[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96125

 
 

909

 
 

78020

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2005-2335

Date: (C)2005-07-27   (M)2017-10-12
 
CVSS Score: 5.0Access Vector: NETWORK
Exploitability Subscore: 10.0Access Complexity: LOW
Impact Subscore: 2.9Authentication: NONE
 Confidentiality: NONE
 Integrity: NONE
 Availability: PARTIAL











Buffer overflow in the POP3 client in Fetchmail before 6.2.5.2 allows remote POP3 servers to cause a denial of service and possibly execute arbitrary code via long UIDL responses. NOTE: a typo in an advisory accidentally used the wrong CVE identifier for the Fetchmail issue. This is the correct identifier.

Reference:
BID-14349
SECUNIA-16176
OSVDB-18174
BID-19289
http://www.securityfocus.com/archive/1/archive/1/435197/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/441856/100/200/threaded
SECUNIA-21253
ADV-2005-1171
ADV-2006-3101
APPLE-SA-2006-08-01
DSA-774
FEDORA-2005-613
FEDORA-2005-614
RHSA-2005:640
SUSE-SR:2005:018
TA06-214A
http://developer.berlios.de/project/shownotes.php?release_id=6617
http://fetchmail.berlios.de/fetchmail-SA-2005-01.txt
http://www.redhat.com/archives/fedora-announce-list/2005-July/msg00104.html

CPE    89
cpe:/a:fetchmail:fetchmail:6.1.0
cpe:/a:fetchmail:fetchmail:6.1.3
cpe:/a:fetchmail:fetchmail:6.3.4
cpe:/a:fetchmail:fetchmail:5.9.8
...
CWE    1
CWE-119

© 2013 SecPod Technologies