-233A6B50641C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.8:*:*:*:*:*:*:*",
"matchCriteriaId": "C945059C-EF39-486D-A804-FBB8704AB927",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.10:*:*:*:*:*:*:*",
"matchCriteriaId": "1258CA65-FBC1-4848-A9E5-A8F5E5D6FBD5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.11:*:*:*:*:*:*:*",
"matchCriteriaId": "A91C6418-41F0-46EB-ACFC-FCE907F5AA87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.13:*:*:*:*:*:*:*",
"matchCriteriaId": "0C020534-7596-496C-B9B0-739F58F6F4EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0A77D40C-6FF5-42BD-9EFB-B532824D7606",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F04C6A76-2718-4DBA-8972-A3EECDDB1A17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "38ACD96E-5582-4ED0-BBB1-C891094D8217",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "264386DA-747F-492C-B660-D49BE9DB7139",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DC4066AC-BE10-4189-86F6-BF94443738DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1C25A146-50D5-4BA2-ABA2-20BF8784D7DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "72E76256-997F-4229-9B03-7BC3074F359D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7A717C50-2C5A-4CD1-B2E6-8CDF450940CE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "61F908FF-9986-4F71-B0B6-D6A86555EF56",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B0C1F99C-A246-40D3-B84A-5D11FF24AC1B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "028F7F83-AF15-443B-A7DB-4E695E62EAFB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "B418C3CE-E6E6-401D-AD83-5BB181009A7F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.6:pre4:*:*:*:*:*:*",
"matchCriteriaId": "8BF06FD2-0A4C-4557-B8EF-F0F021179498",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.6:pre8:*:*:*:*:*:*",
"matchCriteriaId": "38C949C2-07A0-4FE4-8FBF-86215CB999CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.6:pre9:*:*:*:*:*:*",
"matchCriteriaId": "88B23630-79DD-4B69-BB01-286193BA562E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc10:*:*:*:*:*:*",
"matchCriteriaId": "5FE21564-68C0-4765-BA40-9D3046C4CB14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc3:*:*:*:*:*:*",
"matchCriteriaId": "208102ED-6F22-44C5-BAF1-FD85EACF208F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc4:*:*:*:*:*:*",
"matchCriteriaId": "C1CF7767-EB24-44E2-8E59-B4DBC99AFD23",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc5:*:*:*:*:*:*",
"matchCriteriaId": "CF3D6D4C-5FD8-4EE1-A34A-99D397F09E85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc7:*:*:*:*:*:*",
"matchCriteriaId": "D63D88C1-B201-4D48-9659-5802DC4FD3EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc8:*:*:*:*:*:*",
"matchCriteriaId": "16463B23-E884-467E-9F63-6B57EED39856",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc9:*:*:*:*:*:*",
"matchCriteriaId": "9F2C03AF-666D-4AF6-BC69-F8B081EB41AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "84F90AFA-4B13-46A0-89D7-4065300C94C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5DAD0F05-8B55-43ED-89D5-61A19F41EDFF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "99053698-7F8B-4E71-8647-1A8B0DF7CEB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "9314F22D-22A8-4374-A2BF-3C64CF1F69BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "816E9640-A932-4E2F-9793-689F80D2AA89",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "5D09BB43-6CBA-499B-91D1-BA256A65E40D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "ABE76611-08CE-4D85-B57A-021909835A81",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc1:*:*:*:*:*:*",
"matchCriteriaId": "B98AFEDF-2BAB-4588-94E0-35AEA5F1B514",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc2:*:*:*:*:*:*",
"matchCriteriaId": "4E8BAB5B-4DBC-4D05-B5E2-591573BC05FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc3:*:*:*:*:*:*",
"matchCriteriaId": "02F6E729-A2F2-42AC-A941-F57A0A4E84A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc4:*:*:*:*:*:*",
"matchCriteriaId": "4143D519-4B49-4E71-8686-FC6A095F0999",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc5:*:*:*:*:*:*",
"matchCriteriaId": "387ADB82-4FAD-44DA-ABF2-2F4645C4F1E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "CED4FBCB-B6DF-429D-871D-2A9F7F59E63B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "fetchmail 6.3.8 and earlier, when running in -v -v (aka verbose) mode, allows remote attackers to cause a denial of service (crash and persistent mail failure) via a malformed mail message with long headers, which triggers an erroneous dereference when using vsnprintf to format log messages."
},
{
"lang": "es",
"value": "fetchmail versi\u00f3n 6.3.8 y anteriores, cuando se ejecuta en modo -v -v (tambi\u00e9n se conoce como verbose), permite a los atacantes remotos causar una denegaci\u00f3n de servicio (bloqueo y fallo de correo persistente) por medio de un mensaje de correo malformado con encabezados largos, lo que desencadena unas desreferencias err\u00f3neas cuando se utiliza vsnprintf para dar formato a mensajes de registro."
}
],
"id": "CVE-2008-2711",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2008-06-16T21:41:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/30742"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/30895"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/31262"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/31287"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/33937"
},
{
"source": "cve@mitre.org",
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.495740"
},
{
"source": "cve@mitre.org",
"url": "http://support.apple.com/kb/HT3438"
},
{
"source": "cve@mitre.org",
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0235"
},
{
"source": "cve@mitre.org",
"url": "http://www.fetchmail.info/fetchmail-SA-2008-01.txt"
},
{
"source": "cve@mitre.org",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:117"
},
{
"source": "cve@mitre.org",
"url": "http://www.openwall.com/lists/oss-security/2008/06/13/1"
},
{
"source": "cve@mitre.org",
"url": "http://www.openwall.com/lists/oss-security/2021/08/09/1"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/archive/1/493391/100/0/threaded"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/archive/1/494865/100/0/threaded"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/29705"
},
{
"source": "cve@mitre.org",
"url": "http://www.securitytracker.com/id?1020298"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2008/1860/references"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2009/0422"
},
{
"source": "cve@mitre.org",
"url": "https://bugzilla.novell.com/show_bug.cgi?id=354291"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43121"
},
{
"source": "cve@mitre.org",
"url": "https://issues.rpath.com/browse/RPL-2623"
},
{
"source": "cve@mitre.org",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10950"
},
{
"source": "cve@mitre.org",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg01091.html"
},
{
"source": "cve@mitre.org",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg01095.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/30742"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/30895"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/31262"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/31287"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/33937"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.495740"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://support.apple.com/kb/HT3438"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0235"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.fetchmail.info/fetchmail-SA-2008-01.txt"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:117"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2008/06/13/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2021/08/09/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/493391/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/494865/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/29705"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1020298"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2008/1860/references"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2009/0422"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://bugzilla.novell.com/show_bug.cgi?id=354291"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43121"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://issues.rpath.com/browse/RPL-2623"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10950"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg01091.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg01095.html"
}
],
"sourceIdentifier": "cve@mitre.org",
"vendorComments": [
{
"comment": "This issue was addressed in fetchmail packages as shipped in Red Hat Enterprise Linux 3, 4, and 5 via:\n\nhttps://rhn.redhat.com/errata/RHSA-2009-1427.html",
"lastModified": "2009-09-09T00:00:00",
"organization": "Red Hat"
}
],
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2007-4565
Vulnerability from fkie_nvd - Published: 2007-08-28 01:17 - Updated: 2025-04-09 00:30
Severity ?
Summary
sink.c in fetchmail before 6.3.9 allows context-dependent attackers to cause a denial of service (NULL dereference and application crash) by refusing certain warning messages that are sent over SMTP.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | http://fetchmail.berlios.de/fetchmail-SA-2007-02.txt | ||
| cve@mitre.org | http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html | ||
| cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00008.html | ||
| cve@mitre.org | http://mknod.org/svn/fetchmail/branches/BRANCH_6-3/fetchmail-SA-2007-02.txt | Patch | |
| cve@mitre.org | http://osvdb.org/45833 | ||
| cve@mitre.org | http://secunia.com/advisories/27399 | Vendor Advisory | |
| cve@mitre.org | http://secunia.com/advisories/33937 | Vendor Advisory | |
| cve@mitre.org | http://securityreason.com/securityalert/3074 | ||
| cve@mitre.org | http://support.apple.com/kb/HT3438 | ||
| cve@mitre.org | http://www.debian.org/security/2007/dsa-1377 | ||
| cve@mitre.org | http://www.mandriva.com/security/advisories?name=MDKSA-2007:179 | ||
| cve@mitre.org | http://www.securityfocus.com/archive/1/478798/100/0/threaded | ||
| cve@mitre.org | http://www.securityfocus.com/archive/1/493388/100/0/threaded | ||
| cve@mitre.org | http://www.securityfocus.com/bid/25495 | ||
| cve@mitre.org | http://www.securitytracker.com/id?1018627 | ||
| cve@mitre.org | http://www.trustix.org/errata/2007/0028/ | ||
| cve@mitre.org | http://www.ubuntu.com/usn/usn-520-1 | ||
| cve@mitre.org | http://www.vupen.com/english/advisories/2007/3032 | ||
| cve@mitre.org | http://www.vupen.com/english/advisories/2009/0422 | ||
| cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/36385 | ||
| cve@mitre.org | https://issues.rpath.com/browse/RPL-1690 | ||
| cve@mitre.org | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10528 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://fetchmail.berlios.de/fetchmail-SA-2007-02.txt | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00008.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://mknod.org/svn/fetchmail/branches/BRANCH_6-3/fetchmail-SA-2007-02.txt | Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/45833 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/27399 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/33937 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://securityreason.com/securityalert/3074 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://support.apple.com/kb/HT3438 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2007/dsa-1377 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDKSA-2007:179 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/478798/100/0/threaded | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/493388/100/0/threaded | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/25495 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1018627 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.trustix.org/errata/2007/0028/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/usn-520-1 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2007/3032 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2009/0422 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/36385 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://issues.rpath.com/browse/RPL-1690 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10528 |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| fetchmail | fetchmail | * | |
| fetchmail | fetchmail | 4.5.1 | |
| fetchmail | fetchmail | 4.5.2 | |
| fetchmail | fetchmail | 4.5.3 | |
| fetchmail | fetchmail | 4.5.4 | |
| fetchmail | fetchmail | 4.5.5 | |
| fetchmail | fetchmail | 4.5.6 | |
| fetchmail | fetchmail | 4.5.7 | |
| fetchmail | fetchmail | 4.5.8 | |
| fetchmail | fetchmail | 4.6.0 | |
| fetchmail | fetchmail | 4.6.1 | |
| fetchmail | fetchmail | 4.6.2 | |
| fetchmail | fetchmail | 4.6.3 | |
| fetchmail | fetchmail | 4.6.4 | |
| fetchmail | fetchmail | 4.6.5 | |
| fetchmail | fetchmail | 4.6.6 | |
| fetchmail | fetchmail | 4.6.7 | |
| fetchmail | fetchmail | 4.6.8 | |
| fetchmail | fetchmail | 4.6.9 | |
| fetchmail | fetchmail | 4.7.0 | |
| fetchmail | fetchmail | 4.7.1 | |
| fetchmail | fetchmail | 4.7.2 | |
| fetchmail | fetchmail | 4.7.3 | |
| fetchmail | fetchmail | 4.7.4 | |
| fetchmail | fetchmail | 4.7.5 | |
| fetchmail | fetchmail | 4.7.6 | |
| fetchmail | fetchmail | 4.7.7 | |
| fetchmail | fetchmail | 5.0.0 | |
| fetchmail | fetchmail | 5.0.1 | |
| fetchmail | fetchmail | 5.0.2 | |
| fetchmail | fetchmail | 5.0.3 | |
| fetchmail | fetchmail | 5.0.4 | |
| fetchmail | fetchmail | 5.0.5 | |
| fetchmail | fetchmail | 5.0.6 | |
| fetchmail | fetchmail | 5.0.7 | |
| fetchmail | fetchmail | 5.0.8 | |
| fetchmail | fetchmail | 5.1.0 | |
| fetchmail | fetchmail | 5.1.4 | |
| fetchmail | fetchmail | 5.2.0 | |
| fetchmail | fetchmail | 5.2.1 | |
| fetchmail | fetchmail | 5.2.3 | |
| fetchmail | fetchmail | 5.2.4 | |
| fetchmail | fetchmail | 5.2.7 | |
| fetchmail | fetchmail | 5.2.8 | |
| fetchmail | fetchmail | 5.3.0 | |
| fetchmail | fetchmail | 5.3.1 | |
| fetchmail | fetchmail | 5.3.3 | |
| fetchmail | fetchmail | 5.3.8 | |
| fetchmail | fetchmail | 5.4.0 | |
| fetchmail | fetchmail | 5.4.3 | |
| fetchmail | fetchmail | 5.4.4 | |
| fetchmail | fetchmail | 5.4.5 | |
| fetchmail | fetchmail | 5.5.0 | |
| fetchmail | fetchmail | 5.5.2 | |
| fetchmail | fetchmail | 5.5.3 | |
| fetchmail | fetchmail | 5.5.5 | |
| fetchmail | fetchmail | 5.5.6 | |
| fetchmail | fetchmail | 5.6.0 | |
| fetchmail | fetchmail | 5.7.0 | |
| fetchmail | fetchmail | 5.7.2 | |
| fetchmail | fetchmail | 5.7.4 | |
| fetchmail | fetchmail | 5.8 | |
| fetchmail | fetchmail | 5.8.1 | |
| fetchmail | fetchmail | 5.8.2 | |
| fetchmail | fetchmail | 5.8.3 | |
| fetchmail | fetchmail | 5.8.4 | |
| fetchmail | fetchmail | 5.8.5 | |
| fetchmail | fetchmail | 5.8.6 | |
| fetchmail | fetchmail | 5.8.11 | |
| fetchmail | fetchmail | 5.8.13 | |
| fetchmail | fetchmail | 5.8.14 | |
| fetchmail | fetchmail | 5.8.17 | |
| fetchmail | fetchmail | 5.9.0 | |
| fetchmail | fetchmail | 5.9.4 | |
| fetchmail | fetchmail | 5.9.5 | |
| fetchmail | fetchmail | 5.9.8 | |
| fetchmail | fetchmail | 5.9.10 | |
| fetchmail | fetchmail | 5.9.11 | |
| fetchmail | fetchmail | 5.9.13 | |
| fetchmail | fetchmail | 6.0.0 | |
| fetchmail | fetchmail | 6.1.0 | |
| fetchmail | fetchmail | 6.1.3 | |
| fetchmail | fetchmail | 6.2.0 | |
| fetchmail | fetchmail | 6.2.1 | |
| fetchmail | fetchmail | 6.2.2 | |
| fetchmail | fetchmail | 6.2.3 | |
| fetchmail | fetchmail | 6.2.4 | |
| fetchmail | fetchmail | 6.2.5 | |
| fetchmail | fetchmail | 6.2.5.1 | |
| fetchmail | fetchmail | 6.2.5.2 | |
| fetchmail | fetchmail | 6.2.5.4 | |
| fetchmail | fetchmail | 6.2.6 | |
| fetchmail | fetchmail | 6.2.6 | |
| fetchmail | fetchmail | 6.2.6 | |
| fetchmail | fetchmail | 6.2.9 | |
| fetchmail | fetchmail | 6.2.9 | |
| fetchmail | fetchmail | 6.2.9 | |
| fetchmail | fetchmail | 6.2.9 | |
| fetchmail | fetchmail | 6.2.9 | |
| fetchmail | fetchmail | 6.2.9 | |
| fetchmail | fetchmail | 6.2.9 | |
| fetchmail | fetchmail | 6.3.0 | |
| fetchmail | fetchmail | 6.3.1 | |
| fetchmail | fetchmail | 6.3.2 | |
| fetchmail | fetchmail | 6.3.3 | |
| fetchmail | fetchmail | 6.3.4 | |
| fetchmail | fetchmail | 6.3.5 | |
| fetchmail | fetchmail | 6.3.6 | |
| fetchmail | fetchmail | 6.3.6 | |
| fetchmail | fetchmail | 6.3.6 | |
| fetchmail | fetchmail | 6.3.6 | |
| fetchmail | fetchmail | 6.3.6 | |
| fetchmail | fetchmail | 6.3.6 | |
| fetchmail | fetchmail | 6.3.7 | |
| fetchmail | fetchmail | 6.3.8 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:*:rc2:*:*:*:*:*:*",
"matchCriteriaId": "6089D7C8-8651-4C85-9F03-96A2C2BBD380",
"versionEndIncluding": "6.3.9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BF519D04-7596-42C6-A1D8-FC1018D1A414",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9AFEC739-BDFA-4D14-9A04-96FFB71AE330",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E1923712-7B88-483E-B38A-0EA6FB38EB38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "C9608A96-D131-401B-B041-09ADEEB59354",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.5:*:*:*:*:*:*:*",
"matchCriteriaId": "F4555DBB-B63B-4637-86A9-399B34B27D14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.6:*:*:*:*:*:*:*",
"matchCriteriaId": "D8AB8504-8CD1-4013-9413-1378F3BAE0AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.7:*:*:*:*:*:*:*",
"matchCriteriaId": "3DC47DA9-D110-4E6B-9F5B-D17ECB942B40",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.8:*:*:*:*:*:*:*",
"matchCriteriaId": "345D0848-958F-4B44-8F31-0793C36A5ADD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7E179061-FB6A-44AA-8EAC-4916719D9A28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "58A6B5F4-C799-45C4-9EAD-A55023767033",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "54FDB8B9-5537-4E08-8FA0-931D4BED43E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E7EB9B1D-C6B0-494B-8A8C-752E5659EA1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "CC13DE1B-1428-4842-9567-BBE5EEF7042F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "215ED879-1E26-4FF4-8857-18499C5DE3A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "72604F3D-2DE8-4BFF-97D5-4AFA64399201",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "8792F7FF-9E56-4201-89FD-F0146D4F0DF9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.8:*:*:*:*:*:*:*",
"matchCriteriaId": "B12812E8-1C5B-46CF-A266-EE19C5CD3B12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.9:*:*:*:*:*:*:*",
"matchCriteriaId": "4DEAA0E8-746D-446D-AAEA-0ED287766332",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7D3E14C3-82AE-4D4A-8963-438BECBA5678",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4DCFB7BB-2879-4EB7-BE1D-163238E313C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6ED223B6-1864-415C-96D6-64E1EDE4C840",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "14CBC8ED-CC10-40B6-8AA7-9F1342432ECB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "D3417C2E-1117-4FE7-B2FA-74CAB57235B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.5:*:*:*:*:*:*:*",
"matchCriteriaId": "07C61DC4-50D5-44B2-92F8-A59C65144108",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.6:*:*:*:*:*:*:*",
"matchCriteriaId": "31A37E19-1E07-4FD0-AC6D-6AC3ED954787",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.7:*:*:*:*:*:*:*",
"matchCriteriaId": "570C9443-81CE-42AC-B4A6-3B2ABAD97EC5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "853DD3E0-668F-4FAC-BA0B-D4E9C416D646",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "CEF70FCA-5DA4-4C0B-B876-0345FA077D44",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BF0C4F7C-0003-4C77-AE22-A9C2FCBFAF3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "78D12F53-07DE-447D-8403-40EB75B91955",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "19ECB844-F378-4A94-B9FC-A731B8186013",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "3169AA63-79F6-4B89-9405-8F6A2FB6FD64",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "88D1D54C-81A4-44CE-BE12-798CF7DD2CC4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "D6615C7D-09B5-4943-A124-2FF9A0F4B927",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "EF18219F-0406-4D46-90DE-EA2A17C8EFF7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "87B56DFD-BDA9-4D8B-BE54-BF59B762D574",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "33EA0CA8-468F-4A94-8DA3-5D820AB65973",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BA21C847-57ED-4E7D-9366-6038467D9080",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0450BD04-15D2-4122-A210-6225B89BDA7F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "18428805-AEB2-4BA4-9762-906B59CE74D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "AFCCBB15-DFFE-4A57-A029-E57707D15E04",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "0427B5C8-265C-47C3-9BAB-B2A0EAA1DEE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "89A4B962-BE5B-471C-83EF-674525C5AE83",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7166ECCB-54FB-44EA-BA80-4D2AAF494AF2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6B309C89-99E2-4F0B-976C-95E44A45ADC5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A3DE7EE7-F627-4955-8D95-1F00F1F85C7D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.8:*:*:*:*:*:*:*",
"matchCriteriaId": "D549098D-FE16-4BCB-91C4-D71A8C8D2E9F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "57BFA165-6E2E-49AF-9E2D-3D8923CF36C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F5C67DFF-A1BE-4486-A11F-CD3729927220",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "1D365E6E-8777-4084-BEC8-7CBF4997D976",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "20C4FF28-0DBA-4995-8252-2D62FF896BC4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F80C6B9B-AFCE-46A1-8DEF-51C1B526EB18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BF667DB5-F41E-4E73-A01F-4EC3F60BAD0C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "D2B144FA-A901-4CDF-AC3D-7F5E820B7A4B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.5:*:*:*:*:*:*:*",
"matchCriteriaId": "96774635-9A12-4DAB-BCF6-2D678F244CE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.6:*:*:*:*:*:*:*",
"matchCriteriaId": "EFD2EE7A-36CB-4A26-8EEB-DACA2864D921",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C3898EBC-75A9-4DDD-A0AF-2CDEC72DAE4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4267DCE8-985C-416D-A6B7-536585E5A573",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "50E63EDF-FF0A-447C-A3FC-7BA2414C15CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "61DDD4A1-6185-41B6-A715-4C70F0AA2631",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8:*:*:*:*:*:*:*",
"matchCriteriaId": "B10A7E3C-07CD-48A6-9075-5314B4E1EEAB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "319955A4-27A8-46FF-ACE7-97E6DF27B2DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "925CF3DD-682B-40E6-900C-23F784CD9239",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.3:*:*:*:*:*:*:*",
"matchCriteriaId": "16366780-611E-4217-A614-EBA01421D148",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.4:*:*:*:*:*:*:*",
"matchCriteriaId": "43AEA36F-E730-4305-9CB6-738A7152F02E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.5:*:*:*:*:*:*:*",
"matchCriteriaId": "2B9536BA-6334-4957-9632-6D64365B88AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.6:*:*:*:*:*:*:*",
"matchCriteriaId": "F52FA32B-8048-4FD7-9D20-20DC5E52098B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.11:*:*:*:*:*:*:*",
"matchCriteriaId": "9FA92DF1-3AAD-46AC-A9E4-E9386C977818",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.13:*:*:*:*:*:*:*",
"matchCriteriaId": "837D66DB-F9CB-41F1-A091-BCFBAC2F45B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.14:*:*:*:*:*:*:*",
"matchCriteriaId": "74D12B67-6E66-419A-A28F-6306402931EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.17:*:*:*:*:*:*:*",
"matchCriteriaId": "A71FCBED-B25D-48E3-916C-FBA9E0DE8D12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1A17995E-DCAF-465A-8ABD-F1EA0D538784",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.4:*:*:*:*:*:*:*",
"matchCriteriaId": "93D03D78-C56E-4189-97FC-916C918EDFEE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.5:*:*:*:*:*:*:*",
"matchCriteriaId": "19A66C77-041F-4A12-8A36-233A6B50641C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.8:*:*:*:*:*:*:*",
"matchCriteriaId": "C945059C-EF39-486D-A804-FBB8704AB927",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.10:*:*:*:*:*:*:*",
"matchCriteriaId": "1258CA65-FBC1-4848-A9E5-A8F5E5D6FBD5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.11:*:*:*:*:*:*:*",
"matchCriteriaId": "A91C6418-41F0-46EB-ACFC-FCE907F5AA87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.13:*:*:*:*:*:*:*",
"matchCriteriaId": "0C020534-7596-496C-B9B0-739F58F6F4EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0A77D40C-6FF5-42BD-9EFB-B532824D7606",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F04C6A76-2718-4DBA-8972-A3EECDDB1A17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "38ACD96E-5582-4ED0-BBB1-C891094D8217",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "264386DA-747F-492C-B660-D49BE9DB7139",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DC4066AC-BE10-4189-86F6-BF94443738DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1C25A146-50D5-4BA2-ABA2-20BF8784D7DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "72E76256-997F-4229-9B03-7BC3074F359D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7A717C50-2C5A-4CD1-B2E6-8CDF450940CE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "61F908FF-9986-4F71-B0B6-D6A86555EF56",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B0C1F99C-A246-40D3-B84A-5D11FF24AC1B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "028F7F83-AF15-443B-A7DB-4E695E62EAFB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "B418C3CE-E6E6-401D-AD83-5BB181009A7F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.6:pre4:*:*:*:*:*:*",
"matchCriteriaId": "8BF06FD2-0A4C-4557-B8EF-F0F021179498",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.6:pre8:*:*:*:*:*:*",
"matchCriteriaId": "38C949C2-07A0-4FE4-8FBF-86215CB999CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.6:pre9:*:*:*:*:*:*",
"matchCriteriaId": "88B23630-79DD-4B69-BB01-286193BA562E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc10:*:*:*:*:*:*",
"matchCriteriaId": "5FE21564-68C0-4765-BA40-9D3046C4CB14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc3:*:*:*:*:*:*",
"matchCriteriaId": "208102ED-6F22-44C5-BAF1-FD85EACF208F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc4:*:*:*:*:*:*",
"matchCriteriaId": "C1CF7767-EB24-44E2-8E59-B4DBC99AFD23",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc5:*:*:*:*:*:*",
"matchCriteriaId": "CF3D6D4C-5FD8-4EE1-A34A-99D397F09E85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc7:*:*:*:*:*:*",
"matchCriteriaId": "D63D88C1-B201-4D48-9659-5802DC4FD3EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc8:*:*:*:*:*:*",
"matchCriteriaId": "16463B23-E884-467E-9F63-6B57EED39856",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc9:*:*:*:*:*:*",
"matchCriteriaId": "9F2C03AF-666D-4AF6-BC69-F8B081EB41AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "84F90AFA-4B13-46A0-89D7-4065300C94C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5DAD0F05-8B55-43ED-89D5-61A19F41EDFF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "99053698-7F8B-4E71-8647-1A8B0DF7CEB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "9314F22D-22A8-4374-A2BF-3C64CF1F69BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "816E9640-A932-4E2F-9793-689F80D2AA89",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "5D09BB43-6CBA-499B-91D1-BA256A65E40D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "ABE76611-08CE-4D85-B57A-021909835A81",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc1:*:*:*:*:*:*",
"matchCriteriaId": "B98AFEDF-2BAB-4588-94E0-35AEA5F1B514",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc2:*:*:*:*:*:*",
"matchCriteriaId": "4E8BAB5B-4DBC-4D05-B5E2-591573BC05FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc3:*:*:*:*:*:*",
"matchCriteriaId": "02F6E729-A2F2-42AC-A941-F57A0A4E84A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc4:*:*:*:*:*:*",
"matchCriteriaId": "4143D519-4B49-4E71-8686-FC6A095F0999",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc5:*:*:*:*:*:*",
"matchCriteriaId": "387ADB82-4FAD-44DA-ABF2-2F4645C4F1E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "CED4FBCB-B6DF-429D-871D-2A9F7F59E63B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.8:*:*:*:*:*:*:*",
"matchCriteriaId": "237F86BD-82CD-4A37-BF64-F103B1304F0C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "sink.c in fetchmail before 6.3.9 allows context-dependent attackers to cause a denial of service (NULL dereference and application crash) by refusing certain warning messages that are sent over SMTP."
},
{
"lang": "es",
"value": "El archivo sink.c en fetchmail versiones anteriores a 6.3.9, permite a atacantes dependiendo del contexto causar una denegaci\u00f3n de servicio (desreferencia del NULL y bloqueo de aplicaci\u00f3n) al rechazar ciertos mensajes de advertencia que son enviados mediante SMTP."
}
],
"id": "CVE-2007-4565",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2007-08-28T01:17:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://fetchmail.berlios.de/fetchmail-SA-2007-02.txt"
},
{
"source": "cve@mitre.org",
"url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"
},
{
"source": "cve@mitre.org",
"url": "http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00008.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://mknod.org/svn/fetchmail/branches/BRANCH_6-3/fetchmail-SA-2007-02.txt"
},
{
"source": "cve@mitre.org",
"url": "http://osvdb.org/45833"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/27399"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/33937"
},
{
"source": "cve@mitre.org",
"url": "http://securityreason.com/securityalert/3074"
},
{
"source": "cve@mitre.org",
"url": "http://support.apple.com/kb/HT3438"
},
{
"source": "cve@mitre.org",
"url": "http://www.debian.org/security/2007/dsa-1377"
},
{
"source": "cve@mitre.org",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:179"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/archive/1/478798/100/0/threaded"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/archive/1/493388/100/0/threaded"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/25495"
},
{
"source": "cve@mitre.org",
"url": "http://www.securitytracker.com/id?1018627"
},
{
"source": "cve@mitre.org",
"url": "http://www.trustix.org/errata/2007/0028/"
},
{
"source": "cve@mitre.org",
"url": "http://www.ubuntu.com/usn/usn-520-1"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2007/3032"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2009/0422"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36385"
},
{
"source": "cve@mitre.org",
"url": "https://issues.rpath.com/browse/RPL-1690"
},
{
"source": "cve@mitre.org",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10528"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://fetchmail.berlios.de/fetchmail-SA-2007-02.txt"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00008.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://mknod.org/svn/fetchmail/branches/BRANCH_6-3/fetchmail-SA-2007-02.txt"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://osvdb.org/45833"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/27399"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/33937"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://securityreason.com/securityalert/3074"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://support.apple.com/kb/HT3438"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2007/dsa-1377"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:179"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/478798/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/493388/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/25495"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1018627"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.trustix.org/errata/2007/0028/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.ubuntu.com/usn/usn-520-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2007/3032"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2009/0422"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36385"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://issues.rpath.com/browse/RPL-1690"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10528"
}
],
"sourceIdentifier": "cve@mitre.org",
"vendorComments": [
{
"comment": "This issue was addressed in fetchmail packages as shipped in Red Hat Enterprise Linux 3, 4, and 5 via:\n\nhttps://rhn.redhat.com/errata/RHSA-2009-1427.html",
"lastModified": "2009-09-09T00:00:00",
"organization": "Red Hat"
}
],
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}