Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2008-2711 (GCVE-0-2008-2711)
Vulnerability from cvelistv5 – Published: 2008-06-16 21:00 – Updated: 2024-08-07 09:14- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T09:14:14.639Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "ADV-2008-1860",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/1860/references"
},
{
"name": "31287",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31287"
},
{
"name": "20080729 rPSA-2008-0235-1 fetchmail fetchmailconf",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/494865/100/0/threaded"
},
{
"name": "1020298",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1020298"
},
{
"name": "33937",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/33937"
},
{
"name": "20080617 fetchmail security announcement fetchmail-SA-2008-01 (CVE-2008-2711)",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/493391/100/0/threaded"
},
{
"name": "31262",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31262"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0235"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.apple.com/kb/HT3438"
},
{
"name": "APPLE-SA-2009-02-12",
"tags": [
"vendor-advisory",
"x_refsource_APPLE",
"x_transferred"
],
"url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"
},
{
"name": "30895",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/30895"
},
{
"name": "FEDORA-2008-5800",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg01095.html"
},
{
"name": "FEDORA-2008-5789",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg01091.html"
},
{
"name": "SSA:2008-210-01",
"tags": [
"vendor-advisory",
"x_refsource_SLACKWARE",
"x_transferred"
],
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.495740"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.fetchmail.info/fetchmail-SA-2008-01.txt"
},
{
"name": "ADV-2009-0422",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2009/0422"
},
{
"name": "29705",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/29705"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://issues.rpath.com/browse/RPL-2623"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://bugzilla.novell.com/show_bug.cgi?id=354291"
},
{
"name": "MDVSA-2008:117",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:117"
},
{
"name": "fetchmail-logmessage-dos(43121)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43121"
},
{
"name": "[oss-security] 20080613 CVE Id Request: fetchmail \u003c= 6.3.8 DoS when logging long headers in -v -v mode",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2008/06/13/1"
},
{
"name": "oval:org.mitre.oval:def:10950",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10950"
},
{
"name": "30742",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/30742"
},
{
"name": "[oss-security] 20210809 fetchmail 6.4.21 released/regression fix for 6.4.20\u0027s security fix, and UPDATE: fetchmail \u003c= 6.4.19 security announcement 2021-01 (CVE-2021-36386)",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2021/08/09/1"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2008-06-13T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "fetchmail 6.3.8 and earlier, when running in -v -v (aka verbose) mode, allows remote attackers to cause a denial of service (crash and persistent mail failure) via a malformed mail message with long headers, which triggers an erroneous dereference when using vsnprintf to format log messages."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-08-09T20:06:29.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "ADV-2008-1860",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/1860/references"
},
{
"name": "31287",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31287"
},
{
"name": "20080729 rPSA-2008-0235-1 fetchmail fetchmailconf",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/494865/100/0/threaded"
},
{
"name": "1020298",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1020298"
},
{
"name": "33937",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/33937"
},
{
"name": "20080617 fetchmail security announcement fetchmail-SA-2008-01 (CVE-2008-2711)",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/493391/100/0/threaded"
},
{
"name": "31262",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31262"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0235"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.apple.com/kb/HT3438"
},
{
"name": "APPLE-SA-2009-02-12",
"tags": [
"vendor-advisory",
"x_refsource_APPLE"
],
"url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"
},
{
"name": "30895",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/30895"
},
{
"name": "FEDORA-2008-5800",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg01095.html"
},
{
"name": "FEDORA-2008-5789",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg01091.html"
},
{
"name": "SSA:2008-210-01",
"tags": [
"vendor-advisory",
"x_refsource_SLACKWARE"
],
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.495740"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.fetchmail.info/fetchmail-SA-2008-01.txt"
},
{
"name": "ADV-2009-0422",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2009/0422"
},
{
"name": "29705",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/29705"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://issues.rpath.com/browse/RPL-2623"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://bugzilla.novell.com/show_bug.cgi?id=354291"
},
{
"name": "MDVSA-2008:117",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:117"
},
{
"name": "fetchmail-logmessage-dos(43121)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43121"
},
{
"name": "[oss-security] 20080613 CVE Id Request: fetchmail \u003c= 6.3.8 DoS when logging long headers in -v -v mode",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2008/06/13/1"
},
{
"name": "oval:org.mitre.oval:def:10950",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10950"
},
{
"name": "30742",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/30742"
},
{
"name": "[oss-security] 20210809 fetchmail 6.4.21 released/regression fix for 6.4.20\u0027s security fix, and UPDATE: fetchmail \u003c= 6.4.19 security announcement 2021-01 (CVE-2021-36386)",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2021/08/09/1"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2008-2711",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "fetchmail 6.3.8 and earlier, when running in -v -v (aka verbose) mode, allows remote attackers to cause a denial of service (crash and persistent mail failure) via a malformed mail message with long headers, which triggers an erroneous dereference when using vsnprintf to format log messages."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "ADV-2008-1860",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/1860/references"
},
{
"name": "31287",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31287"
},
{
"name": "20080729 rPSA-2008-0235-1 fetchmail fetchmailconf",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/494865/100/0/threaded"
},
{
"name": "1020298",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1020298"
},
{
"name": "33937",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33937"
},
{
"name": "20080617 fetchmail security announcement fetchmail-SA-2008-01 (CVE-2008-2711)",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/493391/100/0/threaded"
},
{
"name": "31262",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31262"
},
{
"name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0235",
"refsource": "CONFIRM",
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0235"
},
{
"name": "http://support.apple.com/kb/HT3438",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT3438"
},
{
"name": "APPLE-SA-2009-02-12",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"
},
{
"name": "30895",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30895"
},
{
"name": "FEDORA-2008-5800",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg01095.html"
},
{
"name": "FEDORA-2008-5789",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg01091.html"
},
{
"name": "SSA:2008-210-01",
"refsource": "SLACKWARE",
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.495740"
},
{
"name": "http://www.fetchmail.info/fetchmail-SA-2008-01.txt",
"refsource": "CONFIRM",
"url": "http://www.fetchmail.info/fetchmail-SA-2008-01.txt"
},
{
"name": "ADV-2009-0422",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/0422"
},
{
"name": "29705",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/29705"
},
{
"name": "https://issues.rpath.com/browse/RPL-2623",
"refsource": "CONFIRM",
"url": "https://issues.rpath.com/browse/RPL-2623"
},
{
"name": "https://bugzilla.novell.com/show_bug.cgi?id=354291",
"refsource": "MISC",
"url": "https://bugzilla.novell.com/show_bug.cgi?id=354291"
},
{
"name": "MDVSA-2008:117",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:117"
},
{
"name": "fetchmail-logmessage-dos(43121)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43121"
},
{
"name": "[oss-security] 20080613 CVE Id Request: fetchmail \u003c= 6.3.8 DoS when logging long headers in -v -v mode",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2008/06/13/1"
},
{
"name": "oval:org.mitre.oval:def:10950",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10950"
},
{
"name": "30742",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30742"
},
{
"name": "[oss-security] 20210809 fetchmail 6.4.21 released/regression fix for 6.4.20\u0027s security fix, and UPDATE: fetchmail \u003c= 6.4.19 security announcement 2021-01 (CVE-2021-36386)",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2021/08/09/1"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2008-2711",
"datePublished": "2008-06-16T21:00:00.000Z",
"dateReserved": "2008-06-16T00:00:00.000Z",
"dateUpdated": "2024-08-07T09:14:14.639Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2008-2711",
"date": "2026-05-20",
"epss": "0.03347",
"percentile": "0.87461"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"6.3.8\", \"matchCriteriaId\": \"BB18D768-33CE-4CB0-84A9-1D8CAF1080E1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:4.5.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BF519D04-7596-42C6-A1D8-FC1018D1A414\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:4.5.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9AFEC739-BDFA-4D14-9A04-96FFB71AE330\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:4.5.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E1923712-7B88-483E-B38A-0EA6FB38EB38\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:4.5.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C9608A96-D131-401B-B041-09ADEEB59354\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:4.5.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F4555DBB-B63B-4637-86A9-399B34B27D14\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:4.5.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D8AB8504-8CD1-4013-9413-1378F3BAE0AB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:4.5.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3DC47DA9-D110-4E6B-9F5B-D17ECB942B40\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:4.5.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"345D0848-958F-4B44-8F31-0793C36A5ADD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:4.6.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7E179061-FB6A-44AA-8EAC-4916719D9A28\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:4.6.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"58A6B5F4-C799-45C4-9EAD-A55023767033\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:4.6.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"54FDB8B9-5537-4E08-8FA0-931D4BED43E3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:4.6.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E7EB9B1D-C6B0-494B-8A8C-752E5659EA1D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:4.6.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CC13DE1B-1428-4842-9567-BBE5EEF7042F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:4.6.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"215ED879-1E26-4FF4-8857-18499C5DE3A8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:4.6.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"72604F3D-2DE8-4BFF-97D5-4AFA64399201\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:4.6.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8792F7FF-9E56-4201-89FD-F0146D4F0DF9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:4.6.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B12812E8-1C5B-46CF-A266-EE19C5CD3B12\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:4.6.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4DEAA0E8-746D-446D-AAEA-0ED287766332\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:4.7.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7D3E14C3-82AE-4D4A-8963-438BECBA5678\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:4.7.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4DCFB7BB-2879-4EB7-BE1D-163238E313C5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:4.7.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6ED223B6-1864-415C-96D6-64E1EDE4C840\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:4.7.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"14CBC8ED-CC10-40B6-8AA7-9F1342432ECB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:4.7.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D3417C2E-1117-4FE7-B2FA-74CAB57235B2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:4.7.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"07C61DC4-50D5-44B2-92F8-A59C65144108\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:4.7.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"31A37E19-1E07-4FD0-AC6D-6AC3ED954787\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:4.7.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"570C9443-81CE-42AC-B4A6-3B2ABAD97EC5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:5.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"853DD3E0-668F-4FAC-BA0B-D4E9C416D646\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:5.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CEF70FCA-5DA4-4C0B-B876-0345FA077D44\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:5.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BF0C4F7C-0003-4C77-AE22-A9C2FCBFAF3B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:5.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"78D12F53-07DE-447D-8403-40EB75B91955\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:5.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"19ECB844-F378-4A94-B9FC-A731B8186013\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:5.0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3169AA63-79F6-4B89-9405-8F6A2FB6FD64\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:5.0.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"88D1D54C-81A4-44CE-BE12-798CF7DD2CC4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:5.0.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D6615C7D-09B5-4943-A124-2FF9A0F4B927\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:5.0.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EF18219F-0406-4D46-90DE-EA2A17C8EFF7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:5.1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"87B56DFD-BDA9-4D8B-BE54-BF59B762D574\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:5.1.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"33EA0CA8-468F-4A94-8DA3-5D820AB65973\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:5.2.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BA21C847-57ED-4E7D-9366-6038467D9080\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:5.2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0450BD04-15D2-4122-A210-6225B89BDA7F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:5.2.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"18428805-AEB2-4BA4-9762-906B59CE74D3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:5.2.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AFCCBB15-DFFE-4A57-A029-E57707D15E04\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:5.2.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0427B5C8-265C-47C3-9BAB-B2A0EAA1DEE5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:5.2.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"89A4B962-BE5B-471C-83EF-674525C5AE83\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:5.3.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7166ECCB-54FB-44EA-BA80-4D2AAF494AF2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:5.3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6B309C89-99E2-4F0B-976C-95E44A45ADC5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:5.3.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A3DE7EE7-F627-4955-8D95-1F00F1F85C7D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:5.3.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D549098D-FE16-4BCB-91C4-D71A8C8D2E9F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:5.4.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"57BFA165-6E2E-49AF-9E2D-3D8923CF36C7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:5.4.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F5C67DFF-A1BE-4486-A11F-CD3729927220\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:5.4.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1D365E6E-8777-4084-BEC8-7CBF4997D976\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:5.4.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"20C4FF28-0DBA-4995-8252-2D62FF896BC4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:5.5.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F80C6B9B-AFCE-46A1-8DEF-51C1B526EB18\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:5.5.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BF667DB5-F41E-4E73-A01F-4EC3F60BAD0C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:5.5.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D2B144FA-A901-4CDF-AC3D-7F5E820B7A4B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:5.5.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"96774635-9A12-4DAB-BCF6-2D678F244CE9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:5.5.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EFD2EE7A-36CB-4A26-8EEB-DACA2864D921\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:5.6.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C3898EBC-75A9-4DDD-A0AF-2CDEC72DAE4F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:5.7.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4267DCE8-985C-416D-A6B7-536585E5A573\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:5.7.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"50E63EDF-FF0A-447C-A3FC-7BA2414C15CA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:5.7.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"61DDD4A1-6185-41B6-A715-4C70F0AA2631\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:5.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B10A7E3C-07CD-48A6-9075-5314B4E1EEAB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:5.8.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"319955A4-27A8-46FF-ACE7-97E6DF27B2DD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:5.8.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"925CF3DD-682B-40E6-900C-23F784CD9239\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:5.8.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"16366780-611E-4217-A614-EBA01421D148\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:5.8.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"43AEA36F-E730-4305-9CB6-738A7152F02E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:5.8.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2B9536BA-6334-4957-9632-6D64365B88AB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:5.8.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F52FA32B-8048-4FD7-9D20-20DC5E52098B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:5.8.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9FA92DF1-3AAD-46AC-A9E4-E9386C977818\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:5.8.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"837D66DB-F9CB-41F1-A091-BCFBAC2F45B6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:5.8.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"74D12B67-6E66-419A-A28F-6306402931EB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:5.8.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A71FCBED-B25D-48E3-916C-FBA9E0DE8D12\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:5.9.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1A17995E-DCAF-465A-8ABD-F1EA0D538784\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:5.9.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"93D03D78-C56E-4189-97FC-916C918EDFEE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:5.9.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"19A66C77-041F-4A12-8A36-233A6B50641C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:5.9.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C945059C-EF39-486D-A804-FBB8704AB927\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:5.9.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1258CA65-FBC1-4848-A9E5-A8F5E5D6FBD5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:5.9.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A91C6418-41F0-46EB-ACFC-FCE907F5AA87\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:5.9.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0C020534-7596-496C-B9B0-739F58F6F4EF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:6.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0A77D40C-6FF5-42BD-9EFB-B532824D7606\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:6.1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F04C6A76-2718-4DBA-8972-A3EECDDB1A17\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:6.1.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"38ACD96E-5582-4ED0-BBB1-C891094D8217\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:6.2.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"264386DA-747F-492C-B660-D49BE9DB7139\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:6.2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DC4066AC-BE10-4189-86F6-BF94443738DF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:6.2.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1C25A146-50D5-4BA2-ABA2-20BF8784D7DA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:6.2.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"72E76256-997F-4229-9B03-7BC3074F359D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:6.2.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7A717C50-2C5A-4CD1-B2E6-8CDF450940CE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:6.2.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"61F908FF-9986-4F71-B0B6-D6A86555EF56\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:6.2.5.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B0C1F99C-A246-40D3-B84A-5D11FF24AC1B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:6.2.5.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"028F7F83-AF15-443B-A7DB-4E695E62EAFB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:6.2.5.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B418C3CE-E6E6-401D-AD83-5BB181009A7F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:6.2.6:pre4:*:*:*:*:*:*\", \"matchCriteriaId\": \"8BF06FD2-0A4C-4557-B8EF-F0F021179498\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:6.2.6:pre8:*:*:*:*:*:*\", \"matchCriteriaId\": \"38C949C2-07A0-4FE4-8FBF-86215CB999CF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:6.2.6:pre9:*:*:*:*:*:*\", \"matchCriteriaId\": \"88B23630-79DD-4B69-BB01-286193BA562E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc10:*:*:*:*:*:*\", \"matchCriteriaId\": \"5FE21564-68C0-4765-BA40-9D3046C4CB14\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"208102ED-6F22-44C5-BAF1-FD85EACF208F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"C1CF7767-EB24-44E2-8E59-B4DBC99AFD23\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc5:*:*:*:*:*:*\", \"matchCriteriaId\": \"CF3D6D4C-5FD8-4EE1-A34A-99D397F09E85\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc7:*:*:*:*:*:*\", \"matchCriteriaId\": \"D63D88C1-B201-4D48-9659-5802DC4FD3EA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc8:*:*:*:*:*:*\", \"matchCriteriaId\": \"16463B23-E884-467E-9F63-6B57EED39856\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc9:*:*:*:*:*:*\", \"matchCriteriaId\": \"9F2C03AF-666D-4AF6-BC69-F8B081EB41AA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:6.3.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"84F90AFA-4B13-46A0-89D7-4065300C94C4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:6.3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5DAD0F05-8B55-43ED-89D5-61A19F41EDFF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:6.3.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"99053698-7F8B-4E71-8647-1A8B0DF7CEB1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:6.3.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9314F22D-22A8-4374-A2BF-3C64CF1F69BC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:6.3.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"816E9640-A932-4E2F-9793-689F80D2AA89\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:6.3.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5D09BB43-6CBA-499B-91D1-BA256A65E40D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:6.3.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ABE76611-08CE-4D85-B57A-021909835A81\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"B98AFEDF-2BAB-4588-94E0-35AEA5F1B514\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"4E8BAB5B-4DBC-4D05-B5E2-591573BC05FF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"02F6E729-A2F2-42AC-A941-F57A0A4E84A0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"4143D519-4B49-4E71-8686-FC6A095F0999\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc5:*:*:*:*:*:*\", \"matchCriteriaId\": \"387ADB82-4FAD-44DA-ABF2-2F4645C4F1E4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:6.3.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CED4FBCB-B6DF-429D-871D-2A9F7F59E63B\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"fetchmail 6.3.8 and earlier, when running in -v -v (aka verbose) mode, allows remote attackers to cause a denial of service (crash and persistent mail failure) via a malformed mail message with long headers, which triggers an erroneous dereference when using vsnprintf to format log messages.\"}, {\"lang\": \"es\", \"value\": \"fetchmail versi\\u00f3n 6.3.8 y anteriores, cuando se ejecuta en modo -v -v (tambi\\u00e9n se conoce como verbose), permite a los atacantes remotos causar una denegaci\\u00f3n de servicio (bloqueo y fallo de correo persistente) por medio de un mensaje de correo malformado con encabezados largos, lo que desencadena unas desreferencias err\\u00f3neas cuando se utiliza vsnprintf para dar formato a mensajes de registro.\"}]",
"id": "CVE-2008-2711",
"lastModified": "2024-11-21T00:47:31.533",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:N/I:N/A:P\", \"baseScore\": 4.3, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2008-06-16T21:41:00.000",
"references": "[{\"url\": \"http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/30742\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/30895\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31262\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31287\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/33937\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.495740\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://support.apple.com/kb/HT3438\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0235\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.fetchmail.info/fetchmail-SA-2008-01.txt\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2008:117\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2008/06/13/1\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2021/08/09/1\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/archive/1/493391/100/0/threaded\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/archive/1/494865/100/0/threaded\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/bid/29705\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securitytracker.com/id?1020298\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.vupen.com/english/advisories/2008/1860/references\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.vupen.com/english/advisories/2009/0422\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://bugzilla.novell.com/show_bug.cgi?id=354291\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/43121\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://issues.rpath.com/browse/RPL-2623\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10950\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://www.redhat.com/archives/fedora-package-announce/2008-June/msg01091.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://www.redhat.com/archives/fedora-package-announce/2008-June/msg01095.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/30742\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/30895\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31262\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31287\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/33937\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.495740\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://support.apple.com/kb/HT3438\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0235\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.fetchmail.info/fetchmail-SA-2008-01.txt\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2008:117\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2008/06/13/1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2021/08/09/1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/archive/1/493391/100/0/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/archive/1/494865/100/0/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/29705\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securitytracker.com/id?1020298\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vupen.com/english/advisories/2008/1860/references\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vupen.com/english/advisories/2009/0422\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://bugzilla.novell.com/show_bug.cgi?id=354291\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/43121\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://issues.rpath.com/browse/RPL-2623\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10950\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.redhat.com/archives/fedora-package-announce/2008-June/msg01091.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.redhat.com/archives/fedora-package-announce/2008-June/msg01095.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "cve@mitre.org",
"vendorComments": "[{\"organization\": \"Red Hat\", \"comment\": \"This issue was addressed in fetchmail packages as shipped in Red Hat Enterprise Linux 3, 4, and 5 via:\\n\\nhttps://rhn.redhat.com/errata/RHSA-2009-1427.html\", \"lastModified\": \"2009-09-09T00:00:00\"}]",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-20\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2008-2711\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2008-06-16T21:41:00.000\",\"lastModified\":\"2026-04-23T00:35:47.467\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"fetchmail 6.3.8 and earlier, when running in -v -v (aka verbose) mode, allows remote attackers to cause a denial of service (crash and persistent mail failure) via a malformed mail message with long headers, which triggers an erroneous dereference when using vsnprintf to format log messages.\"},{\"lang\":\"es\",\"value\":\"fetchmail versi\u00f3n 6.3.8 y anteriores, cuando se ejecuta en modo -v -v (tambi\u00e9n se conoce como verbose), permite a los atacantes remotos causar una denegaci\u00f3n de servicio (bloqueo y fallo de correo persistente) por medio de un mensaje de correo malformado con encabezados largos, lo que desencadena unas desreferencias err\u00f3neas cuando se utiliza vsnprintf para dar formato a mensajes de registro.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:N/A:P\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"6.3.8\",\"matchCriteriaId\":\"BB18D768-33CE-4CB0-84A9-1D8CAF1080E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:4.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF519D04-7596-42C6-A1D8-FC1018D1A414\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:4.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9AFEC739-BDFA-4D14-9A04-96FFB71AE330\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:4.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1923712-7B88-483E-B38A-0EA6FB38EB38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:4.5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9608A96-D131-401B-B041-09ADEEB59354\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:4.5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4555DBB-B63B-4637-86A9-399B34B27D14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:4.5.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8AB8504-8CD1-4013-9413-1378F3BAE0AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:4.5.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DC47DA9-D110-4E6B-9F5B-D17ECB942B40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:4.5.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"345D0848-958F-4B44-8F31-0793C36A5ADD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:4.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E179061-FB6A-44AA-8EAC-4916719D9A28\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:4.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58A6B5F4-C799-45C4-9EAD-A55023767033\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:4.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54FDB8B9-5537-4E08-8FA0-931D4BED43E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:4.6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7EB9B1D-C6B0-494B-8A8C-752E5659EA1D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:4.6.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC13DE1B-1428-4842-9567-BBE5EEF7042F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:4.6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"215ED879-1E26-4FF4-8857-18499C5DE3A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:4.6.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72604F3D-2DE8-4BFF-97D5-4AFA64399201\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:4.6.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8792F7FF-9E56-4201-89FD-F0146D4F0DF9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:4.6.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B12812E8-1C5B-46CF-A266-EE19C5CD3B12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:4.6.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DEAA0E8-746D-446D-AAEA-0ED287766332\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:4.7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D3E14C3-82AE-4D4A-8963-438BECBA5678\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:4.7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DCFB7BB-2879-4EB7-BE1D-163238E313C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:4.7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6ED223B6-1864-415C-96D6-64E1EDE4C840\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:4.7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"14CBC8ED-CC10-40B6-8AA7-9F1342432ECB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:4.7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3417C2E-1117-4FE7-B2FA-74CAB57235B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:4.7.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07C61DC4-50D5-44B2-92F8-A59C65144108\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:4.7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31A37E19-1E07-4FD0-AC6D-6AC3ED954787\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:4.7.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"570C9443-81CE-42AC-B4A6-3B2ABAD97EC5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"853DD3E0-668F-4FAC-BA0B-D4E9C416D646\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEF70FCA-5DA4-4C0B-B876-0345FA077D44\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF0C4F7C-0003-4C77-AE22-A9C2FCBFAF3B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78D12F53-07DE-447D-8403-40EB75B91955\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19ECB844-F378-4A94-B9FC-A731B8186013\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3169AA63-79F6-4B89-9405-8F6A2FB6FD64\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88D1D54C-81A4-44CE-BE12-798CF7DD2CC4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6615C7D-09B5-4943-A124-2FF9A0F4B927\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF18219F-0406-4D46-90DE-EA2A17C8EFF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87B56DFD-BDA9-4D8B-BE54-BF59B762D574\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33EA0CA8-468F-4A94-8DA3-5D820AB65973\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA21C847-57ED-4E7D-9366-6038467D9080\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0450BD04-15D2-4122-A210-6225B89BDA7F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18428805-AEB2-4BA4-9762-906B59CE74D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFCCBB15-DFFE-4A57-A029-E57707D15E04\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.2.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0427B5C8-265C-47C3-9BAB-B2A0EAA1DEE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.2.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89A4B962-BE5B-471C-83EF-674525C5AE83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7166ECCB-54FB-44EA-BA80-4D2AAF494AF2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B309C89-99E2-4F0B-976C-95E44A45ADC5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3DE7EE7-F627-4955-8D95-1F00F1F85C7D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.3.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D549098D-FE16-4BCB-91C4-D71A8C8D2E9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57BFA165-6E2E-49AF-9E2D-3D8923CF36C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5C67DFF-A1BE-4486-A11F-CD3729927220\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D365E6E-8777-4084-BEC8-7CBF4997D976\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20C4FF28-0DBA-4995-8252-2D62FF896BC4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F80C6B9B-AFCE-46A1-8DEF-51C1B526EB18\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF667DB5-F41E-4E73-A01F-4EC3F60BAD0C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2B144FA-A901-4CDF-AC3D-7F5E820B7A4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96774635-9A12-4DAB-BCF6-2D678F244CE9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.5.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFD2EE7A-36CB-4A26-8EEB-DACA2864D921\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3898EBC-75A9-4DDD-A0AF-2CDEC72DAE4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4267DCE8-985C-416D-A6B7-536585E5A573\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50E63EDF-FF0A-447C-A3FC-7BA2414C15CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61DDD4A1-6185-41B6-A715-4C70F0AA2631\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B10A7E3C-07CD-48A6-9075-5314B4E1EEAB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"319955A4-27A8-46FF-ACE7-97E6DF27B2DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"925CF3DD-682B-40E6-900C-23F784CD9239\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.8.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16366780-611E-4217-A614-EBA01421D148\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.8.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43AEA36F-E730-4305-9CB6-738A7152F02E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.8.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B9536BA-6334-4957-9632-6D64365B88AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.8.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F52FA32B-8048-4FD7-9D20-20DC5E52098B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.8.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FA92DF1-3AAD-46AC-A9E4-E9386C977818\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.8.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"837D66DB-F9CB-41F1-A091-BCFBAC2F45B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.8.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74D12B67-6E66-419A-A28F-6306402931EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.8.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A71FCBED-B25D-48E3-916C-FBA9E0DE8D12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A17995E-DCAF-465A-8ABD-F1EA0D538784\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.9.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93D03D78-C56E-4189-97FC-916C918EDFEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.9.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19A66C77-041F-4A12-8A36-233A6B50641C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.9.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C945059C-EF39-486D-A804-FBB8704AB927\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.9.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1258CA65-FBC1-4848-A9E5-A8F5E5D6FBD5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.9.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A91C6418-41F0-46EB-ACFC-FCE907F5AA87\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.9.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C020534-7596-496C-B9B0-739F58F6F4EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:6.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A77D40C-6FF5-42BD-9EFB-B532824D7606\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:6.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F04C6A76-2718-4DBA-8972-A3EECDDB1A17\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:6.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38ACD96E-5582-4ED0-BBB1-C891094D8217\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:6.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"264386DA-747F-492C-B660-D49BE9DB7139\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:6.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC4066AC-BE10-4189-86F6-BF94443738DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:6.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C25A146-50D5-4BA2-ABA2-20BF8784D7DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:6.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72E76256-997F-4229-9B03-7BC3074F359D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:6.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A717C50-2C5A-4CD1-B2E6-8CDF450940CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:6.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61F908FF-9986-4F71-B0B6-D6A86555EF56\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:6.2.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0C1F99C-A246-40D3-B84A-5D11FF24AC1B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:6.2.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"028F7F83-AF15-443B-A7DB-4E695E62EAFB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:6.2.5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B418C3CE-E6E6-401D-AD83-5BB181009A7F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:6.2.6:pre4:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BF06FD2-0A4C-4557-B8EF-F0F021179498\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:6.2.6:pre8:*:*:*:*:*:*\",\"matchCriteriaId\":\"38C949C2-07A0-4FE4-8FBF-86215CB999CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:6.2.6:pre9:*:*:*:*:*:*\",\"matchCriteriaId\":\"88B23630-79DD-4B69-BB01-286193BA562E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc10:*:*:*:*:*:*\",\"matchCriteriaId\":\"5FE21564-68C0-4765-BA40-9D3046C4CB14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"208102ED-6F22-44C5-BAF1-FD85EACF208F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1CF7767-EB24-44E2-8E59-B4DBC99AFD23\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF3D6D4C-5FD8-4EE1-A34A-99D397F09E85\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"D63D88C1-B201-4D48-9659-5802DC4FD3EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc8:*:*:*:*:*:*\",\"matchCriteriaId\":\"16463B23-E884-467E-9F63-6B57EED39856\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc9:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F2C03AF-666D-4AF6-BC69-F8B081EB41AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:6.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84F90AFA-4B13-46A0-89D7-4065300C94C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:6.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5DAD0F05-8B55-43ED-89D5-61A19F41EDFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:6.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99053698-7F8B-4E71-8647-1A8B0DF7CEB1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:6.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9314F22D-22A8-4374-A2BF-3C64CF1F69BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:6.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"816E9640-A932-4E2F-9793-689F80D2AA89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:6.3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D09BB43-6CBA-499B-91D1-BA256A65E40D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:6.3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ABE76611-08CE-4D85-B57A-021909835A81\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"B98AFEDF-2BAB-4588-94E0-35AEA5F1B514\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E8BAB5B-4DBC-4D05-B5E2-591573BC05FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"02F6E729-A2F2-42AC-A941-F57A0A4E84A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"4143D519-4B49-4E71-8686-FC6A095F0999\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"387ADB82-4FAD-44DA-ABF2-2F4645C4F1E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:6.3.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CED4FBCB-B6DF-429D-871D-2A9F7F59E63B\"}]}]}],\"references\":[{\"url\":\"http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/30742\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/30895\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/31262\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/31287\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/33937\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.495740\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://support.apple.com/kb/HT3438\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0235\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.fetchmail.info/fetchmail-SA-2008-01.txt\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2008:117\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2008/06/13/1\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2021/08/09/1\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/493391/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/494865/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/29705\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securitytracker.com/id?1020298\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/1860/references\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/0422\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://bugzilla.novell.com/show_bug.cgi?id=354291\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/43121\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://issues.rpath.com/browse/RPL-2623\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10950\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-June/msg01091.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-June/msg01095.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/30742\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/30895\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/31262\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/31287\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/33937\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.495740\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.apple.com/kb/HT3438\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0235\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.fetchmail.info/fetchmail-SA-2008-01.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2008:117\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2008/06/13/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2021/08/09/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/493391/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/494865/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/29705\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id?1020298\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/1860/references\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/0422\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.novell.com/show_bug.cgi?id=354291\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/43121\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://issues.rpath.com/browse/RPL-2623\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10950\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-June/msg01091.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-June/msg01095.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}],\"vendorComments\":[{\"organization\":\"Red Hat\",\"comment\":\"This issue was addressed in fetchmail packages as shipped in Red Hat Enterprise Linux 3, 4, and 5 via:\\n\\nhttps://rhn.redhat.com/errata/RHSA-2009-1427.html\",\"lastModified\":\"2009-09-09T00:00:00\"}]}}"
}
}
CERTA-2009-AVI-068
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le système Mac OS X d'Apple. L'exploitation de ces vulnérabilités permet un grand nombre d'actions, dont l'exécution de code arbitraire à distance.
Description
Apple vient de publier des mises à jour pour son système d'exploitation Mac OS X. Ces correctifs concernent la mise à jour de plusieurs applicatifs :
- AFP Server ;
- Apple Pixlet Video ;
- Carbon Core ;
- CFNetwork ;
- Certificate Assistant ;
- ClamAV ;
- CoreText ;
- CUPS ;
- DS Tools ;
- fetchmail ;
- Folder Manager ;
- FSEvents ;
- Network Time ;
- perl ;
- Printing ;
- python ;
- Remote Apple Events ;
- Safari RSS ;
- servermgrd ;
- SMB ;
- SquirrelMail ;
- X11 ;
- Xterm.
L'exploitation des différentes vulnérabilités permet d'effectuer un grand nombre d'actions malveillantes, dont l'exécution de code arbitraire à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Mac OS X versions 10.5.6 et ant\u00e9rieures ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Mac OS X versions 10.4.11 et ant\u00e9rieures.",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nApple vient de publier des mises \u00e0 jour pour son syst\u00e8me d\u0027exploitation\nMac OS X. Ces correctifs concernent la mise \u00e0 jour de plusieurs\napplicatifs :\n\n- AFP Server ;\n- Apple Pixlet Video ;\n- Carbon Core ;\n- CFNetwork ;\n- Certificate Assistant ;\n- ClamAV ;\n- CoreText ;\n- CUPS ;\n- DS Tools ;\n- fetchmail ;\n- Folder Manager ;\n- FSEvents ;\n- Network Time ;\n- perl ;\n- Printing ;\n- python ;\n- Remote Apple Events ;\n- Safari RSS ;\n- servermgrd ;\n- SMB ;\n- SquirrelMail ;\n- X11 ;\n- Xterm.\n\nL\u0027exploitation des diff\u00e9rentes vuln\u00e9rabilit\u00e9s permet d\u0027effectuer un\ngrand nombre d\u0027actions malveillantes, dont l\u0027ex\u00e9cution de code\narbitraire \u00e0 distance.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2008-2316",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2316"
},
{
"name": "CVE-2008-2361",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2361"
},
{
"name": "CVE-2008-2379",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2379"
},
{
"name": "CVE-2008-1808",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1808"
},
{
"name": "CVE-2009-0020",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0020"
},
{
"name": "CVE-2009-0012",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0012"
},
{
"name": "CVE-2008-3663",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3663"
},
{
"name": "CVE-2009-0141",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0141"
},
{
"name": "CVE-2008-3142",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3142"
},
{
"name": "CVE-2007-4565",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4565"
},
{
"name": "CVE-2007-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1352"
},
{
"name": "CVE-2009-0139",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0139"
},
{
"name": "CVE-2008-4864",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4864"
},
{
"name": "CVE-2009-0019",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0019"
},
{
"name": "CVE-2008-1679",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1679"
},
{
"name": "CVE-2008-2711",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2711"
},
{
"name": "CVE-2008-3144",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3144"
},
{
"name": "CVE-2008-2362",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2362"
},
{
"name": "CVE-2009-0018",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0018"
},
{
"name": "CVE-2009-0140",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0140"
},
{
"name": "CVE-2009-0015",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0015"
},
{
"name": "CVE-2008-1379",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1379"
},
{
"name": "CVE-2008-5031",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5031"
},
{
"name": "CVE-2008-1721",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1721"
},
{
"name": "CVE-2008-5050",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5050"
},
{
"name": "CVE-2006-1861",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-1861"
},
{
"name": "CVE-2008-1927",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1927"
},
{
"name": "CVE-2007-1667",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1667"
},
{
"name": "CVE-2008-5183",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5183"
},
{
"name": "CVE-2009-0138",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0138"
},
{
"name": "CVE-2009-0014",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0014"
},
{
"name": "CVE-2009-0009",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0009"
},
{
"name": "CVE-2009-0137",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0137"
},
{
"name": "CVE-2008-2360",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2360"
},
{
"name": "CVE-2009-0142",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0142"
},
{
"name": "CVE-2007-4965",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4965"
},
{
"name": "CVE-2009-0011",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0011"
},
{
"name": "CVE-2008-5314",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5314"
},
{
"name": "CVE-2008-1807",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1807"
},
{
"name": "CVE-2008-1887",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1887"
},
{
"name": "CVE-2008-1377",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1377"
},
{
"name": "CVE-2007-1351",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1351"
},
{
"name": "CVE-2008-2315",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2315"
},
{
"name": "CVE-2009-0013",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0013"
},
{
"name": "CVE-2009-0017",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0017"
},
{
"name": "CVE-2006-3467",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3467"
},
{
"name": "CVE-2008-1806",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1806"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT3438 du 12 f\u00e9vrier 2009 :",
"url": "http://support.apple.com/kb/HT3438"
}
],
"reference": "CERTA-2009-AVI-068",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2009-02-13T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le syst\u00e8me Mac OS X\nd\u0027Apple. L\u0027exploitation de ces vuln\u00e9rabilit\u00e9s permet un grand nombre\nd\u0027actions, dont l\u0027ex\u00e9cution de code arbitraire \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Apple Mac OS X",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple 2009-001 du 12 f\u00e9vrier 2009",
"url": null
}
]
}
CERTA-2009-AVI-068
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le système Mac OS X d'Apple. L'exploitation de ces vulnérabilités permet un grand nombre d'actions, dont l'exécution de code arbitraire à distance.
Description
Apple vient de publier des mises à jour pour son système d'exploitation Mac OS X. Ces correctifs concernent la mise à jour de plusieurs applicatifs :
- AFP Server ;
- Apple Pixlet Video ;
- Carbon Core ;
- CFNetwork ;
- Certificate Assistant ;
- ClamAV ;
- CoreText ;
- CUPS ;
- DS Tools ;
- fetchmail ;
- Folder Manager ;
- FSEvents ;
- Network Time ;
- perl ;
- Printing ;
- python ;
- Remote Apple Events ;
- Safari RSS ;
- servermgrd ;
- SMB ;
- SquirrelMail ;
- X11 ;
- Xterm.
L'exploitation des différentes vulnérabilités permet d'effectuer un grand nombre d'actions malveillantes, dont l'exécution de code arbitraire à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Mac OS X versions 10.5.6 et ant\u00e9rieures ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Mac OS X versions 10.4.11 et ant\u00e9rieures.",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nApple vient de publier des mises \u00e0 jour pour son syst\u00e8me d\u0027exploitation\nMac OS X. Ces correctifs concernent la mise \u00e0 jour de plusieurs\napplicatifs :\n\n- AFP Server ;\n- Apple Pixlet Video ;\n- Carbon Core ;\n- CFNetwork ;\n- Certificate Assistant ;\n- ClamAV ;\n- CoreText ;\n- CUPS ;\n- DS Tools ;\n- fetchmail ;\n- Folder Manager ;\n- FSEvents ;\n- Network Time ;\n- perl ;\n- Printing ;\n- python ;\n- Remote Apple Events ;\n- Safari RSS ;\n- servermgrd ;\n- SMB ;\n- SquirrelMail ;\n- X11 ;\n- Xterm.\n\nL\u0027exploitation des diff\u00e9rentes vuln\u00e9rabilit\u00e9s permet d\u0027effectuer un\ngrand nombre d\u0027actions malveillantes, dont l\u0027ex\u00e9cution de code\narbitraire \u00e0 distance.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2008-2316",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2316"
},
{
"name": "CVE-2008-2361",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2361"
},
{
"name": "CVE-2008-2379",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2379"
},
{
"name": "CVE-2008-1808",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1808"
},
{
"name": "CVE-2009-0020",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0020"
},
{
"name": "CVE-2009-0012",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0012"
},
{
"name": "CVE-2008-3663",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3663"
},
{
"name": "CVE-2009-0141",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0141"
},
{
"name": "CVE-2008-3142",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3142"
},
{
"name": "CVE-2007-4565",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4565"
},
{
"name": "CVE-2007-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1352"
},
{
"name": "CVE-2009-0139",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0139"
},
{
"name": "CVE-2008-4864",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4864"
},
{
"name": "CVE-2009-0019",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0019"
},
{
"name": "CVE-2008-1679",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1679"
},
{
"name": "CVE-2008-2711",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2711"
},
{
"name": "CVE-2008-3144",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3144"
},
{
"name": "CVE-2008-2362",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2362"
},
{
"name": "CVE-2009-0018",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0018"
},
{
"name": "CVE-2009-0140",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0140"
},
{
"name": "CVE-2009-0015",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0015"
},
{
"name": "CVE-2008-1379",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1379"
},
{
"name": "CVE-2008-5031",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5031"
},
{
"name": "CVE-2008-1721",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1721"
},
{
"name": "CVE-2008-5050",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5050"
},
{
"name": "CVE-2006-1861",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-1861"
},
{
"name": "CVE-2008-1927",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1927"
},
{
"name": "CVE-2007-1667",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1667"
},
{
"name": "CVE-2008-5183",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5183"
},
{
"name": "CVE-2009-0138",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0138"
},
{
"name": "CVE-2009-0014",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0014"
},
{
"name": "CVE-2009-0009",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0009"
},
{
"name": "CVE-2009-0137",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0137"
},
{
"name": "CVE-2008-2360",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2360"
},
{
"name": "CVE-2009-0142",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0142"
},
{
"name": "CVE-2007-4965",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4965"
},
{
"name": "CVE-2009-0011",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0011"
},
{
"name": "CVE-2008-5314",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5314"
},
{
"name": "CVE-2008-1807",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1807"
},
{
"name": "CVE-2008-1887",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1887"
},
{
"name": "CVE-2008-1377",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1377"
},
{
"name": "CVE-2007-1351",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1351"
},
{
"name": "CVE-2008-2315",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2315"
},
{
"name": "CVE-2009-0013",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0013"
},
{
"name": "CVE-2009-0017",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0017"
},
{
"name": "CVE-2006-3467",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3467"
},
{
"name": "CVE-2008-1806",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1806"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT3438 du 12 f\u00e9vrier 2009 :",
"url": "http://support.apple.com/kb/HT3438"
}
],
"reference": "CERTA-2009-AVI-068",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2009-02-13T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le syst\u00e8me Mac OS X\nd\u0027Apple. L\u0027exploitation de ces vuln\u00e9rabilit\u00e9s permet un grand nombre\nd\u0027actions, dont l\u0027ex\u00e9cution de code arbitraire \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Apple Mac OS X",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple 2009-001 du 12 f\u00e9vrier 2009",
"url": null
}
]
}
FKIE_CVE-2008-2711
Vulnerability from fkie_nvd - Published: 2008-06-16 21:41 - Updated: 2026-04-23 00:35{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BB18D768-33CE-4CB0-84A9-1D8CAF1080E1",
"versionEndIncluding": "6.3.8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BF519D04-7596-42C6-A1D8-FC1018D1A414",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9AFEC739-BDFA-4D14-9A04-96FFB71AE330",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E1923712-7B88-483E-B38A-0EA6FB38EB38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "C9608A96-D131-401B-B041-09ADEEB59354",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.5:*:*:*:*:*:*:*",
"matchCriteriaId": "F4555DBB-B63B-4637-86A9-399B34B27D14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.6:*:*:*:*:*:*:*",
"matchCriteriaId": "D8AB8504-8CD1-4013-9413-1378F3BAE0AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.7:*:*:*:*:*:*:*",
"matchCriteriaId": "3DC47DA9-D110-4E6B-9F5B-D17ECB942B40",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.8:*:*:*:*:*:*:*",
"matchCriteriaId": "345D0848-958F-4B44-8F31-0793C36A5ADD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7E179061-FB6A-44AA-8EAC-4916719D9A28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "58A6B5F4-C799-45C4-9EAD-A55023767033",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "54FDB8B9-5537-4E08-8FA0-931D4BED43E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E7EB9B1D-C6B0-494B-8A8C-752E5659EA1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "CC13DE1B-1428-4842-9567-BBE5EEF7042F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "215ED879-1E26-4FF4-8857-18499C5DE3A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "72604F3D-2DE8-4BFF-97D5-4AFA64399201",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "8792F7FF-9E56-4201-89FD-F0146D4F0DF9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.8:*:*:*:*:*:*:*",
"matchCriteriaId": "B12812E8-1C5B-46CF-A266-EE19C5CD3B12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.9:*:*:*:*:*:*:*",
"matchCriteriaId": "4DEAA0E8-746D-446D-AAEA-0ED287766332",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7D3E14C3-82AE-4D4A-8963-438BECBA5678",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4DCFB7BB-2879-4EB7-BE1D-163238E313C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6ED223B6-1864-415C-96D6-64E1EDE4C840",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "14CBC8ED-CC10-40B6-8AA7-9F1342432ECB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "D3417C2E-1117-4FE7-B2FA-74CAB57235B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.5:*:*:*:*:*:*:*",
"matchCriteriaId": "07C61DC4-50D5-44B2-92F8-A59C65144108",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.6:*:*:*:*:*:*:*",
"matchCriteriaId": "31A37E19-1E07-4FD0-AC6D-6AC3ED954787",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.7:*:*:*:*:*:*:*",
"matchCriteriaId": "570C9443-81CE-42AC-B4A6-3B2ABAD97EC5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "853DD3E0-668F-4FAC-BA0B-D4E9C416D646",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "CEF70FCA-5DA4-4C0B-B876-0345FA077D44",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BF0C4F7C-0003-4C77-AE22-A9C2FCBFAF3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "78D12F53-07DE-447D-8403-40EB75B91955",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "19ECB844-F378-4A94-B9FC-A731B8186013",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "3169AA63-79F6-4B89-9405-8F6A2FB6FD64",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "88D1D54C-81A4-44CE-BE12-798CF7DD2CC4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "D6615C7D-09B5-4943-A124-2FF9A0F4B927",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "EF18219F-0406-4D46-90DE-EA2A17C8EFF7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "87B56DFD-BDA9-4D8B-BE54-BF59B762D574",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "33EA0CA8-468F-4A94-8DA3-5D820AB65973",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BA21C847-57ED-4E7D-9366-6038467D9080",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0450BD04-15D2-4122-A210-6225B89BDA7F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "18428805-AEB2-4BA4-9762-906B59CE74D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "AFCCBB15-DFFE-4A57-A029-E57707D15E04",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "0427B5C8-265C-47C3-9BAB-B2A0EAA1DEE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "89A4B962-BE5B-471C-83EF-674525C5AE83",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7166ECCB-54FB-44EA-BA80-4D2AAF494AF2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6B309C89-99E2-4F0B-976C-95E44A45ADC5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A3DE7EE7-F627-4955-8D95-1F00F1F85C7D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.8:*:*:*:*:*:*:*",
"matchCriteriaId": "D549098D-FE16-4BCB-91C4-D71A8C8D2E9F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "57BFA165-6E2E-49AF-9E2D-3D8923CF36C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F5C67DFF-A1BE-4486-A11F-CD3729927220",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "1D365E6E-8777-4084-BEC8-7CBF4997D976",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "20C4FF28-0DBA-4995-8252-2D62FF896BC4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F80C6B9B-AFCE-46A1-8DEF-51C1B526EB18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BF667DB5-F41E-4E73-A01F-4EC3F60BAD0C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "D2B144FA-A901-4CDF-AC3D-7F5E820B7A4B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.5:*:*:*:*:*:*:*",
"matchCriteriaId": "96774635-9A12-4DAB-BCF6-2D678F244CE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.6:*:*:*:*:*:*:*",
"matchCriteriaId": "EFD2EE7A-36CB-4A26-8EEB-DACA2864D921",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C3898EBC-75A9-4DDD-A0AF-2CDEC72DAE4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4267DCE8-985C-416D-A6B7-536585E5A573",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "50E63EDF-FF0A-447C-A3FC-7BA2414C15CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "61DDD4A1-6185-41B6-A715-4C70F0AA2631",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8:*:*:*:*:*:*:*",
"matchCriteriaId": "B10A7E3C-07CD-48A6-9075-5314B4E1EEAB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "319955A4-27A8-46FF-ACE7-97E6DF27B2DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "925CF3DD-682B-40E6-900C-23F784CD9239",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.3:*:*:*:*:*:*:*",
"matchCriteriaId": "16366780-611E-4217-A614-EBA01421D148",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.4:*:*:*:*:*:*:*",
"matchCriteriaId": "43AEA36F-E730-4305-9CB6-738A7152F02E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.5:*:*:*:*:*:*:*",
"matchCriteriaId": "2B9536BA-6334-4957-9632-6D64365B88AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.6:*:*:*:*:*:*:*",
"matchCriteriaId": "F52FA32B-8048-4FD7-9D20-20DC5E52098B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.11:*:*:*:*:*:*:*",
"matchCriteriaId": "9FA92DF1-3AAD-46AC-A9E4-E9386C977818",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.13:*:*:*:*:*:*:*",
"matchCriteriaId": "837D66DB-F9CB-41F1-A091-BCFBAC2F45B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.14:*:*:*:*:*:*:*",
"matchCriteriaId": "74D12B67-6E66-419A-A28F-6306402931EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.17:*:*:*:*:*:*:*",
"matchCriteriaId": "A71FCBED-B25D-48E3-916C-FBA9E0DE8D12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1A17995E-DCAF-465A-8ABD-F1EA0D538784",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.4:*:*:*:*:*:*:*",
"matchCriteriaId": "93D03D78-C56E-4189-97FC-916C918EDFEE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.5:*:*:*:*:*:*:*",
"matchCriteriaId": "19A66C77-041F-4A12-8A36-233A6B50641C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.8:*:*:*:*:*:*:*",
"matchCriteriaId": "C945059C-EF39-486D-A804-FBB8704AB927",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.10:*:*:*:*:*:*:*",
"matchCriteriaId": "1258CA65-FBC1-4848-A9E5-A8F5E5D6FBD5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.11:*:*:*:*:*:*:*",
"matchCriteriaId": "A91C6418-41F0-46EB-ACFC-FCE907F5AA87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.13:*:*:*:*:*:*:*",
"matchCriteriaId": "0C020534-7596-496C-B9B0-739F58F6F4EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0A77D40C-6FF5-42BD-9EFB-B532824D7606",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F04C6A76-2718-4DBA-8972-A3EECDDB1A17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "38ACD96E-5582-4ED0-BBB1-C891094D8217",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "264386DA-747F-492C-B660-D49BE9DB7139",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DC4066AC-BE10-4189-86F6-BF94443738DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1C25A146-50D5-4BA2-ABA2-20BF8784D7DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "72E76256-997F-4229-9B03-7BC3074F359D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7A717C50-2C5A-4CD1-B2E6-8CDF450940CE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "61F908FF-9986-4F71-B0B6-D6A86555EF56",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B0C1F99C-A246-40D3-B84A-5D11FF24AC1B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "028F7F83-AF15-443B-A7DB-4E695E62EAFB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "B418C3CE-E6E6-401D-AD83-5BB181009A7F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.6:pre4:*:*:*:*:*:*",
"matchCriteriaId": "8BF06FD2-0A4C-4557-B8EF-F0F021179498",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.6:pre8:*:*:*:*:*:*",
"matchCriteriaId": "38C949C2-07A0-4FE4-8FBF-86215CB999CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.6:pre9:*:*:*:*:*:*",
"matchCriteriaId": "88B23630-79DD-4B69-BB01-286193BA562E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc10:*:*:*:*:*:*",
"matchCriteriaId": "5FE21564-68C0-4765-BA40-9D3046C4CB14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc3:*:*:*:*:*:*",
"matchCriteriaId": "208102ED-6F22-44C5-BAF1-FD85EACF208F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc4:*:*:*:*:*:*",
"matchCriteriaId": "C1CF7767-EB24-44E2-8E59-B4DBC99AFD23",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc5:*:*:*:*:*:*",
"matchCriteriaId": "CF3D6D4C-5FD8-4EE1-A34A-99D397F09E85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc7:*:*:*:*:*:*",
"matchCriteriaId": "D63D88C1-B201-4D48-9659-5802DC4FD3EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc8:*:*:*:*:*:*",
"matchCriteriaId": "16463B23-E884-467E-9F63-6B57EED39856",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc9:*:*:*:*:*:*",
"matchCriteriaId": "9F2C03AF-666D-4AF6-BC69-F8B081EB41AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "84F90AFA-4B13-46A0-89D7-4065300C94C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5DAD0F05-8B55-43ED-89D5-61A19F41EDFF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "99053698-7F8B-4E71-8647-1A8B0DF7CEB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "9314F22D-22A8-4374-A2BF-3C64CF1F69BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "816E9640-A932-4E2F-9793-689F80D2AA89",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "5D09BB43-6CBA-499B-91D1-BA256A65E40D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "ABE76611-08CE-4D85-B57A-021909835A81",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc1:*:*:*:*:*:*",
"matchCriteriaId": "B98AFEDF-2BAB-4588-94E0-35AEA5F1B514",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc2:*:*:*:*:*:*",
"matchCriteriaId": "4E8BAB5B-4DBC-4D05-B5E2-591573BC05FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc3:*:*:*:*:*:*",
"matchCriteriaId": "02F6E729-A2F2-42AC-A941-F57A0A4E84A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc4:*:*:*:*:*:*",
"matchCriteriaId": "4143D519-4B49-4E71-8686-FC6A095F0999",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc5:*:*:*:*:*:*",
"matchCriteriaId": "387ADB82-4FAD-44DA-ABF2-2F4645C4F1E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "CED4FBCB-B6DF-429D-871D-2A9F7F59E63B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "fetchmail 6.3.8 and earlier, when running in -v -v (aka verbose) mode, allows remote attackers to cause a denial of service (crash and persistent mail failure) via a malformed mail message with long headers, which triggers an erroneous dereference when using vsnprintf to format log messages."
},
{
"lang": "es",
"value": "fetchmail versi\u00f3n 6.3.8 y anteriores, cuando se ejecuta en modo -v -v (tambi\u00e9n se conoce como verbose), permite a los atacantes remotos causar una denegaci\u00f3n de servicio (bloqueo y fallo de correo persistente) por medio de un mensaje de correo malformado con encabezados largos, lo que desencadena unas desreferencias err\u00f3neas cuando se utiliza vsnprintf para dar formato a mensajes de registro."
}
],
"id": "CVE-2008-2711",
"lastModified": "2026-04-23T00:35:47.467",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2008-06-16T21:41:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/30742"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/30895"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/31262"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/31287"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/33937"
},
{
"source": "cve@mitre.org",
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.495740"
},
{
"source": "cve@mitre.org",
"url": "http://support.apple.com/kb/HT3438"
},
{
"source": "cve@mitre.org",
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0235"
},
{
"source": "cve@mitre.org",
"url": "http://www.fetchmail.info/fetchmail-SA-2008-01.txt"
},
{
"source": "cve@mitre.org",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:117"
},
{
"source": "cve@mitre.org",
"url": "http://www.openwall.com/lists/oss-security/2008/06/13/1"
},
{
"source": "cve@mitre.org",
"url": "http://www.openwall.com/lists/oss-security/2021/08/09/1"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/archive/1/493391/100/0/threaded"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/archive/1/494865/100/0/threaded"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/29705"
},
{
"source": "cve@mitre.org",
"url": "http://www.securitytracker.com/id?1020298"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2008/1860/references"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2009/0422"
},
{
"source": "cve@mitre.org",
"url": "https://bugzilla.novell.com/show_bug.cgi?id=354291"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43121"
},
{
"source": "cve@mitre.org",
"url": "https://issues.rpath.com/browse/RPL-2623"
},
{
"source": "cve@mitre.org",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10950"
},
{
"source": "cve@mitre.org",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg01091.html"
},
{
"source": "cve@mitre.org",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg01095.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/30742"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/30895"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/31262"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/31287"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/33937"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.495740"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://support.apple.com/kb/HT3438"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0235"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.fetchmail.info/fetchmail-SA-2008-01.txt"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:117"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2008/06/13/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2021/08/09/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/493391/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/494865/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/29705"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1020298"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2008/1860/references"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2009/0422"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://bugzilla.novell.com/show_bug.cgi?id=354291"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43121"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://issues.rpath.com/browse/RPL-2623"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10950"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg01091.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg01095.html"
}
],
"sourceIdentifier": "cve@mitre.org",
"vendorComments": [
{
"comment": "This issue was addressed in fetchmail packages as shipped in Red Hat Enterprise Linux 3, 4, and 5 via:\n\nhttps://rhn.redhat.com/errata/RHSA-2009-1427.html",
"lastModified": "2009-09-09T00:00:00",
"organization": "Red Hat"
}
],
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-MGRC-7P8M-89R3
Vulnerability from github – Published: 2022-05-01 23:52 – Updated: 2022-05-01 23:52fetchmail 6.3.8 and earlier, when running in -v -v (aka verbose) mode, allows remote attackers to cause a denial of service (crash and persistent mail failure) via a malformed mail message with long headers, which triggers an erroneous dereference when using vsnprintf to format log messages.
{
"affected": [],
"aliases": [
"CVE-2008-2711"
],
"database_specific": {
"cwe_ids": [
"CWE-20"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2008-06-16T21:41:00Z",
"severity": "MODERATE"
},
"details": "fetchmail 6.3.8 and earlier, when running in -v -v (aka verbose) mode, allows remote attackers to cause a denial of service (crash and persistent mail failure) via a malformed mail message with long headers, which triggers an erroneous dereference when using vsnprintf to format log messages.",
"id": "GHSA-mgrc-7p8m-89r3",
"modified": "2022-05-01T23:52:37Z",
"published": "2022-05-01T23:52:37Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2711"
},
{
"type": "WEB",
"url": "https://bugzilla.novell.com/show_bug.cgi?id=354291"
},
{
"type": "WEB",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43121"
},
{
"type": "WEB",
"url": "https://issues.rpath.com/browse/RPL-2623"
},
{
"type": "WEB",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10950"
},
{
"type": "WEB",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg01091.html"
},
{
"type": "WEB",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg01095.html"
},
{
"type": "WEB",
"url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/30742"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/30895"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/31262"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/31287"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/33937"
},
{
"type": "WEB",
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.495740"
},
{
"type": "WEB",
"url": "http://support.apple.com/kb/HT3438"
},
{
"type": "WEB",
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0235"
},
{
"type": "WEB",
"url": "http://www.fetchmail.info/fetchmail-SA-2008-01.txt"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:117"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2008/06/13/1"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2021/08/09/1"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/archive/1/493391/100/0/threaded"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/archive/1/494865/100/0/threaded"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/29705"
},
{
"type": "WEB",
"url": "http://www.securitytracker.com/id?1020298"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2008/1860/references"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2009/0422"
}
],
"schema_version": "1.4.0",
"severity": []
}
GSD-2008-2711
Vulnerability from gsd - Updated: 2023-12-13 01:23{
"GSD": {
"alias": "CVE-2008-2711",
"description": "fetchmail 6.3.8 and earlier, when running in -v -v (aka verbose) mode, allows remote attackers to cause a denial of service (crash and persistent mail failure) via a malformed mail message with long headers, which triggers an erroneous dereference when using vsnprintf to format log messages.",
"id": "GSD-2008-2711",
"references": [
"https://www.suse.com/security/cve/CVE-2008-2711.html",
"https://access.redhat.com/errata/RHSA-2009:1427",
"https://linux.oracle.com/cve/CVE-2008-2711.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2008-2711"
],
"details": "fetchmail 6.3.8 and earlier, when running in -v -v (aka verbose) mode, allows remote attackers to cause a denial of service (crash and persistent mail failure) via a malformed mail message with long headers, which triggers an erroneous dereference when using vsnprintf to format log messages.",
"id": "GSD-2008-2711",
"modified": "2023-12-13T01:23:00.495430Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2008-2711",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "fetchmail 6.3.8 and earlier, when running in -v -v (aka verbose) mode, allows remote attackers to cause a denial of service (crash and persistent mail failure) via a malformed mail message with long headers, which triggers an erroneous dereference when using vsnprintf to format log messages."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "ADV-2008-1860",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/1860/references"
},
{
"name": "31287",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31287"
},
{
"name": "20080729 rPSA-2008-0235-1 fetchmail fetchmailconf",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/494865/100/0/threaded"
},
{
"name": "1020298",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1020298"
},
{
"name": "33937",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33937"
},
{
"name": "20080617 fetchmail security announcement fetchmail-SA-2008-01 (CVE-2008-2711)",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/493391/100/0/threaded"
},
{
"name": "31262",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31262"
},
{
"name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0235",
"refsource": "CONFIRM",
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0235"
},
{
"name": "http://support.apple.com/kb/HT3438",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT3438"
},
{
"name": "APPLE-SA-2009-02-12",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"
},
{
"name": "30895",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30895"
},
{
"name": "FEDORA-2008-5800",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg01095.html"
},
{
"name": "FEDORA-2008-5789",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg01091.html"
},
{
"name": "SSA:2008-210-01",
"refsource": "SLACKWARE",
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.495740"
},
{
"name": "http://www.fetchmail.info/fetchmail-SA-2008-01.txt",
"refsource": "CONFIRM",
"url": "http://www.fetchmail.info/fetchmail-SA-2008-01.txt"
},
{
"name": "ADV-2009-0422",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/0422"
},
{
"name": "29705",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/29705"
},
{
"name": "https://issues.rpath.com/browse/RPL-2623",
"refsource": "CONFIRM",
"url": "https://issues.rpath.com/browse/RPL-2623"
},
{
"name": "https://bugzilla.novell.com/show_bug.cgi?id=354291",
"refsource": "MISC",
"url": "https://bugzilla.novell.com/show_bug.cgi?id=354291"
},
{
"name": "MDVSA-2008:117",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:117"
},
{
"name": "fetchmail-logmessage-dos(43121)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43121"
},
{
"name": "[oss-security] 20080613 CVE Id Request: fetchmail \u003c= 6.3.8 DoS when logging long headers in -v -v mode",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2008/06/13/1"
},
{
"name": "oval:org.mitre.oval:def:10950",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10950"
},
{
"name": "30742",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30742"
},
{
"name": "[oss-security] 20210809 fetchmail 6.4.21 released/regression fix for 6.4.20\u0027s security fix, and UPDATE: fetchmail \u003c= 6.4.19 security announcement 2021-01 (CVE-2021-36386)",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2021/08/09/1"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:6.3.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:6.3.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:6.2.5.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:6.2.6:pre9:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:6.2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:6.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.9.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.8.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.8.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.7.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.5.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.4.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.2.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.2.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.0.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.0.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:4.7.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:4.7.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:4.6.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:4.6.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:4.6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:4.5.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:4.5.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.9.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.7.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.8.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:6.2.5.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:6.3.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:6.3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc9:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:6.2.6:pre8:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:6.2.6:pre4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:6.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.9.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.8.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.8.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.7.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.4.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.4.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.2.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.2.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.0.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:4.7.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:4.7.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:4.6.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:4.6.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:4.5.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:4.5.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:6.2.5.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:6.3.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:6.3.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:6.2.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:6.2.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.9.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.9.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.8.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.8.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.5.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.5.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.3.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.3.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.1.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:4.7.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:4.7.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:4.6.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:4.6.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:4.5.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:4.5.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc10:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:6.2.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.4.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "6.3.8",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:6.3.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc8:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc7:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:6.2.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:6.2.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.9.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.9.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.8.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.8.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.5.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.5.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.3.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.2.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.0.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:4.7.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:4.7.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:4.6.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:4.6.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:4.6.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:4.5.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:4.5.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:6.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.8.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2008-2711"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "fetchmail 6.3.8 and earlier, when running in -v -v (aka verbose) mode, allows remote attackers to cause a denial of service (crash and persistent mail failure) via a malformed mail message with long headers, which triggers an erroneous dereference when using vsnprintf to format log messages."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20080613 CVE Id Request: fetchmail \u003c= 6.3.8 DoS when logging long headers in -v -v mode",
"refsource": "MLIST",
"tags": [],
"url": "http://www.openwall.com/lists/oss-security/2008/06/13/1"
},
{
"name": "https://bugzilla.novell.com/show_bug.cgi?id=354291",
"refsource": "MISC",
"tags": [],
"url": "https://bugzilla.novell.com/show_bug.cgi?id=354291"
},
{
"name": "31287",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/31287"
},
{
"name": "https://issues.rpath.com/browse/RPL-2623",
"refsource": "CONFIRM",
"tags": [],
"url": "https://issues.rpath.com/browse/RPL-2623"
},
{
"name": "29705",
"refsource": "BID",
"tags": [],
"url": "http://www.securityfocus.com/bid/29705"
},
{
"name": "SSA:2008-210-01",
"refsource": "SLACKWARE",
"tags": [],
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.495740"
},
{
"name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0235",
"refsource": "CONFIRM",
"tags": [],
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0235"
},
{
"name": "1020298",
"refsource": "SECTRACK",
"tags": [],
"url": "http://www.securitytracker.com/id?1020298"
},
{
"name": "31262",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/31262"
},
{
"name": "http://www.fetchmail.info/fetchmail-SA-2008-01.txt",
"refsource": "CONFIRM",
"tags": [],
"url": "http://www.fetchmail.info/fetchmail-SA-2008-01.txt"
},
{
"name": "30742",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/30742"
},
{
"name": "MDVSA-2008:117",
"refsource": "MANDRIVA",
"tags": [],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:117"
},
{
"name": "FEDORA-2008-5800",
"refsource": "FEDORA",
"tags": [],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg01095.html"
},
{
"name": "FEDORA-2008-5789",
"refsource": "FEDORA",
"tags": [],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg01091.html"
},
{
"name": "30895",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/30895"
},
{
"name": "APPLE-SA-2009-02-12",
"refsource": "APPLE",
"tags": [],
"url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"
},
{
"name": "33937",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/33937"
},
{
"name": "http://support.apple.com/kb/HT3438",
"refsource": "CONFIRM",
"tags": [],
"url": "http://support.apple.com/kb/HT3438"
},
{
"name": "ADV-2009-0422",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2009/0422"
},
{
"name": "ADV-2008-1860",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2008/1860/references"
},
{
"name": "fetchmail-logmessage-dos(43121)",
"refsource": "XF",
"tags": [],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43121"
},
{
"name": "oval:org.mitre.oval:def:10950",
"refsource": "OVAL",
"tags": [],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10950"
},
{
"name": "20080729 rPSA-2008-0235-1 fetchmail fetchmailconf",
"refsource": "BUGTRAQ",
"tags": [],
"url": "http://www.securityfocus.com/archive/1/494865/100/0/threaded"
},
{
"name": "20080617 fetchmail security announcement fetchmail-SA-2008-01 (CVE-2008-2711)",
"refsource": "BUGTRAQ",
"tags": [],
"url": "http://www.securityfocus.com/archive/1/493391/100/0/threaded"
},
{
"name": "[oss-security] 20210809 fetchmail 6.4.21 released/regression fix for 6.4.20\u0027s security fix, and UPDATE: fetchmail \u003c= 6.4.19 security announcement 2021-01 (CVE-2021-36386)",
"refsource": "MLIST",
"tags": [],
"url": "http://www.openwall.com/lists/oss-security/2021/08/09/1"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2021-08-09T21:15Z",
"publishedDate": "2008-06-16T21:41Z"
}
}
}
RHSA-2009:1427
Vulnerability from csaf_redhat - Published: 2009-09-08 15:10 - Updated: 2026-01-13 22:13sink.c in fetchmail before 6.3.9 allows context-dependent attackers to cause a denial of service (NULL dereference and application crash) by refusing certain warning messages that are sent over SMTP.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 3AS:fetchmail-0:6.2.0-3.el3.5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:fetchmail-0:6.2.0-3.el3.5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:fetchmail-0:6.2.0-3.el3.5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:fetchmail-0:6.2.0-3.el3.5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:fetchmail-0:6.2.0-3.el3.5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:fetchmail-0:6.2.0-3.el3.5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:fetchmail-0:6.2.0-3.el3.5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:fetchmail-0:6.2.0-3.el3.5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:fetchmail-0:6.2.0-3.el3.5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:fetchmail-0:6.2.0-3.el3.5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:fetchmail-0:6.2.0-3.el3.5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:fetchmail-0:6.2.0-3.el3.5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:fetchmail-0:6.2.0-3.el3.5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:fetchmail-0:6.2.0-3.el3.5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:fetchmail-0:6.2.0-3.el3.5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:fetchmail-0:6.2.0-3.el3.5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:fetchmail-0:6.2.0-3.el3.5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:fetchmail-0:6.2.0-3.el3.5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:fetchmail-0:6.2.0-3.el3.5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:fetchmail-0:6.2.0-3.el3.5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:fetchmail-0:6.2.0-3.el3.5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:fetchmail-0:6.2.0-3.el3.5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:fetchmail-0:6.2.0-3.el3.5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:fetchmail-0:6.2.0-3.el3.5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:fetchmail-0:6.2.0-3.el3.5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:fetchmail-0:6.2.0-3.el3.5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:fetchmail-0:6.2.0-3.el3.5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:fetchmail-0:6.2.0-3.el3.5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:fetchmail-0:6.3.6-1.1.el5_3.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:fetchmail-0:6.3.6-1.1.el5_3.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:fetchmail-0:6.3.6-1.1.el5_3.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:fetchmail-0:6.3.6-1.1.el5_3.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:fetchmail-0:6.3.6-1.1.el5_3.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:fetchmail-0:6.3.6-1.1.el5_3.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.x86_64 | — |
Vendor Fix
fix
|
fetchmail 6.3.8 and earlier, when running in -v -v (aka verbose) mode, allows remote attackers to cause a denial of service (crash and persistent mail failure) via a malformed mail message with long headers, which triggers an erroneous dereference when using vsnprintf to format log messages.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 3AS:fetchmail-0:6.2.0-3.el3.5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:fetchmail-0:6.2.0-3.el3.5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:fetchmail-0:6.2.0-3.el3.5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:fetchmail-0:6.2.0-3.el3.5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:fetchmail-0:6.2.0-3.el3.5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:fetchmail-0:6.2.0-3.el3.5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:fetchmail-0:6.2.0-3.el3.5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:fetchmail-0:6.2.0-3.el3.5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:fetchmail-0:6.2.0-3.el3.5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:fetchmail-0:6.2.0-3.el3.5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:fetchmail-0:6.2.0-3.el3.5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:fetchmail-0:6.2.0-3.el3.5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:fetchmail-0:6.2.0-3.el3.5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:fetchmail-0:6.2.0-3.el3.5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:fetchmail-0:6.2.0-3.el3.5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:fetchmail-0:6.2.0-3.el3.5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:fetchmail-0:6.2.0-3.el3.5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:fetchmail-0:6.2.0-3.el3.5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:fetchmail-0:6.2.0-3.el3.5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:fetchmail-0:6.2.0-3.el3.5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:fetchmail-0:6.2.0-3.el3.5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:fetchmail-0:6.2.0-3.el3.5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:fetchmail-0:6.2.0-3.el3.5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:fetchmail-0:6.2.0-3.el3.5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:fetchmail-0:6.2.0-3.el3.5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:fetchmail-0:6.2.0-3.el3.5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:fetchmail-0:6.2.0-3.el3.5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:fetchmail-0:6.2.0-3.el3.5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:fetchmail-0:6.3.6-1.1.el5_3.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:fetchmail-0:6.3.6-1.1.el5_3.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:fetchmail-0:6.3.6-1.1.el5_3.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:fetchmail-0:6.3.6-1.1.el5_3.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:fetchmail-0:6.3.6-1.1.el5_3.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:fetchmail-0:6.3.6-1.1.el5_3.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.x86_64 | — |
Vendor Fix
fix
|
socket.c in fetchmail before 6.3.11 does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 3AS:fetchmail-0:6.2.0-3.el3.5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:fetchmail-0:6.2.0-3.el3.5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:fetchmail-0:6.2.0-3.el3.5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:fetchmail-0:6.2.0-3.el3.5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:fetchmail-0:6.2.0-3.el3.5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:fetchmail-0:6.2.0-3.el3.5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:fetchmail-0:6.2.0-3.el3.5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:fetchmail-0:6.2.0-3.el3.5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:fetchmail-0:6.2.0-3.el3.5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:fetchmail-0:6.2.0-3.el3.5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:fetchmail-0:6.2.0-3.el3.5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:fetchmail-0:6.2.0-3.el3.5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:fetchmail-0:6.2.0-3.el3.5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:fetchmail-0:6.2.0-3.el3.5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:fetchmail-0:6.2.0-3.el3.5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:fetchmail-0:6.2.0-3.el3.5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:fetchmail-0:6.2.0-3.el3.5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:fetchmail-0:6.2.0-3.el3.5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:fetchmail-0:6.2.0-3.el3.5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:fetchmail-0:6.2.0-3.el3.5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:fetchmail-0:6.2.0-3.el3.5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:fetchmail-0:6.2.0-3.el3.5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:fetchmail-0:6.2.0-3.el3.5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:fetchmail-0:6.2.0-3.el3.5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:fetchmail-0:6.2.0-3.el3.5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:fetchmail-0:6.2.0-3.el3.5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:fetchmail-0:6.2.0-3.el3.5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:fetchmail-0:6.2.0-3.el3.5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:fetchmail-0:6.3.6-1.1.el5_3.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:fetchmail-0:6.3.6-1.1.el5_3.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:fetchmail-0:6.3.6-1.1.el5_3.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:fetchmail-0:6.3.6-1.1.el5_3.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:fetchmail-0:6.3.6-1.1.el5_3.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:fetchmail-0:6.3.6-1.1.el5_3.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.x86_64 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An updated fetchmail package that fixes multiple security issues is now\navailable for Red Hat Enterprise Linux 3, 4, and 5.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "Fetchmail is a remote mail retrieval and forwarding utility intended for\nuse over on-demand TCP/IP links, such as SLIP and PPP connections.\n\nIt was discovered that fetchmail is affected by the previously published\n\"null prefix attack\", caused by incorrect handling of NULL characters in\nX.509 certificates. If an attacker is able to get a carefully-crafted\ncertificate signed by a trusted Certificate Authority, the attacker could\nuse the certificate during a man-in-the-middle attack and potentially\nconfuse fetchmail into accepting it by mistake. (CVE-2009-2666)\n\nA flaw was found in the way fetchmail handles rejections from a remote SMTP\nserver when sending warning mail to the postmaster. If fetchmail sent a\nwarning mail to the postmaster of an SMTP server and that SMTP server\nrejected it, fetchmail could crash. (CVE-2007-4565)\n\nA flaw was found in fetchmail. When fetchmail is run in double verbose\nmode (\"-v -v\"), it could crash upon receiving certain, malformed mail\nmessages with long headers. A remote attacker could use this flaw to cause\na denial of service if fetchmail was also running in daemon mode (\"-d\").\n(CVE-2008-2711)\n\nNote: when using SSL-enabled services, it is recommended that the fetchmail\n\"--sslcertck\" option be used to enforce strict SSL certificate checking.\n\nAll fetchmail users should upgrade to this updated package, which contains\nbackported patches to correct these issues. If fetchmail is running in\ndaemon mode, it must be restarted for this update to take effect (use the\n\"fetchmail --quit\" command to stop the fetchmail process).",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2009:1427",
"url": "https://access.redhat.com/errata/RHSA-2009:1427"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "260601",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=260601"
},
{
"category": "external",
"summary": "451758",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=451758"
},
{
"category": "external",
"summary": "515804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=515804"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1427.json"
}
],
"title": "Red Hat Security Advisory: fetchmail security update",
"tracking": {
"current_release_date": "2026-01-13T22:13:37+00:00",
"generator": {
"date": "2026-01-13T22:13:37+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.15"
}
},
"id": "RHSA-2009:1427",
"initial_release_date": "2009-09-08T15:10:00+00:00",
"revision_history": [
{
"date": "2009-09-08T15:10:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2009-09-08T11:20:37+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-13T22:13:37+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 3",
"product": {
"name": "Red Hat Enterprise Linux AS version 3",
"product_id": "3AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Desktop version 3",
"product": {
"name": "Red Hat Desktop version 3",
"product_id": "3Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 3",
"product": {
"name": "Red Hat Enterprise Linux ES version 3",
"product_id": "3ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 3",
"product": {
"name": "Red Hat Enterprise Linux WS version 3",
"product_id": "3WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::ws"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4",
"product": {
"name": "Red Hat Enterprise Linux AS version 4",
"product_id": "4AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop version 4",
"product": {
"name": "Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4",
"product": {
"name": "Red Hat Enterprise Linux ES version 4",
"product_id": "4ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4",
"product": {
"name": "Red Hat Enterprise Linux WS version 4",
"product_id": "4WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "fetchmail-0:6.2.0-3.el3.5.ia64",
"product": {
"name": "fetchmail-0:6.2.0-3.el3.5.ia64",
"product_id": "fetchmail-0:6.2.0-3.el3.5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail@6.2.0-3.el3.5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64",
"product": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64",
"product_id": "fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.0-3.el3.5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64",
"product": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64",
"product_id": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.5-6.0.1.el4_8.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64",
"product": {
"name": "fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64",
"product_id": "fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail@6.2.5-6.0.1.el4_8.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ia64",
"product": {
"name": "fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ia64",
"product_id": "fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.3.6-1.1.el5_3.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "fetchmail-0:6.3.6-1.1.el5_3.1.ia64",
"product": {
"name": "fetchmail-0:6.3.6-1.1.el5_3.1.ia64",
"product_id": "fetchmail-0:6.3.6-1.1.el5_3.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail@6.3.6-1.1.el5_3.1?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "fetchmail-0:6.2.0-3.el3.5.src",
"product": {
"name": "fetchmail-0:6.2.0-3.el3.5.src",
"product_id": "fetchmail-0:6.2.0-3.el3.5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail@6.2.0-3.el3.5?arch=src"
}
}
},
{
"category": "product_version",
"name": "fetchmail-0:6.2.5-6.0.1.el4_8.1.src",
"product": {
"name": "fetchmail-0:6.2.5-6.0.1.el4_8.1.src",
"product_id": "fetchmail-0:6.2.5-6.0.1.el4_8.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail@6.2.5-6.0.1.el4_8.1?arch=src"
}
}
},
{
"category": "product_version",
"name": "fetchmail-0:6.3.6-1.1.el5_3.1.src",
"product": {
"name": "fetchmail-0:6.3.6-1.1.el5_3.1.src",
"product_id": "fetchmail-0:6.3.6-1.1.el5_3.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail@6.3.6-1.1.el5_3.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "fetchmail-0:6.2.0-3.el3.5.x86_64",
"product": {
"name": "fetchmail-0:6.2.0-3.el3.5.x86_64",
"product_id": "fetchmail-0:6.2.0-3.el3.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail@6.2.0-3.el3.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64",
"product": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64",
"product_id": "fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.0-3.el3.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64",
"product": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64",
"product_id": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.5-6.0.1.el4_8.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64",
"product": {
"name": "fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64",
"product_id": "fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail@6.2.5-6.0.1.el4_8.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.x86_64",
"product": {
"name": "fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.x86_64",
"product_id": "fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.3.6-1.1.el5_3.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fetchmail-0:6.3.6-1.1.el5_3.1.x86_64",
"product": {
"name": "fetchmail-0:6.3.6-1.1.el5_3.1.x86_64",
"product_id": "fetchmail-0:6.3.6-1.1.el5_3.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail@6.3.6-1.1.el5_3.1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "fetchmail-0:6.2.0-3.el3.5.i386",
"product": {
"name": "fetchmail-0:6.2.0-3.el3.5.i386",
"product_id": "fetchmail-0:6.2.0-3.el3.5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail@6.2.0-3.el3.5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.5.i386",
"product": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.5.i386",
"product_id": "fetchmail-debuginfo-0:6.2.0-3.el3.5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.0-3.el3.5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386",
"product": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386",
"product_id": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.5-6.0.1.el4_8.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "fetchmail-0:6.2.5-6.0.1.el4_8.1.i386",
"product": {
"name": "fetchmail-0:6.2.5-6.0.1.el4_8.1.i386",
"product_id": "fetchmail-0:6.2.5-6.0.1.el4_8.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail@6.2.5-6.0.1.el4_8.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.i386",
"product": {
"name": "fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.i386",
"product_id": "fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.3.6-1.1.el5_3.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "fetchmail-0:6.3.6-1.1.el5_3.1.i386",
"product": {
"name": "fetchmail-0:6.3.6-1.1.el5_3.1.i386",
"product_id": "fetchmail-0:6.3.6-1.1.el5_3.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail@6.3.6-1.1.el5_3.1?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "fetchmail-0:6.2.0-3.el3.5.ppc",
"product": {
"name": "fetchmail-0:6.2.0-3.el3.5.ppc",
"product_id": "fetchmail-0:6.2.0-3.el3.5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail@6.2.0-3.el3.5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc",
"product": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc",
"product_id": "fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.0-3.el3.5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc",
"product": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc",
"product_id": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.5-6.0.1.el4_8.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc",
"product": {
"name": "fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc",
"product_id": "fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail@6.2.5-6.0.1.el4_8.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ppc",
"product": {
"name": "fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ppc",
"product_id": "fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.3.6-1.1.el5_3.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "fetchmail-0:6.3.6-1.1.el5_3.1.ppc",
"product": {
"name": "fetchmail-0:6.3.6-1.1.el5_3.1.ppc",
"product_id": "fetchmail-0:6.3.6-1.1.el5_3.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail@6.3.6-1.1.el5_3.1?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "fetchmail-0:6.2.0-3.el3.5.s390x",
"product": {
"name": "fetchmail-0:6.2.0-3.el3.5.s390x",
"product_id": "fetchmail-0:6.2.0-3.el3.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail@6.2.0-3.el3.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x",
"product": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x",
"product_id": "fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.0-3.el3.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x",
"product": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x",
"product_id": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.5-6.0.1.el4_8.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x",
"product": {
"name": "fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x",
"product_id": "fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail@6.2.5-6.0.1.el4_8.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.s390x",
"product": {
"name": "fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.s390x",
"product_id": "fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.3.6-1.1.el5_3.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fetchmail-0:6.3.6-1.1.el5_3.1.s390x",
"product": {
"name": "fetchmail-0:6.3.6-1.1.el5_3.1.s390x",
"product_id": "fetchmail-0:6.3.6-1.1.el5_3.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail@6.3.6-1.1.el5_3.1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "fetchmail-0:6.2.0-3.el3.5.s390",
"product": {
"name": "fetchmail-0:6.2.0-3.el3.5.s390",
"product_id": "fetchmail-0:6.2.0-3.el3.5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail@6.2.0-3.el3.5?arch=s390"
}
}
},
{
"category": "product_version",
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.5.s390",
"product": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.5.s390",
"product_id": "fetchmail-debuginfo-0:6.2.0-3.el3.5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.0-3.el3.5?arch=s390"
}
}
},
{
"category": "product_version",
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390",
"product": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390",
"product_id": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.5-6.0.1.el4_8.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "fetchmail-0:6.2.5-6.0.1.el4_8.1.s390",
"product": {
"name": "fetchmail-0:6.2.5-6.0.1.el4_8.1.s390",
"product_id": "fetchmail-0:6.2.5-6.0.1.el4_8.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail@6.2.5-6.0.1.el4_8.1?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.0-3.el3.5.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:fetchmail-0:6.2.0-3.el3.5.i386"
},
"product_reference": "fetchmail-0:6.2.0-3.el3.5.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.0-3.el3.5.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:fetchmail-0:6.2.0-3.el3.5.ia64"
},
"product_reference": "fetchmail-0:6.2.0-3.el3.5.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.0-3.el3.5.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:fetchmail-0:6.2.0-3.el3.5.ppc"
},
"product_reference": "fetchmail-0:6.2.0-3.el3.5.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.0-3.el3.5.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:fetchmail-0:6.2.0-3.el3.5.s390"
},
"product_reference": "fetchmail-0:6.2.0-3.el3.5.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.0-3.el3.5.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:fetchmail-0:6.2.0-3.el3.5.s390x"
},
"product_reference": "fetchmail-0:6.2.0-3.el3.5.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.0-3.el3.5.src as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:fetchmail-0:6.2.0-3.el3.5.src"
},
"product_reference": "fetchmail-0:6.2.0-3.el3.5.src",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.0-3.el3.5.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:fetchmail-0:6.2.0-3.el3.5.x86_64"
},
"product_reference": "fetchmail-0:6.2.0-3.el3.5.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.5.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386"
},
"product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.5.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64"
},
"product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc"
},
"product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.5.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390"
},
"product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.5.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x"
},
"product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64"
},
"product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.0-3.el3.5.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:fetchmail-0:6.2.0-3.el3.5.i386"
},
"product_reference": "fetchmail-0:6.2.0-3.el3.5.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.0-3.el3.5.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:fetchmail-0:6.2.0-3.el3.5.ia64"
},
"product_reference": "fetchmail-0:6.2.0-3.el3.5.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.0-3.el3.5.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:fetchmail-0:6.2.0-3.el3.5.ppc"
},
"product_reference": "fetchmail-0:6.2.0-3.el3.5.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.0-3.el3.5.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:fetchmail-0:6.2.0-3.el3.5.s390"
},
"product_reference": "fetchmail-0:6.2.0-3.el3.5.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.0-3.el3.5.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:fetchmail-0:6.2.0-3.el3.5.s390x"
},
"product_reference": "fetchmail-0:6.2.0-3.el3.5.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.0-3.el3.5.src as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:fetchmail-0:6.2.0-3.el3.5.src"
},
"product_reference": "fetchmail-0:6.2.0-3.el3.5.src",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.0-3.el3.5.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:fetchmail-0:6.2.0-3.el3.5.x86_64"
},
"product_reference": "fetchmail-0:6.2.0-3.el3.5.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.5.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386"
},
"product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.5.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64"
},
"product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc"
},
"product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.5.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390"
},
"product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.5.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x"
},
"product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64"
},
"product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.0-3.el3.5.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:fetchmail-0:6.2.0-3.el3.5.i386"
},
"product_reference": "fetchmail-0:6.2.0-3.el3.5.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.0-3.el3.5.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:fetchmail-0:6.2.0-3.el3.5.ia64"
},
"product_reference": "fetchmail-0:6.2.0-3.el3.5.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.0-3.el3.5.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:fetchmail-0:6.2.0-3.el3.5.ppc"
},
"product_reference": "fetchmail-0:6.2.0-3.el3.5.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.0-3.el3.5.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:fetchmail-0:6.2.0-3.el3.5.s390"
},
"product_reference": "fetchmail-0:6.2.0-3.el3.5.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.0-3.el3.5.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:fetchmail-0:6.2.0-3.el3.5.s390x"
},
"product_reference": "fetchmail-0:6.2.0-3.el3.5.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.0-3.el3.5.src as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:fetchmail-0:6.2.0-3.el3.5.src"
},
"product_reference": "fetchmail-0:6.2.0-3.el3.5.src",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.0-3.el3.5.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:fetchmail-0:6.2.0-3.el3.5.x86_64"
},
"product_reference": "fetchmail-0:6.2.0-3.el3.5.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.5.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386"
},
"product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.5.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64"
},
"product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc"
},
"product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.5.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390"
},
"product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.5.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x"
},
"product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64"
},
"product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.0-3.el3.5.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:fetchmail-0:6.2.0-3.el3.5.i386"
},
"product_reference": "fetchmail-0:6.2.0-3.el3.5.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.0-3.el3.5.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:fetchmail-0:6.2.0-3.el3.5.ia64"
},
"product_reference": "fetchmail-0:6.2.0-3.el3.5.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.0-3.el3.5.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:fetchmail-0:6.2.0-3.el3.5.ppc"
},
"product_reference": "fetchmail-0:6.2.0-3.el3.5.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.0-3.el3.5.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:fetchmail-0:6.2.0-3.el3.5.s390"
},
"product_reference": "fetchmail-0:6.2.0-3.el3.5.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.0-3.el3.5.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:fetchmail-0:6.2.0-3.el3.5.s390x"
},
"product_reference": "fetchmail-0:6.2.0-3.el3.5.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.0-3.el3.5.src as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:fetchmail-0:6.2.0-3.el3.5.src"
},
"product_reference": "fetchmail-0:6.2.0-3.el3.5.src",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.0-3.el3.5.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:fetchmail-0:6.2.0-3.el3.5.x86_64"
},
"product_reference": "fetchmail-0:6.2.0-3.el3.5.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.5.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386"
},
"product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.5.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64"
},
"product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc"
},
"product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.5.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390"
},
"product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.5.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x"
},
"product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64"
},
"product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.5-6.0.1.el4_8.1.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386"
},
"product_reference": "fetchmail-0:6.2.5-6.0.1.el4_8.1.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64"
},
"product_reference": "fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc"
},
"product_reference": "fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.5-6.0.1.el4_8.1.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390"
},
"product_reference": "fetchmail-0:6.2.5-6.0.1.el4_8.1.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x"
},
"product_reference": "fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.5-6.0.1.el4_8.1.src as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.src"
},
"product_reference": "fetchmail-0:6.2.5-6.0.1.el4_8.1.src",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64"
},
"product_reference": "fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386"
},
"product_reference": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64"
},
"product_reference": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc"
},
"product_reference": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390"
},
"product_reference": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x"
},
"product_reference": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64"
},
"product_reference": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.5-6.0.1.el4_8.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386"
},
"product_reference": "fetchmail-0:6.2.5-6.0.1.el4_8.1.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64"
},
"product_reference": "fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc"
},
"product_reference": "fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.5-6.0.1.el4_8.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390"
},
"product_reference": "fetchmail-0:6.2.5-6.0.1.el4_8.1.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x"
},
"product_reference": "fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.5-6.0.1.el4_8.1.src as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.src"
},
"product_reference": "fetchmail-0:6.2.5-6.0.1.el4_8.1.src",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64"
},
"product_reference": "fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386"
},
"product_reference": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64"
},
"product_reference": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc"
},
"product_reference": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390"
},
"product_reference": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x"
},
"product_reference": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64"
},
"product_reference": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.5-6.0.1.el4_8.1.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386"
},
"product_reference": "fetchmail-0:6.2.5-6.0.1.el4_8.1.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64"
},
"product_reference": "fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc"
},
"product_reference": "fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.5-6.0.1.el4_8.1.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390"
},
"product_reference": "fetchmail-0:6.2.5-6.0.1.el4_8.1.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x"
},
"product_reference": "fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.5-6.0.1.el4_8.1.src as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.src"
},
"product_reference": "fetchmail-0:6.2.5-6.0.1.el4_8.1.src",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64"
},
"product_reference": "fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386"
},
"product_reference": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64"
},
"product_reference": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc"
},
"product_reference": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390"
},
"product_reference": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x"
},
"product_reference": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64"
},
"product_reference": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.5-6.0.1.el4_8.1.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386"
},
"product_reference": "fetchmail-0:6.2.5-6.0.1.el4_8.1.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64"
},
"product_reference": "fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc"
},
"product_reference": "fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.5-6.0.1.el4_8.1.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390"
},
"product_reference": "fetchmail-0:6.2.5-6.0.1.el4_8.1.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x"
},
"product_reference": "fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.5-6.0.1.el4_8.1.src as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.src"
},
"product_reference": "fetchmail-0:6.2.5-6.0.1.el4_8.1.src",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64"
},
"product_reference": "fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386"
},
"product_reference": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64"
},
"product_reference": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc"
},
"product_reference": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390"
},
"product_reference": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x"
},
"product_reference": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64"
},
"product_reference": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.3.6-1.1.el5_3.1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.i386"
},
"product_reference": "fetchmail-0:6.3.6-1.1.el5_3.1.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.3.6-1.1.el5_3.1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.ia64"
},
"product_reference": "fetchmail-0:6.3.6-1.1.el5_3.1.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.3.6-1.1.el5_3.1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.ppc"
},
"product_reference": "fetchmail-0:6.3.6-1.1.el5_3.1.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.3.6-1.1.el5_3.1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.s390x"
},
"product_reference": "fetchmail-0:6.3.6-1.1.el5_3.1.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.3.6-1.1.el5_3.1.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.src"
},
"product_reference": "fetchmail-0:6.3.6-1.1.el5_3.1.src",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.3.6-1.1.el5_3.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.x86_64"
},
"product_reference": "fetchmail-0:6.3.6-1.1.el5_3.1.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.i386"
},
"product_reference": "fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ia64"
},
"product_reference": "fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ppc"
},
"product_reference": "fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.s390x"
},
"product_reference": "fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.x86_64"
},
"product_reference": "fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.3.6-1.1.el5_3.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:fetchmail-0:6.3.6-1.1.el5_3.1.i386"
},
"product_reference": "fetchmail-0:6.3.6-1.1.el5_3.1.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.3.6-1.1.el5_3.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:fetchmail-0:6.3.6-1.1.el5_3.1.ia64"
},
"product_reference": "fetchmail-0:6.3.6-1.1.el5_3.1.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.3.6-1.1.el5_3.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:fetchmail-0:6.3.6-1.1.el5_3.1.ppc"
},
"product_reference": "fetchmail-0:6.3.6-1.1.el5_3.1.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.3.6-1.1.el5_3.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:fetchmail-0:6.3.6-1.1.el5_3.1.s390x"
},
"product_reference": "fetchmail-0:6.3.6-1.1.el5_3.1.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.3.6-1.1.el5_3.1.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:fetchmail-0:6.3.6-1.1.el5_3.1.src"
},
"product_reference": "fetchmail-0:6.3.6-1.1.el5_3.1.src",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.3.6-1.1.el5_3.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:fetchmail-0:6.3.6-1.1.el5_3.1.x86_64"
},
"product_reference": "fetchmail-0:6.3.6-1.1.el5_3.1.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.i386"
},
"product_reference": "fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ia64"
},
"product_reference": "fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ppc"
},
"product_reference": "fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.s390x"
},
"product_reference": "fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.x86_64"
},
"product_reference": "fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.x86_64",
"relates_to_product_reference": "5Server"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-4565",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2007-08-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "260601"
}
],
"notes": [
{
"category": "description",
"text": "sink.c in fetchmail before 6.3.9 allows context-dependent attackers to cause a denial of service (NULL dereference and application crash) by refusing certain warning messages that are sent over SMTP.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Fetchmail NULL pointer dereference",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"3AS:fetchmail-0:6.2.0-3.el3.5.i386",
"3AS:fetchmail-0:6.2.0-3.el3.5.ia64",
"3AS:fetchmail-0:6.2.0-3.el3.5.ppc",
"3AS:fetchmail-0:6.2.0-3.el3.5.s390",
"3AS:fetchmail-0:6.2.0-3.el3.5.s390x",
"3AS:fetchmail-0:6.2.0-3.el3.5.src",
"3AS:fetchmail-0:6.2.0-3.el3.5.x86_64",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.i386",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.ia64",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.ppc",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.s390",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.s390x",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.src",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.x86_64",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64",
"3ES:fetchmail-0:6.2.0-3.el3.5.i386",
"3ES:fetchmail-0:6.2.0-3.el3.5.ia64",
"3ES:fetchmail-0:6.2.0-3.el3.5.ppc",
"3ES:fetchmail-0:6.2.0-3.el3.5.s390",
"3ES:fetchmail-0:6.2.0-3.el3.5.s390x",
"3ES:fetchmail-0:6.2.0-3.el3.5.src",
"3ES:fetchmail-0:6.2.0-3.el3.5.x86_64",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64",
"3WS:fetchmail-0:6.2.0-3.el3.5.i386",
"3WS:fetchmail-0:6.2.0-3.el3.5.ia64",
"3WS:fetchmail-0:6.2.0-3.el3.5.ppc",
"3WS:fetchmail-0:6.2.0-3.el3.5.s390",
"3WS:fetchmail-0:6.2.0-3.el3.5.s390x",
"3WS:fetchmail-0:6.2.0-3.el3.5.src",
"3WS:fetchmail-0:6.2.0-3.el3.5.x86_64",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.src",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.src",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.src",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.src",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.i386",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.ia64",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.ppc",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.s390x",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.src",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.x86_64",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.i386",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ia64",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ppc",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.s390x",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.x86_64",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.i386",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.ia64",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.ppc",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.s390x",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.src",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.x86_64",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.i386",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ia64",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ppc",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.s390x",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-4565"
},
{
"category": "external",
"summary": "RHBZ#260601",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=260601"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-4565",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4565"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-4565",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-4565"
}
],
"release_date": "2007-08-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-09-08T15:10:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"3AS:fetchmail-0:6.2.0-3.el3.5.i386",
"3AS:fetchmail-0:6.2.0-3.el3.5.ia64",
"3AS:fetchmail-0:6.2.0-3.el3.5.ppc",
"3AS:fetchmail-0:6.2.0-3.el3.5.s390",
"3AS:fetchmail-0:6.2.0-3.el3.5.s390x",
"3AS:fetchmail-0:6.2.0-3.el3.5.src",
"3AS:fetchmail-0:6.2.0-3.el3.5.x86_64",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.i386",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.ia64",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.ppc",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.s390",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.s390x",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.src",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.x86_64",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64",
"3ES:fetchmail-0:6.2.0-3.el3.5.i386",
"3ES:fetchmail-0:6.2.0-3.el3.5.ia64",
"3ES:fetchmail-0:6.2.0-3.el3.5.ppc",
"3ES:fetchmail-0:6.2.0-3.el3.5.s390",
"3ES:fetchmail-0:6.2.0-3.el3.5.s390x",
"3ES:fetchmail-0:6.2.0-3.el3.5.src",
"3ES:fetchmail-0:6.2.0-3.el3.5.x86_64",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64",
"3WS:fetchmail-0:6.2.0-3.el3.5.i386",
"3WS:fetchmail-0:6.2.0-3.el3.5.ia64",
"3WS:fetchmail-0:6.2.0-3.el3.5.ppc",
"3WS:fetchmail-0:6.2.0-3.el3.5.s390",
"3WS:fetchmail-0:6.2.0-3.el3.5.s390x",
"3WS:fetchmail-0:6.2.0-3.el3.5.src",
"3WS:fetchmail-0:6.2.0-3.el3.5.x86_64",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.src",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.src",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.src",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.src",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.i386",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.ia64",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.ppc",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.s390x",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.src",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.x86_64",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.i386",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ia64",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ppc",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.s390x",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.x86_64",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.i386",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.ia64",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.ppc",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.s390x",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.src",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.x86_64",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.i386",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ia64",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ppc",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.s390x",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1427"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"3AS:fetchmail-0:6.2.0-3.el3.5.i386",
"3AS:fetchmail-0:6.2.0-3.el3.5.ia64",
"3AS:fetchmail-0:6.2.0-3.el3.5.ppc",
"3AS:fetchmail-0:6.2.0-3.el3.5.s390",
"3AS:fetchmail-0:6.2.0-3.el3.5.s390x",
"3AS:fetchmail-0:6.2.0-3.el3.5.src",
"3AS:fetchmail-0:6.2.0-3.el3.5.x86_64",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.i386",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.ia64",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.ppc",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.s390",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.s390x",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.src",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.x86_64",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64",
"3ES:fetchmail-0:6.2.0-3.el3.5.i386",
"3ES:fetchmail-0:6.2.0-3.el3.5.ia64",
"3ES:fetchmail-0:6.2.0-3.el3.5.ppc",
"3ES:fetchmail-0:6.2.0-3.el3.5.s390",
"3ES:fetchmail-0:6.2.0-3.el3.5.s390x",
"3ES:fetchmail-0:6.2.0-3.el3.5.src",
"3ES:fetchmail-0:6.2.0-3.el3.5.x86_64",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64",
"3WS:fetchmail-0:6.2.0-3.el3.5.i386",
"3WS:fetchmail-0:6.2.0-3.el3.5.ia64",
"3WS:fetchmail-0:6.2.0-3.el3.5.ppc",
"3WS:fetchmail-0:6.2.0-3.el3.5.s390",
"3WS:fetchmail-0:6.2.0-3.el3.5.s390x",
"3WS:fetchmail-0:6.2.0-3.el3.5.src",
"3WS:fetchmail-0:6.2.0-3.el3.5.x86_64",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.src",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.src",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.src",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.src",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.i386",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.ia64",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.ppc",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.s390x",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.src",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.x86_64",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.i386",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ia64",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ppc",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.s390x",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.x86_64",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.i386",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.ia64",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.ppc",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.s390x",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.src",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.x86_64",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.i386",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ia64",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ppc",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.s390x",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Fetchmail NULL pointer dereference"
},
{
"cve": "CVE-2008-2711",
"discovery_date": "2008-06-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "451758"
}
],
"notes": [
{
"category": "description",
"text": "fetchmail 6.3.8 and earlier, when running in -v -v (aka verbose) mode, allows remote attackers to cause a denial of service (crash and persistent mail failure) via a malformed mail message with long headers, which triggers an erroneous dereference when using vsnprintf to format log messages.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "fetchmail: Crash in large log messages in verbose mode",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"3AS:fetchmail-0:6.2.0-3.el3.5.i386",
"3AS:fetchmail-0:6.2.0-3.el3.5.ia64",
"3AS:fetchmail-0:6.2.0-3.el3.5.ppc",
"3AS:fetchmail-0:6.2.0-3.el3.5.s390",
"3AS:fetchmail-0:6.2.0-3.el3.5.s390x",
"3AS:fetchmail-0:6.2.0-3.el3.5.src",
"3AS:fetchmail-0:6.2.0-3.el3.5.x86_64",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.i386",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.ia64",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.ppc",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.s390",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.s390x",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.src",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.x86_64",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64",
"3ES:fetchmail-0:6.2.0-3.el3.5.i386",
"3ES:fetchmail-0:6.2.0-3.el3.5.ia64",
"3ES:fetchmail-0:6.2.0-3.el3.5.ppc",
"3ES:fetchmail-0:6.2.0-3.el3.5.s390",
"3ES:fetchmail-0:6.2.0-3.el3.5.s390x",
"3ES:fetchmail-0:6.2.0-3.el3.5.src",
"3ES:fetchmail-0:6.2.0-3.el3.5.x86_64",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64",
"3WS:fetchmail-0:6.2.0-3.el3.5.i386",
"3WS:fetchmail-0:6.2.0-3.el3.5.ia64",
"3WS:fetchmail-0:6.2.0-3.el3.5.ppc",
"3WS:fetchmail-0:6.2.0-3.el3.5.s390",
"3WS:fetchmail-0:6.2.0-3.el3.5.s390x",
"3WS:fetchmail-0:6.2.0-3.el3.5.src",
"3WS:fetchmail-0:6.2.0-3.el3.5.x86_64",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.src",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.src",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.src",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.src",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.i386",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.ia64",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.ppc",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.s390x",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.src",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.x86_64",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.i386",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ia64",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ppc",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.s390x",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.x86_64",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.i386",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.ia64",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.ppc",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.s390x",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.src",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.x86_64",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.i386",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ia64",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ppc",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.s390x",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-2711"
},
{
"category": "external",
"summary": "RHBZ#451758",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=451758"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-2711",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2711"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-2711",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2711"
}
],
"release_date": "2008-06-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-09-08T15:10:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"3AS:fetchmail-0:6.2.0-3.el3.5.i386",
"3AS:fetchmail-0:6.2.0-3.el3.5.ia64",
"3AS:fetchmail-0:6.2.0-3.el3.5.ppc",
"3AS:fetchmail-0:6.2.0-3.el3.5.s390",
"3AS:fetchmail-0:6.2.0-3.el3.5.s390x",
"3AS:fetchmail-0:6.2.0-3.el3.5.src",
"3AS:fetchmail-0:6.2.0-3.el3.5.x86_64",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.i386",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.ia64",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.ppc",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.s390",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.s390x",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.src",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.x86_64",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64",
"3ES:fetchmail-0:6.2.0-3.el3.5.i386",
"3ES:fetchmail-0:6.2.0-3.el3.5.ia64",
"3ES:fetchmail-0:6.2.0-3.el3.5.ppc",
"3ES:fetchmail-0:6.2.0-3.el3.5.s390",
"3ES:fetchmail-0:6.2.0-3.el3.5.s390x",
"3ES:fetchmail-0:6.2.0-3.el3.5.src",
"3ES:fetchmail-0:6.2.0-3.el3.5.x86_64",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64",
"3WS:fetchmail-0:6.2.0-3.el3.5.i386",
"3WS:fetchmail-0:6.2.0-3.el3.5.ia64",
"3WS:fetchmail-0:6.2.0-3.el3.5.ppc",
"3WS:fetchmail-0:6.2.0-3.el3.5.s390",
"3WS:fetchmail-0:6.2.0-3.el3.5.s390x",
"3WS:fetchmail-0:6.2.0-3.el3.5.src",
"3WS:fetchmail-0:6.2.0-3.el3.5.x86_64",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.src",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.src",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.src",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.src",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.i386",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.ia64",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.ppc",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.s390x",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.src",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.x86_64",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.i386",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ia64",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ppc",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.s390x",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.x86_64",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.i386",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.ia64",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.ppc",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.s390x",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.src",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.x86_64",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.i386",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ia64",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ppc",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.s390x",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1427"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"3AS:fetchmail-0:6.2.0-3.el3.5.i386",
"3AS:fetchmail-0:6.2.0-3.el3.5.ia64",
"3AS:fetchmail-0:6.2.0-3.el3.5.ppc",
"3AS:fetchmail-0:6.2.0-3.el3.5.s390",
"3AS:fetchmail-0:6.2.0-3.el3.5.s390x",
"3AS:fetchmail-0:6.2.0-3.el3.5.src",
"3AS:fetchmail-0:6.2.0-3.el3.5.x86_64",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.i386",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.ia64",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.ppc",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.s390",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.s390x",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.src",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.x86_64",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64",
"3ES:fetchmail-0:6.2.0-3.el3.5.i386",
"3ES:fetchmail-0:6.2.0-3.el3.5.ia64",
"3ES:fetchmail-0:6.2.0-3.el3.5.ppc",
"3ES:fetchmail-0:6.2.0-3.el3.5.s390",
"3ES:fetchmail-0:6.2.0-3.el3.5.s390x",
"3ES:fetchmail-0:6.2.0-3.el3.5.src",
"3ES:fetchmail-0:6.2.0-3.el3.5.x86_64",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64",
"3WS:fetchmail-0:6.2.0-3.el3.5.i386",
"3WS:fetchmail-0:6.2.0-3.el3.5.ia64",
"3WS:fetchmail-0:6.2.0-3.el3.5.ppc",
"3WS:fetchmail-0:6.2.0-3.el3.5.s390",
"3WS:fetchmail-0:6.2.0-3.el3.5.s390x",
"3WS:fetchmail-0:6.2.0-3.el3.5.src",
"3WS:fetchmail-0:6.2.0-3.el3.5.x86_64",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.src",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.src",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.src",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.src",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.i386",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.ia64",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.ppc",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.s390x",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.src",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.x86_64",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.i386",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ia64",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ppc",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.s390x",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.x86_64",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.i386",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.ia64",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.ppc",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.s390x",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.src",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.x86_64",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.i386",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ia64",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ppc",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.s390x",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "fetchmail: Crash in large log messages in verbose mode"
},
{
"cve": "CVE-2009-2666",
"discovery_date": "2009-08-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "515804"
}
],
"notes": [
{
"category": "description",
"text": "socket.c in fetchmail before 6.3.11 does not properly handle a \u0027\\0\u0027 character in a domain name in the subject\u0027s Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "fetchmail: SSL null terminator bypass",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"3AS:fetchmail-0:6.2.0-3.el3.5.i386",
"3AS:fetchmail-0:6.2.0-3.el3.5.ia64",
"3AS:fetchmail-0:6.2.0-3.el3.5.ppc",
"3AS:fetchmail-0:6.2.0-3.el3.5.s390",
"3AS:fetchmail-0:6.2.0-3.el3.5.s390x",
"3AS:fetchmail-0:6.2.0-3.el3.5.src",
"3AS:fetchmail-0:6.2.0-3.el3.5.x86_64",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.i386",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.ia64",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.ppc",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.s390",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.s390x",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.src",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.x86_64",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64",
"3ES:fetchmail-0:6.2.0-3.el3.5.i386",
"3ES:fetchmail-0:6.2.0-3.el3.5.ia64",
"3ES:fetchmail-0:6.2.0-3.el3.5.ppc",
"3ES:fetchmail-0:6.2.0-3.el3.5.s390",
"3ES:fetchmail-0:6.2.0-3.el3.5.s390x",
"3ES:fetchmail-0:6.2.0-3.el3.5.src",
"3ES:fetchmail-0:6.2.0-3.el3.5.x86_64",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64",
"3WS:fetchmail-0:6.2.0-3.el3.5.i386",
"3WS:fetchmail-0:6.2.0-3.el3.5.ia64",
"3WS:fetchmail-0:6.2.0-3.el3.5.ppc",
"3WS:fetchmail-0:6.2.0-3.el3.5.s390",
"3WS:fetchmail-0:6.2.0-3.el3.5.s390x",
"3WS:fetchmail-0:6.2.0-3.el3.5.src",
"3WS:fetchmail-0:6.2.0-3.el3.5.x86_64",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.src",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.src",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.src",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.src",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.i386",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.ia64",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.ppc",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.s390x",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.src",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.x86_64",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.i386",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ia64",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ppc",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.s390x",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.x86_64",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.i386",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.ia64",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.ppc",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.s390x",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.src",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.x86_64",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.i386",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ia64",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ppc",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.s390x",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2666"
},
{
"category": "external",
"summary": "RHBZ#515804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=515804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2666",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2666"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2666",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2666"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-09-08T15:10:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"3AS:fetchmail-0:6.2.0-3.el3.5.i386",
"3AS:fetchmail-0:6.2.0-3.el3.5.ia64",
"3AS:fetchmail-0:6.2.0-3.el3.5.ppc",
"3AS:fetchmail-0:6.2.0-3.el3.5.s390",
"3AS:fetchmail-0:6.2.0-3.el3.5.s390x",
"3AS:fetchmail-0:6.2.0-3.el3.5.src",
"3AS:fetchmail-0:6.2.0-3.el3.5.x86_64",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.i386",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.ia64",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.ppc",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.s390",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.s390x",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.src",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.x86_64",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64",
"3ES:fetchmail-0:6.2.0-3.el3.5.i386",
"3ES:fetchmail-0:6.2.0-3.el3.5.ia64",
"3ES:fetchmail-0:6.2.0-3.el3.5.ppc",
"3ES:fetchmail-0:6.2.0-3.el3.5.s390",
"3ES:fetchmail-0:6.2.0-3.el3.5.s390x",
"3ES:fetchmail-0:6.2.0-3.el3.5.src",
"3ES:fetchmail-0:6.2.0-3.el3.5.x86_64",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64",
"3WS:fetchmail-0:6.2.0-3.el3.5.i386",
"3WS:fetchmail-0:6.2.0-3.el3.5.ia64",
"3WS:fetchmail-0:6.2.0-3.el3.5.ppc",
"3WS:fetchmail-0:6.2.0-3.el3.5.s390",
"3WS:fetchmail-0:6.2.0-3.el3.5.s390x",
"3WS:fetchmail-0:6.2.0-3.el3.5.src",
"3WS:fetchmail-0:6.2.0-3.el3.5.x86_64",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.src",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.src",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.src",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.src",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.i386",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.ia64",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.ppc",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.s390x",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.src",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.x86_64",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.i386",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ia64",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ppc",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.s390x",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.x86_64",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.i386",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.ia64",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.ppc",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.s390x",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.src",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.x86_64",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.i386",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ia64",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ppc",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.s390x",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1427"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"3AS:fetchmail-0:6.2.0-3.el3.5.i386",
"3AS:fetchmail-0:6.2.0-3.el3.5.ia64",
"3AS:fetchmail-0:6.2.0-3.el3.5.ppc",
"3AS:fetchmail-0:6.2.0-3.el3.5.s390",
"3AS:fetchmail-0:6.2.0-3.el3.5.s390x",
"3AS:fetchmail-0:6.2.0-3.el3.5.src",
"3AS:fetchmail-0:6.2.0-3.el3.5.x86_64",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.i386",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.ia64",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.ppc",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.s390",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.s390x",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.src",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.x86_64",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64",
"3ES:fetchmail-0:6.2.0-3.el3.5.i386",
"3ES:fetchmail-0:6.2.0-3.el3.5.ia64",
"3ES:fetchmail-0:6.2.0-3.el3.5.ppc",
"3ES:fetchmail-0:6.2.0-3.el3.5.s390",
"3ES:fetchmail-0:6.2.0-3.el3.5.s390x",
"3ES:fetchmail-0:6.2.0-3.el3.5.src",
"3ES:fetchmail-0:6.2.0-3.el3.5.x86_64",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64",
"3WS:fetchmail-0:6.2.0-3.el3.5.i386",
"3WS:fetchmail-0:6.2.0-3.el3.5.ia64",
"3WS:fetchmail-0:6.2.0-3.el3.5.ppc",
"3WS:fetchmail-0:6.2.0-3.el3.5.s390",
"3WS:fetchmail-0:6.2.0-3.el3.5.s390x",
"3WS:fetchmail-0:6.2.0-3.el3.5.src",
"3WS:fetchmail-0:6.2.0-3.el3.5.x86_64",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.src",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.src",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.src",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.src",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.i386",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.ia64",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.ppc",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.s390x",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.src",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.x86_64",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.i386",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ia64",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ppc",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.s390x",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.x86_64",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.i386",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.ia64",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.ppc",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.s390x",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.src",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.x86_64",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.i386",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ia64",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ppc",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.s390x",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "fetchmail: SSL null terminator bypass"
}
]
}
RHSA-2009_1427
Vulnerability from csaf_redhat - Published: 2009-09-08 15:10 - Updated: 2024-11-22 02:57sink.c in fetchmail before 6.3.9 allows context-dependent attackers to cause a denial of service (NULL dereference and application crash) by refusing certain warning messages that are sent over SMTP.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 3AS:fetchmail-0:6.2.0-3.el3.5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:fetchmail-0:6.2.0-3.el3.5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:fetchmail-0:6.2.0-3.el3.5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:fetchmail-0:6.2.0-3.el3.5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:fetchmail-0:6.2.0-3.el3.5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:fetchmail-0:6.2.0-3.el3.5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:fetchmail-0:6.2.0-3.el3.5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:fetchmail-0:6.2.0-3.el3.5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:fetchmail-0:6.2.0-3.el3.5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:fetchmail-0:6.2.0-3.el3.5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:fetchmail-0:6.2.0-3.el3.5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:fetchmail-0:6.2.0-3.el3.5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:fetchmail-0:6.2.0-3.el3.5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:fetchmail-0:6.2.0-3.el3.5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:fetchmail-0:6.2.0-3.el3.5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:fetchmail-0:6.2.0-3.el3.5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:fetchmail-0:6.2.0-3.el3.5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:fetchmail-0:6.2.0-3.el3.5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:fetchmail-0:6.2.0-3.el3.5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:fetchmail-0:6.2.0-3.el3.5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:fetchmail-0:6.2.0-3.el3.5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:fetchmail-0:6.2.0-3.el3.5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:fetchmail-0:6.2.0-3.el3.5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:fetchmail-0:6.2.0-3.el3.5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:fetchmail-0:6.2.0-3.el3.5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:fetchmail-0:6.2.0-3.el3.5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:fetchmail-0:6.2.0-3.el3.5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:fetchmail-0:6.2.0-3.el3.5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:fetchmail-0:6.3.6-1.1.el5_3.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:fetchmail-0:6.3.6-1.1.el5_3.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:fetchmail-0:6.3.6-1.1.el5_3.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:fetchmail-0:6.3.6-1.1.el5_3.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:fetchmail-0:6.3.6-1.1.el5_3.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:fetchmail-0:6.3.6-1.1.el5_3.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.x86_64 | — |
Vendor Fix
fix
|
fetchmail 6.3.8 and earlier, when running in -v -v (aka verbose) mode, allows remote attackers to cause a denial of service (crash and persistent mail failure) via a malformed mail message with long headers, which triggers an erroneous dereference when using vsnprintf to format log messages.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 3AS:fetchmail-0:6.2.0-3.el3.5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:fetchmail-0:6.2.0-3.el3.5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:fetchmail-0:6.2.0-3.el3.5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:fetchmail-0:6.2.0-3.el3.5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:fetchmail-0:6.2.0-3.el3.5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:fetchmail-0:6.2.0-3.el3.5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:fetchmail-0:6.2.0-3.el3.5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:fetchmail-0:6.2.0-3.el3.5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:fetchmail-0:6.2.0-3.el3.5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:fetchmail-0:6.2.0-3.el3.5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:fetchmail-0:6.2.0-3.el3.5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:fetchmail-0:6.2.0-3.el3.5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:fetchmail-0:6.2.0-3.el3.5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:fetchmail-0:6.2.0-3.el3.5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:fetchmail-0:6.2.0-3.el3.5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:fetchmail-0:6.2.0-3.el3.5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:fetchmail-0:6.2.0-3.el3.5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:fetchmail-0:6.2.0-3.el3.5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:fetchmail-0:6.2.0-3.el3.5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:fetchmail-0:6.2.0-3.el3.5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:fetchmail-0:6.2.0-3.el3.5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:fetchmail-0:6.2.0-3.el3.5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:fetchmail-0:6.2.0-3.el3.5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:fetchmail-0:6.2.0-3.el3.5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:fetchmail-0:6.2.0-3.el3.5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:fetchmail-0:6.2.0-3.el3.5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:fetchmail-0:6.2.0-3.el3.5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:fetchmail-0:6.2.0-3.el3.5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:fetchmail-0:6.3.6-1.1.el5_3.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:fetchmail-0:6.3.6-1.1.el5_3.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:fetchmail-0:6.3.6-1.1.el5_3.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:fetchmail-0:6.3.6-1.1.el5_3.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:fetchmail-0:6.3.6-1.1.el5_3.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:fetchmail-0:6.3.6-1.1.el5_3.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.x86_64 | — |
Vendor Fix
fix
|
socket.c in fetchmail before 6.3.11 does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 3AS:fetchmail-0:6.2.0-3.el3.5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:fetchmail-0:6.2.0-3.el3.5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:fetchmail-0:6.2.0-3.el3.5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:fetchmail-0:6.2.0-3.el3.5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:fetchmail-0:6.2.0-3.el3.5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:fetchmail-0:6.2.0-3.el3.5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:fetchmail-0:6.2.0-3.el3.5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:fetchmail-0:6.2.0-3.el3.5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:fetchmail-0:6.2.0-3.el3.5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:fetchmail-0:6.2.0-3.el3.5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:fetchmail-0:6.2.0-3.el3.5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:fetchmail-0:6.2.0-3.el3.5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:fetchmail-0:6.2.0-3.el3.5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:fetchmail-0:6.2.0-3.el3.5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:fetchmail-0:6.2.0-3.el3.5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:fetchmail-0:6.2.0-3.el3.5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:fetchmail-0:6.2.0-3.el3.5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:fetchmail-0:6.2.0-3.el3.5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:fetchmail-0:6.2.0-3.el3.5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:fetchmail-0:6.2.0-3.el3.5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:fetchmail-0:6.2.0-3.el3.5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:fetchmail-0:6.2.0-3.el3.5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:fetchmail-0:6.2.0-3.el3.5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:fetchmail-0:6.2.0-3.el3.5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:fetchmail-0:6.2.0-3.el3.5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:fetchmail-0:6.2.0-3.el3.5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:fetchmail-0:6.2.0-3.el3.5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:fetchmail-0:6.2.0-3.el3.5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:fetchmail-0:6.3.6-1.1.el5_3.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:fetchmail-0:6.3.6-1.1.el5_3.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:fetchmail-0:6.3.6-1.1.el5_3.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:fetchmail-0:6.3.6-1.1.el5_3.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:fetchmail-0:6.3.6-1.1.el5_3.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:fetchmail-0:6.3.6-1.1.el5_3.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.x86_64 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An updated fetchmail package that fixes multiple security issues is now\navailable for Red Hat Enterprise Linux 3, 4, and 5.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "Fetchmail is a remote mail retrieval and forwarding utility intended for\nuse over on-demand TCP/IP links, such as SLIP and PPP connections.\n\nIt was discovered that fetchmail is affected by the previously published\n\"null prefix attack\", caused by incorrect handling of NULL characters in\nX.509 certificates. If an attacker is able to get a carefully-crafted\ncertificate signed by a trusted Certificate Authority, the attacker could\nuse the certificate during a man-in-the-middle attack and potentially\nconfuse fetchmail into accepting it by mistake. (CVE-2009-2666)\n\nA flaw was found in the way fetchmail handles rejections from a remote SMTP\nserver when sending warning mail to the postmaster. If fetchmail sent a\nwarning mail to the postmaster of an SMTP server and that SMTP server\nrejected it, fetchmail could crash. (CVE-2007-4565)\n\nA flaw was found in fetchmail. When fetchmail is run in double verbose\nmode (\"-v -v\"), it could crash upon receiving certain, malformed mail\nmessages with long headers. A remote attacker could use this flaw to cause\na denial of service if fetchmail was also running in daemon mode (\"-d\").\n(CVE-2008-2711)\n\nNote: when using SSL-enabled services, it is recommended that the fetchmail\n\"--sslcertck\" option be used to enforce strict SSL certificate checking.\n\nAll fetchmail users should upgrade to this updated package, which contains\nbackported patches to correct these issues. If fetchmail is running in\ndaemon mode, it must be restarted for this update to take effect (use the\n\"fetchmail --quit\" command to stop the fetchmail process).",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2009:1427",
"url": "https://access.redhat.com/errata/RHSA-2009:1427"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "260601",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=260601"
},
{
"category": "external",
"summary": "451758",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=451758"
},
{
"category": "external",
"summary": "515804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=515804"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1427.json"
}
],
"title": "Red Hat Security Advisory: fetchmail security update",
"tracking": {
"current_release_date": "2024-11-22T02:57:47+00:00",
"generator": {
"date": "2024-11-22T02:57:47+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2009:1427",
"initial_release_date": "2009-09-08T15:10:00+00:00",
"revision_history": [
{
"date": "2009-09-08T15:10:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2009-09-08T11:20:37+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T02:57:47+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 3",
"product": {
"name": "Red Hat Enterprise Linux AS version 3",
"product_id": "3AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Desktop version 3",
"product": {
"name": "Red Hat Desktop version 3",
"product_id": "3Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 3",
"product": {
"name": "Red Hat Enterprise Linux ES version 3",
"product_id": "3ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 3",
"product": {
"name": "Red Hat Enterprise Linux WS version 3",
"product_id": "3WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::ws"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4",
"product": {
"name": "Red Hat Enterprise Linux AS version 4",
"product_id": "4AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop version 4",
"product": {
"name": "Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4",
"product": {
"name": "Red Hat Enterprise Linux ES version 4",
"product_id": "4ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4",
"product": {
"name": "Red Hat Enterprise Linux WS version 4",
"product_id": "4WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "fetchmail-0:6.2.0-3.el3.5.ia64",
"product": {
"name": "fetchmail-0:6.2.0-3.el3.5.ia64",
"product_id": "fetchmail-0:6.2.0-3.el3.5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail@6.2.0-3.el3.5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64",
"product": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64",
"product_id": "fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.0-3.el3.5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64",
"product": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64",
"product_id": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.5-6.0.1.el4_8.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64",
"product": {
"name": "fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64",
"product_id": "fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail@6.2.5-6.0.1.el4_8.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ia64",
"product": {
"name": "fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ia64",
"product_id": "fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.3.6-1.1.el5_3.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "fetchmail-0:6.3.6-1.1.el5_3.1.ia64",
"product": {
"name": "fetchmail-0:6.3.6-1.1.el5_3.1.ia64",
"product_id": "fetchmail-0:6.3.6-1.1.el5_3.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail@6.3.6-1.1.el5_3.1?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "fetchmail-0:6.2.0-3.el3.5.src",
"product": {
"name": "fetchmail-0:6.2.0-3.el3.5.src",
"product_id": "fetchmail-0:6.2.0-3.el3.5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail@6.2.0-3.el3.5?arch=src"
}
}
},
{
"category": "product_version",
"name": "fetchmail-0:6.2.5-6.0.1.el4_8.1.src",
"product": {
"name": "fetchmail-0:6.2.5-6.0.1.el4_8.1.src",
"product_id": "fetchmail-0:6.2.5-6.0.1.el4_8.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail@6.2.5-6.0.1.el4_8.1?arch=src"
}
}
},
{
"category": "product_version",
"name": "fetchmail-0:6.3.6-1.1.el5_3.1.src",
"product": {
"name": "fetchmail-0:6.3.6-1.1.el5_3.1.src",
"product_id": "fetchmail-0:6.3.6-1.1.el5_3.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail@6.3.6-1.1.el5_3.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "fetchmail-0:6.2.0-3.el3.5.x86_64",
"product": {
"name": "fetchmail-0:6.2.0-3.el3.5.x86_64",
"product_id": "fetchmail-0:6.2.0-3.el3.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail@6.2.0-3.el3.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64",
"product": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64",
"product_id": "fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.0-3.el3.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64",
"product": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64",
"product_id": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.5-6.0.1.el4_8.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64",
"product": {
"name": "fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64",
"product_id": "fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail@6.2.5-6.0.1.el4_8.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.x86_64",
"product": {
"name": "fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.x86_64",
"product_id": "fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.3.6-1.1.el5_3.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fetchmail-0:6.3.6-1.1.el5_3.1.x86_64",
"product": {
"name": "fetchmail-0:6.3.6-1.1.el5_3.1.x86_64",
"product_id": "fetchmail-0:6.3.6-1.1.el5_3.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail@6.3.6-1.1.el5_3.1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "fetchmail-0:6.2.0-3.el3.5.i386",
"product": {
"name": "fetchmail-0:6.2.0-3.el3.5.i386",
"product_id": "fetchmail-0:6.2.0-3.el3.5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail@6.2.0-3.el3.5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.5.i386",
"product": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.5.i386",
"product_id": "fetchmail-debuginfo-0:6.2.0-3.el3.5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.0-3.el3.5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386",
"product": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386",
"product_id": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.5-6.0.1.el4_8.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "fetchmail-0:6.2.5-6.0.1.el4_8.1.i386",
"product": {
"name": "fetchmail-0:6.2.5-6.0.1.el4_8.1.i386",
"product_id": "fetchmail-0:6.2.5-6.0.1.el4_8.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail@6.2.5-6.0.1.el4_8.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.i386",
"product": {
"name": "fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.i386",
"product_id": "fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.3.6-1.1.el5_3.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "fetchmail-0:6.3.6-1.1.el5_3.1.i386",
"product": {
"name": "fetchmail-0:6.3.6-1.1.el5_3.1.i386",
"product_id": "fetchmail-0:6.3.6-1.1.el5_3.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail@6.3.6-1.1.el5_3.1?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "fetchmail-0:6.2.0-3.el3.5.ppc",
"product": {
"name": "fetchmail-0:6.2.0-3.el3.5.ppc",
"product_id": "fetchmail-0:6.2.0-3.el3.5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail@6.2.0-3.el3.5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc",
"product": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc",
"product_id": "fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.0-3.el3.5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc",
"product": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc",
"product_id": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.5-6.0.1.el4_8.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc",
"product": {
"name": "fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc",
"product_id": "fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail@6.2.5-6.0.1.el4_8.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ppc",
"product": {
"name": "fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ppc",
"product_id": "fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.3.6-1.1.el5_3.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "fetchmail-0:6.3.6-1.1.el5_3.1.ppc",
"product": {
"name": "fetchmail-0:6.3.6-1.1.el5_3.1.ppc",
"product_id": "fetchmail-0:6.3.6-1.1.el5_3.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail@6.3.6-1.1.el5_3.1?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "fetchmail-0:6.2.0-3.el3.5.s390x",
"product": {
"name": "fetchmail-0:6.2.0-3.el3.5.s390x",
"product_id": "fetchmail-0:6.2.0-3.el3.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail@6.2.0-3.el3.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x",
"product": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x",
"product_id": "fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.0-3.el3.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x",
"product": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x",
"product_id": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.5-6.0.1.el4_8.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x",
"product": {
"name": "fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x",
"product_id": "fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail@6.2.5-6.0.1.el4_8.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.s390x",
"product": {
"name": "fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.s390x",
"product_id": "fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.3.6-1.1.el5_3.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fetchmail-0:6.3.6-1.1.el5_3.1.s390x",
"product": {
"name": "fetchmail-0:6.3.6-1.1.el5_3.1.s390x",
"product_id": "fetchmail-0:6.3.6-1.1.el5_3.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail@6.3.6-1.1.el5_3.1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "fetchmail-0:6.2.0-3.el3.5.s390",
"product": {
"name": "fetchmail-0:6.2.0-3.el3.5.s390",
"product_id": "fetchmail-0:6.2.0-3.el3.5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail@6.2.0-3.el3.5?arch=s390"
}
}
},
{
"category": "product_version",
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.5.s390",
"product": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.5.s390",
"product_id": "fetchmail-debuginfo-0:6.2.0-3.el3.5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.0-3.el3.5?arch=s390"
}
}
},
{
"category": "product_version",
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390",
"product": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390",
"product_id": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.5-6.0.1.el4_8.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "fetchmail-0:6.2.5-6.0.1.el4_8.1.s390",
"product": {
"name": "fetchmail-0:6.2.5-6.0.1.el4_8.1.s390",
"product_id": "fetchmail-0:6.2.5-6.0.1.el4_8.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail@6.2.5-6.0.1.el4_8.1?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.0-3.el3.5.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:fetchmail-0:6.2.0-3.el3.5.i386"
},
"product_reference": "fetchmail-0:6.2.0-3.el3.5.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.0-3.el3.5.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:fetchmail-0:6.2.0-3.el3.5.ia64"
},
"product_reference": "fetchmail-0:6.2.0-3.el3.5.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.0-3.el3.5.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:fetchmail-0:6.2.0-3.el3.5.ppc"
},
"product_reference": "fetchmail-0:6.2.0-3.el3.5.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.0-3.el3.5.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:fetchmail-0:6.2.0-3.el3.5.s390"
},
"product_reference": "fetchmail-0:6.2.0-3.el3.5.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.0-3.el3.5.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:fetchmail-0:6.2.0-3.el3.5.s390x"
},
"product_reference": "fetchmail-0:6.2.0-3.el3.5.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.0-3.el3.5.src as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:fetchmail-0:6.2.0-3.el3.5.src"
},
"product_reference": "fetchmail-0:6.2.0-3.el3.5.src",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.0-3.el3.5.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:fetchmail-0:6.2.0-3.el3.5.x86_64"
},
"product_reference": "fetchmail-0:6.2.0-3.el3.5.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.5.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386"
},
"product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.5.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64"
},
"product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc"
},
"product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.5.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390"
},
"product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.5.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x"
},
"product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64"
},
"product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.0-3.el3.5.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:fetchmail-0:6.2.0-3.el3.5.i386"
},
"product_reference": "fetchmail-0:6.2.0-3.el3.5.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.0-3.el3.5.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:fetchmail-0:6.2.0-3.el3.5.ia64"
},
"product_reference": "fetchmail-0:6.2.0-3.el3.5.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.0-3.el3.5.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:fetchmail-0:6.2.0-3.el3.5.ppc"
},
"product_reference": "fetchmail-0:6.2.0-3.el3.5.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.0-3.el3.5.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:fetchmail-0:6.2.0-3.el3.5.s390"
},
"product_reference": "fetchmail-0:6.2.0-3.el3.5.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.0-3.el3.5.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:fetchmail-0:6.2.0-3.el3.5.s390x"
},
"product_reference": "fetchmail-0:6.2.0-3.el3.5.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.0-3.el3.5.src as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:fetchmail-0:6.2.0-3.el3.5.src"
},
"product_reference": "fetchmail-0:6.2.0-3.el3.5.src",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.0-3.el3.5.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:fetchmail-0:6.2.0-3.el3.5.x86_64"
},
"product_reference": "fetchmail-0:6.2.0-3.el3.5.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.5.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386"
},
"product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.5.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64"
},
"product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc"
},
"product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.5.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390"
},
"product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.5.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x"
},
"product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64"
},
"product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.0-3.el3.5.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:fetchmail-0:6.2.0-3.el3.5.i386"
},
"product_reference": "fetchmail-0:6.2.0-3.el3.5.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.0-3.el3.5.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:fetchmail-0:6.2.0-3.el3.5.ia64"
},
"product_reference": "fetchmail-0:6.2.0-3.el3.5.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.0-3.el3.5.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:fetchmail-0:6.2.0-3.el3.5.ppc"
},
"product_reference": "fetchmail-0:6.2.0-3.el3.5.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.0-3.el3.5.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:fetchmail-0:6.2.0-3.el3.5.s390"
},
"product_reference": "fetchmail-0:6.2.0-3.el3.5.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.0-3.el3.5.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:fetchmail-0:6.2.0-3.el3.5.s390x"
},
"product_reference": "fetchmail-0:6.2.0-3.el3.5.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.0-3.el3.5.src as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:fetchmail-0:6.2.0-3.el3.5.src"
},
"product_reference": "fetchmail-0:6.2.0-3.el3.5.src",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.0-3.el3.5.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:fetchmail-0:6.2.0-3.el3.5.x86_64"
},
"product_reference": "fetchmail-0:6.2.0-3.el3.5.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.5.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386"
},
"product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.5.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64"
},
"product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc"
},
"product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.5.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390"
},
"product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.5.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x"
},
"product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64"
},
"product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.0-3.el3.5.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:fetchmail-0:6.2.0-3.el3.5.i386"
},
"product_reference": "fetchmail-0:6.2.0-3.el3.5.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.0-3.el3.5.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:fetchmail-0:6.2.0-3.el3.5.ia64"
},
"product_reference": "fetchmail-0:6.2.0-3.el3.5.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.0-3.el3.5.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:fetchmail-0:6.2.0-3.el3.5.ppc"
},
"product_reference": "fetchmail-0:6.2.0-3.el3.5.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.0-3.el3.5.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:fetchmail-0:6.2.0-3.el3.5.s390"
},
"product_reference": "fetchmail-0:6.2.0-3.el3.5.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.0-3.el3.5.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:fetchmail-0:6.2.0-3.el3.5.s390x"
},
"product_reference": "fetchmail-0:6.2.0-3.el3.5.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.0-3.el3.5.src as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:fetchmail-0:6.2.0-3.el3.5.src"
},
"product_reference": "fetchmail-0:6.2.0-3.el3.5.src",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.0-3.el3.5.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:fetchmail-0:6.2.0-3.el3.5.x86_64"
},
"product_reference": "fetchmail-0:6.2.0-3.el3.5.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.5.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386"
},
"product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.5.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64"
},
"product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc"
},
"product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.5.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390"
},
"product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.5.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x"
},
"product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64"
},
"product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.5-6.0.1.el4_8.1.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386"
},
"product_reference": "fetchmail-0:6.2.5-6.0.1.el4_8.1.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64"
},
"product_reference": "fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc"
},
"product_reference": "fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.5-6.0.1.el4_8.1.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390"
},
"product_reference": "fetchmail-0:6.2.5-6.0.1.el4_8.1.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x"
},
"product_reference": "fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.5-6.0.1.el4_8.1.src as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.src"
},
"product_reference": "fetchmail-0:6.2.5-6.0.1.el4_8.1.src",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64"
},
"product_reference": "fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386"
},
"product_reference": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64"
},
"product_reference": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc"
},
"product_reference": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390"
},
"product_reference": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x"
},
"product_reference": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64"
},
"product_reference": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.5-6.0.1.el4_8.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386"
},
"product_reference": "fetchmail-0:6.2.5-6.0.1.el4_8.1.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64"
},
"product_reference": "fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc"
},
"product_reference": "fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.5-6.0.1.el4_8.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390"
},
"product_reference": "fetchmail-0:6.2.5-6.0.1.el4_8.1.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x"
},
"product_reference": "fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.5-6.0.1.el4_8.1.src as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.src"
},
"product_reference": "fetchmail-0:6.2.5-6.0.1.el4_8.1.src",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64"
},
"product_reference": "fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386"
},
"product_reference": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64"
},
"product_reference": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc"
},
"product_reference": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390"
},
"product_reference": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x"
},
"product_reference": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64"
},
"product_reference": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.5-6.0.1.el4_8.1.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386"
},
"product_reference": "fetchmail-0:6.2.5-6.0.1.el4_8.1.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64"
},
"product_reference": "fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc"
},
"product_reference": "fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.5-6.0.1.el4_8.1.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390"
},
"product_reference": "fetchmail-0:6.2.5-6.0.1.el4_8.1.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x"
},
"product_reference": "fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.5-6.0.1.el4_8.1.src as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.src"
},
"product_reference": "fetchmail-0:6.2.5-6.0.1.el4_8.1.src",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64"
},
"product_reference": "fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386"
},
"product_reference": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64"
},
"product_reference": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc"
},
"product_reference": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390"
},
"product_reference": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x"
},
"product_reference": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64"
},
"product_reference": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.5-6.0.1.el4_8.1.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386"
},
"product_reference": "fetchmail-0:6.2.5-6.0.1.el4_8.1.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64"
},
"product_reference": "fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc"
},
"product_reference": "fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.5-6.0.1.el4_8.1.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390"
},
"product_reference": "fetchmail-0:6.2.5-6.0.1.el4_8.1.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x"
},
"product_reference": "fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.5-6.0.1.el4_8.1.src as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.src"
},
"product_reference": "fetchmail-0:6.2.5-6.0.1.el4_8.1.src",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64"
},
"product_reference": "fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386"
},
"product_reference": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64"
},
"product_reference": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc"
},
"product_reference": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390"
},
"product_reference": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x"
},
"product_reference": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64"
},
"product_reference": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.3.6-1.1.el5_3.1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.i386"
},
"product_reference": "fetchmail-0:6.3.6-1.1.el5_3.1.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.3.6-1.1.el5_3.1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.ia64"
},
"product_reference": "fetchmail-0:6.3.6-1.1.el5_3.1.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.3.6-1.1.el5_3.1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.ppc"
},
"product_reference": "fetchmail-0:6.3.6-1.1.el5_3.1.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.3.6-1.1.el5_3.1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.s390x"
},
"product_reference": "fetchmail-0:6.3.6-1.1.el5_3.1.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.3.6-1.1.el5_3.1.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.src"
},
"product_reference": "fetchmail-0:6.3.6-1.1.el5_3.1.src",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.3.6-1.1.el5_3.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.x86_64"
},
"product_reference": "fetchmail-0:6.3.6-1.1.el5_3.1.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.i386"
},
"product_reference": "fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ia64"
},
"product_reference": "fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ppc"
},
"product_reference": "fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.s390x"
},
"product_reference": "fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.x86_64"
},
"product_reference": "fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.3.6-1.1.el5_3.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:fetchmail-0:6.3.6-1.1.el5_3.1.i386"
},
"product_reference": "fetchmail-0:6.3.6-1.1.el5_3.1.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.3.6-1.1.el5_3.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:fetchmail-0:6.3.6-1.1.el5_3.1.ia64"
},
"product_reference": "fetchmail-0:6.3.6-1.1.el5_3.1.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.3.6-1.1.el5_3.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:fetchmail-0:6.3.6-1.1.el5_3.1.ppc"
},
"product_reference": "fetchmail-0:6.3.6-1.1.el5_3.1.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.3.6-1.1.el5_3.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:fetchmail-0:6.3.6-1.1.el5_3.1.s390x"
},
"product_reference": "fetchmail-0:6.3.6-1.1.el5_3.1.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.3.6-1.1.el5_3.1.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:fetchmail-0:6.3.6-1.1.el5_3.1.src"
},
"product_reference": "fetchmail-0:6.3.6-1.1.el5_3.1.src",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.3.6-1.1.el5_3.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:fetchmail-0:6.3.6-1.1.el5_3.1.x86_64"
},
"product_reference": "fetchmail-0:6.3.6-1.1.el5_3.1.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.i386"
},
"product_reference": "fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ia64"
},
"product_reference": "fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ppc"
},
"product_reference": "fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.s390x"
},
"product_reference": "fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.x86_64"
},
"product_reference": "fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.x86_64",
"relates_to_product_reference": "5Server"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-4565",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2007-08-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "260601"
}
],
"notes": [
{
"category": "description",
"text": "sink.c in fetchmail before 6.3.9 allows context-dependent attackers to cause a denial of service (NULL dereference and application crash) by refusing certain warning messages that are sent over SMTP.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Fetchmail NULL pointer dereference",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"3AS:fetchmail-0:6.2.0-3.el3.5.i386",
"3AS:fetchmail-0:6.2.0-3.el3.5.ia64",
"3AS:fetchmail-0:6.2.0-3.el3.5.ppc",
"3AS:fetchmail-0:6.2.0-3.el3.5.s390",
"3AS:fetchmail-0:6.2.0-3.el3.5.s390x",
"3AS:fetchmail-0:6.2.0-3.el3.5.src",
"3AS:fetchmail-0:6.2.0-3.el3.5.x86_64",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.i386",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.ia64",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.ppc",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.s390",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.s390x",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.src",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.x86_64",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64",
"3ES:fetchmail-0:6.2.0-3.el3.5.i386",
"3ES:fetchmail-0:6.2.0-3.el3.5.ia64",
"3ES:fetchmail-0:6.2.0-3.el3.5.ppc",
"3ES:fetchmail-0:6.2.0-3.el3.5.s390",
"3ES:fetchmail-0:6.2.0-3.el3.5.s390x",
"3ES:fetchmail-0:6.2.0-3.el3.5.src",
"3ES:fetchmail-0:6.2.0-3.el3.5.x86_64",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64",
"3WS:fetchmail-0:6.2.0-3.el3.5.i386",
"3WS:fetchmail-0:6.2.0-3.el3.5.ia64",
"3WS:fetchmail-0:6.2.0-3.el3.5.ppc",
"3WS:fetchmail-0:6.2.0-3.el3.5.s390",
"3WS:fetchmail-0:6.2.0-3.el3.5.s390x",
"3WS:fetchmail-0:6.2.0-3.el3.5.src",
"3WS:fetchmail-0:6.2.0-3.el3.5.x86_64",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.src",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.src",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.src",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.src",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.i386",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.ia64",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.ppc",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.s390x",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.src",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.x86_64",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.i386",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ia64",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ppc",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.s390x",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.x86_64",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.i386",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.ia64",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.ppc",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.s390x",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.src",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.x86_64",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.i386",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ia64",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ppc",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.s390x",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-4565"
},
{
"category": "external",
"summary": "RHBZ#260601",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=260601"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-4565",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4565"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-4565",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-4565"
}
],
"release_date": "2007-08-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-09-08T15:10:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"3AS:fetchmail-0:6.2.0-3.el3.5.i386",
"3AS:fetchmail-0:6.2.0-3.el3.5.ia64",
"3AS:fetchmail-0:6.2.0-3.el3.5.ppc",
"3AS:fetchmail-0:6.2.0-3.el3.5.s390",
"3AS:fetchmail-0:6.2.0-3.el3.5.s390x",
"3AS:fetchmail-0:6.2.0-3.el3.5.src",
"3AS:fetchmail-0:6.2.0-3.el3.5.x86_64",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.i386",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.ia64",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.ppc",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.s390",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.s390x",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.src",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.x86_64",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64",
"3ES:fetchmail-0:6.2.0-3.el3.5.i386",
"3ES:fetchmail-0:6.2.0-3.el3.5.ia64",
"3ES:fetchmail-0:6.2.0-3.el3.5.ppc",
"3ES:fetchmail-0:6.2.0-3.el3.5.s390",
"3ES:fetchmail-0:6.2.0-3.el3.5.s390x",
"3ES:fetchmail-0:6.2.0-3.el3.5.src",
"3ES:fetchmail-0:6.2.0-3.el3.5.x86_64",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64",
"3WS:fetchmail-0:6.2.0-3.el3.5.i386",
"3WS:fetchmail-0:6.2.0-3.el3.5.ia64",
"3WS:fetchmail-0:6.2.0-3.el3.5.ppc",
"3WS:fetchmail-0:6.2.0-3.el3.5.s390",
"3WS:fetchmail-0:6.2.0-3.el3.5.s390x",
"3WS:fetchmail-0:6.2.0-3.el3.5.src",
"3WS:fetchmail-0:6.2.0-3.el3.5.x86_64",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.src",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.src",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.src",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.src",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.i386",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.ia64",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.ppc",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.s390x",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.src",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.x86_64",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.i386",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ia64",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ppc",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.s390x",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.x86_64",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.i386",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.ia64",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.ppc",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.s390x",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.src",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.x86_64",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.i386",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ia64",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ppc",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.s390x",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1427"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"3AS:fetchmail-0:6.2.0-3.el3.5.i386",
"3AS:fetchmail-0:6.2.0-3.el3.5.ia64",
"3AS:fetchmail-0:6.2.0-3.el3.5.ppc",
"3AS:fetchmail-0:6.2.0-3.el3.5.s390",
"3AS:fetchmail-0:6.2.0-3.el3.5.s390x",
"3AS:fetchmail-0:6.2.0-3.el3.5.src",
"3AS:fetchmail-0:6.2.0-3.el3.5.x86_64",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.i386",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.ia64",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.ppc",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.s390",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.s390x",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.src",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.x86_64",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64",
"3ES:fetchmail-0:6.2.0-3.el3.5.i386",
"3ES:fetchmail-0:6.2.0-3.el3.5.ia64",
"3ES:fetchmail-0:6.2.0-3.el3.5.ppc",
"3ES:fetchmail-0:6.2.0-3.el3.5.s390",
"3ES:fetchmail-0:6.2.0-3.el3.5.s390x",
"3ES:fetchmail-0:6.2.0-3.el3.5.src",
"3ES:fetchmail-0:6.2.0-3.el3.5.x86_64",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64",
"3WS:fetchmail-0:6.2.0-3.el3.5.i386",
"3WS:fetchmail-0:6.2.0-3.el3.5.ia64",
"3WS:fetchmail-0:6.2.0-3.el3.5.ppc",
"3WS:fetchmail-0:6.2.0-3.el3.5.s390",
"3WS:fetchmail-0:6.2.0-3.el3.5.s390x",
"3WS:fetchmail-0:6.2.0-3.el3.5.src",
"3WS:fetchmail-0:6.2.0-3.el3.5.x86_64",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.src",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.src",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.src",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.src",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.i386",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.ia64",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.ppc",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.s390x",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.src",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.x86_64",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.i386",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ia64",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ppc",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.s390x",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.x86_64",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.i386",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.ia64",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.ppc",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.s390x",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.src",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.x86_64",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.i386",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ia64",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ppc",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.s390x",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Fetchmail NULL pointer dereference"
},
{
"cve": "CVE-2008-2711",
"discovery_date": "2008-06-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "451758"
}
],
"notes": [
{
"category": "description",
"text": "fetchmail 6.3.8 and earlier, when running in -v -v (aka verbose) mode, allows remote attackers to cause a denial of service (crash and persistent mail failure) via a malformed mail message with long headers, which triggers an erroneous dereference when using vsnprintf to format log messages.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "fetchmail: Crash in large log messages in verbose mode",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"3AS:fetchmail-0:6.2.0-3.el3.5.i386",
"3AS:fetchmail-0:6.2.0-3.el3.5.ia64",
"3AS:fetchmail-0:6.2.0-3.el3.5.ppc",
"3AS:fetchmail-0:6.2.0-3.el3.5.s390",
"3AS:fetchmail-0:6.2.0-3.el3.5.s390x",
"3AS:fetchmail-0:6.2.0-3.el3.5.src",
"3AS:fetchmail-0:6.2.0-3.el3.5.x86_64",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.i386",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.ia64",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.ppc",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.s390",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.s390x",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.src",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.x86_64",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64",
"3ES:fetchmail-0:6.2.0-3.el3.5.i386",
"3ES:fetchmail-0:6.2.0-3.el3.5.ia64",
"3ES:fetchmail-0:6.2.0-3.el3.5.ppc",
"3ES:fetchmail-0:6.2.0-3.el3.5.s390",
"3ES:fetchmail-0:6.2.0-3.el3.5.s390x",
"3ES:fetchmail-0:6.2.0-3.el3.5.src",
"3ES:fetchmail-0:6.2.0-3.el3.5.x86_64",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64",
"3WS:fetchmail-0:6.2.0-3.el3.5.i386",
"3WS:fetchmail-0:6.2.0-3.el3.5.ia64",
"3WS:fetchmail-0:6.2.0-3.el3.5.ppc",
"3WS:fetchmail-0:6.2.0-3.el3.5.s390",
"3WS:fetchmail-0:6.2.0-3.el3.5.s390x",
"3WS:fetchmail-0:6.2.0-3.el3.5.src",
"3WS:fetchmail-0:6.2.0-3.el3.5.x86_64",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.src",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.src",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.src",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.src",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.i386",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.ia64",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.ppc",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.s390x",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.src",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.x86_64",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.i386",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ia64",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ppc",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.s390x",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.x86_64",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.i386",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.ia64",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.ppc",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.s390x",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.src",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.x86_64",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.i386",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ia64",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ppc",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.s390x",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-2711"
},
{
"category": "external",
"summary": "RHBZ#451758",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=451758"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-2711",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2711"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-2711",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2711"
}
],
"release_date": "2008-06-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-09-08T15:10:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"3AS:fetchmail-0:6.2.0-3.el3.5.i386",
"3AS:fetchmail-0:6.2.0-3.el3.5.ia64",
"3AS:fetchmail-0:6.2.0-3.el3.5.ppc",
"3AS:fetchmail-0:6.2.0-3.el3.5.s390",
"3AS:fetchmail-0:6.2.0-3.el3.5.s390x",
"3AS:fetchmail-0:6.2.0-3.el3.5.src",
"3AS:fetchmail-0:6.2.0-3.el3.5.x86_64",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.i386",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.ia64",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.ppc",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.s390",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.s390x",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.src",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.x86_64",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64",
"3ES:fetchmail-0:6.2.0-3.el3.5.i386",
"3ES:fetchmail-0:6.2.0-3.el3.5.ia64",
"3ES:fetchmail-0:6.2.0-3.el3.5.ppc",
"3ES:fetchmail-0:6.2.0-3.el3.5.s390",
"3ES:fetchmail-0:6.2.0-3.el3.5.s390x",
"3ES:fetchmail-0:6.2.0-3.el3.5.src",
"3ES:fetchmail-0:6.2.0-3.el3.5.x86_64",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64",
"3WS:fetchmail-0:6.2.0-3.el3.5.i386",
"3WS:fetchmail-0:6.2.0-3.el3.5.ia64",
"3WS:fetchmail-0:6.2.0-3.el3.5.ppc",
"3WS:fetchmail-0:6.2.0-3.el3.5.s390",
"3WS:fetchmail-0:6.2.0-3.el3.5.s390x",
"3WS:fetchmail-0:6.2.0-3.el3.5.src",
"3WS:fetchmail-0:6.2.0-3.el3.5.x86_64",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.src",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.src",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.src",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.src",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.i386",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.ia64",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.ppc",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.s390x",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.src",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.x86_64",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.i386",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ia64",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ppc",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.s390x",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.x86_64",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.i386",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.ia64",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.ppc",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.s390x",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.src",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.x86_64",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.i386",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ia64",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ppc",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.s390x",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1427"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"3AS:fetchmail-0:6.2.0-3.el3.5.i386",
"3AS:fetchmail-0:6.2.0-3.el3.5.ia64",
"3AS:fetchmail-0:6.2.0-3.el3.5.ppc",
"3AS:fetchmail-0:6.2.0-3.el3.5.s390",
"3AS:fetchmail-0:6.2.0-3.el3.5.s390x",
"3AS:fetchmail-0:6.2.0-3.el3.5.src",
"3AS:fetchmail-0:6.2.0-3.el3.5.x86_64",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.i386",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.ia64",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.ppc",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.s390",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.s390x",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.src",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.x86_64",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64",
"3ES:fetchmail-0:6.2.0-3.el3.5.i386",
"3ES:fetchmail-0:6.2.0-3.el3.5.ia64",
"3ES:fetchmail-0:6.2.0-3.el3.5.ppc",
"3ES:fetchmail-0:6.2.0-3.el3.5.s390",
"3ES:fetchmail-0:6.2.0-3.el3.5.s390x",
"3ES:fetchmail-0:6.2.0-3.el3.5.src",
"3ES:fetchmail-0:6.2.0-3.el3.5.x86_64",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64",
"3WS:fetchmail-0:6.2.0-3.el3.5.i386",
"3WS:fetchmail-0:6.2.0-3.el3.5.ia64",
"3WS:fetchmail-0:6.2.0-3.el3.5.ppc",
"3WS:fetchmail-0:6.2.0-3.el3.5.s390",
"3WS:fetchmail-0:6.2.0-3.el3.5.s390x",
"3WS:fetchmail-0:6.2.0-3.el3.5.src",
"3WS:fetchmail-0:6.2.0-3.el3.5.x86_64",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.src",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.src",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.src",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.src",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.i386",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.ia64",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.ppc",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.s390x",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.src",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.x86_64",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.i386",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ia64",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ppc",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.s390x",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.x86_64",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.i386",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.ia64",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.ppc",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.s390x",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.src",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.x86_64",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.i386",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ia64",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ppc",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.s390x",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "fetchmail: Crash in large log messages in verbose mode"
},
{
"cve": "CVE-2009-2666",
"discovery_date": "2009-08-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "515804"
}
],
"notes": [
{
"category": "description",
"text": "socket.c in fetchmail before 6.3.11 does not properly handle a \u0027\\0\u0027 character in a domain name in the subject\u0027s Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "fetchmail: SSL null terminator bypass",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"3AS:fetchmail-0:6.2.0-3.el3.5.i386",
"3AS:fetchmail-0:6.2.0-3.el3.5.ia64",
"3AS:fetchmail-0:6.2.0-3.el3.5.ppc",
"3AS:fetchmail-0:6.2.0-3.el3.5.s390",
"3AS:fetchmail-0:6.2.0-3.el3.5.s390x",
"3AS:fetchmail-0:6.2.0-3.el3.5.src",
"3AS:fetchmail-0:6.2.0-3.el3.5.x86_64",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.i386",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.ia64",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.ppc",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.s390",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.s390x",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.src",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.x86_64",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64",
"3ES:fetchmail-0:6.2.0-3.el3.5.i386",
"3ES:fetchmail-0:6.2.0-3.el3.5.ia64",
"3ES:fetchmail-0:6.2.0-3.el3.5.ppc",
"3ES:fetchmail-0:6.2.0-3.el3.5.s390",
"3ES:fetchmail-0:6.2.0-3.el3.5.s390x",
"3ES:fetchmail-0:6.2.0-3.el3.5.src",
"3ES:fetchmail-0:6.2.0-3.el3.5.x86_64",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64",
"3WS:fetchmail-0:6.2.0-3.el3.5.i386",
"3WS:fetchmail-0:6.2.0-3.el3.5.ia64",
"3WS:fetchmail-0:6.2.0-3.el3.5.ppc",
"3WS:fetchmail-0:6.2.0-3.el3.5.s390",
"3WS:fetchmail-0:6.2.0-3.el3.5.s390x",
"3WS:fetchmail-0:6.2.0-3.el3.5.src",
"3WS:fetchmail-0:6.2.0-3.el3.5.x86_64",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.src",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.src",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.src",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.src",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.i386",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.ia64",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.ppc",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.s390x",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.src",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.x86_64",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.i386",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ia64",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ppc",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.s390x",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.x86_64",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.i386",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.ia64",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.ppc",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.s390x",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.src",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.x86_64",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.i386",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ia64",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ppc",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.s390x",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2666"
},
{
"category": "external",
"summary": "RHBZ#515804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=515804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2666",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2666"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2666",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2666"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-09-08T15:10:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"3AS:fetchmail-0:6.2.0-3.el3.5.i386",
"3AS:fetchmail-0:6.2.0-3.el3.5.ia64",
"3AS:fetchmail-0:6.2.0-3.el3.5.ppc",
"3AS:fetchmail-0:6.2.0-3.el3.5.s390",
"3AS:fetchmail-0:6.2.0-3.el3.5.s390x",
"3AS:fetchmail-0:6.2.0-3.el3.5.src",
"3AS:fetchmail-0:6.2.0-3.el3.5.x86_64",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.i386",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.ia64",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.ppc",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.s390",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.s390x",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.src",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.x86_64",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64",
"3ES:fetchmail-0:6.2.0-3.el3.5.i386",
"3ES:fetchmail-0:6.2.0-3.el3.5.ia64",
"3ES:fetchmail-0:6.2.0-3.el3.5.ppc",
"3ES:fetchmail-0:6.2.0-3.el3.5.s390",
"3ES:fetchmail-0:6.2.0-3.el3.5.s390x",
"3ES:fetchmail-0:6.2.0-3.el3.5.src",
"3ES:fetchmail-0:6.2.0-3.el3.5.x86_64",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64",
"3WS:fetchmail-0:6.2.0-3.el3.5.i386",
"3WS:fetchmail-0:6.2.0-3.el3.5.ia64",
"3WS:fetchmail-0:6.2.0-3.el3.5.ppc",
"3WS:fetchmail-0:6.2.0-3.el3.5.s390",
"3WS:fetchmail-0:6.2.0-3.el3.5.s390x",
"3WS:fetchmail-0:6.2.0-3.el3.5.src",
"3WS:fetchmail-0:6.2.0-3.el3.5.x86_64",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.src",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.src",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.src",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.src",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.i386",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.ia64",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.ppc",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.s390x",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.src",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.x86_64",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.i386",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ia64",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ppc",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.s390x",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.x86_64",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.i386",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.ia64",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.ppc",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.s390x",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.src",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.x86_64",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.i386",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ia64",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ppc",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.s390x",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1427"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"3AS:fetchmail-0:6.2.0-3.el3.5.i386",
"3AS:fetchmail-0:6.2.0-3.el3.5.ia64",
"3AS:fetchmail-0:6.2.0-3.el3.5.ppc",
"3AS:fetchmail-0:6.2.0-3.el3.5.s390",
"3AS:fetchmail-0:6.2.0-3.el3.5.s390x",
"3AS:fetchmail-0:6.2.0-3.el3.5.src",
"3AS:fetchmail-0:6.2.0-3.el3.5.x86_64",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.i386",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.ia64",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.ppc",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.s390",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.s390x",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.src",
"3Desktop:fetchmail-0:6.2.0-3.el3.5.x86_64",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64",
"3ES:fetchmail-0:6.2.0-3.el3.5.i386",
"3ES:fetchmail-0:6.2.0-3.el3.5.ia64",
"3ES:fetchmail-0:6.2.0-3.el3.5.ppc",
"3ES:fetchmail-0:6.2.0-3.el3.5.s390",
"3ES:fetchmail-0:6.2.0-3.el3.5.s390x",
"3ES:fetchmail-0:6.2.0-3.el3.5.src",
"3ES:fetchmail-0:6.2.0-3.el3.5.x86_64",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64",
"3WS:fetchmail-0:6.2.0-3.el3.5.i386",
"3WS:fetchmail-0:6.2.0-3.el3.5.ia64",
"3WS:fetchmail-0:6.2.0-3.el3.5.ppc",
"3WS:fetchmail-0:6.2.0-3.el3.5.s390",
"3WS:fetchmail-0:6.2.0-3.el3.5.s390x",
"3WS:fetchmail-0:6.2.0-3.el3.5.src",
"3WS:fetchmail-0:6.2.0-3.el3.5.x86_64",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.i386",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ia64",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.ppc",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.s390x",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.5.x86_64",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.src",
"4AS:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.src",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.src",
"4ES:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.i386",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ia64",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.ppc",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.s390x",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.src",
"4WS:fetchmail-0:6.2.5-6.0.1.el4_8.1.x86_64",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.i386",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ia64",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.ppc",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.s390x",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4_8.1.x86_64",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.i386",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.ia64",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.ppc",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.s390x",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.src",
"5Client-Workstation:fetchmail-0:6.3.6-1.1.el5_3.1.x86_64",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.i386",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ia64",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ppc",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.s390x",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.x86_64",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.i386",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.ia64",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.ppc",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.s390x",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.src",
"5Server:fetchmail-0:6.3.6-1.1.el5_3.1.x86_64",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.i386",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ia64",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.ppc",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.s390x",
"5Server:fetchmail-debuginfo-0:6.3.6-1.1.el5_3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "fetchmail: SSL null terminator bypass"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.