[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247974

 
 

909

 
 

194654

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2005-2335Date: (C)2005-07-27   (M)2023-12-22


Buffer overflow in the POP3 client in Fetchmail before 6.2.5.2 allows remote POP3 servers to cause a denial of service and possibly execute arbitrary code via long UIDL responses. NOTE: a typo in an advisory accidentally used the wrong CVE identifier for the Fetchmail issue. This is the correct identifier.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 5.0
Exploit Score: 10.0
Impact Score: 2.9
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: LOW
Authentication: NONE
Confidentiality: NONE
Integrity: NONE
Availability: PARTIAL
  
Reference:
BID-14349
SECUNIA-16176
OSVDB-18174
BID-19289
http://www.securityfocus.com/archive/1/435197/100/0/threaded
http://www.securityfocus.com/archive/1/441856/100/200/threaded
SECUNIA-21253
ADV-2005-1171
ADV-2006-3101
APPLE-SA-2006-08-01
DSA-774
FEDORA-2005-613
FEDORA-2005-614
RHSA-2005:640
SUSE-SR:2005:018
TA06-214A
http://developer.berlios.de/project/shownotes.php?release_id=6617
http://fetchmail.berlios.de/fetchmail-SA-2005-01.txt
http://www.redhat.com/archives/fedora-announce-list/2005-July/msg00104.html
oval:org.mitre.oval:def:1038
oval:org.mitre.oval:def:1124
oval:org.mitre.oval:def:8833

CPE    89
cpe:/a:fetchmail:fetchmail:6.1.0
cpe:/a:fetchmail:fetchmail:6.1.3
cpe:/a:fetchmail:fetchmail:6.3.4
cpe:/a:fetchmail:fetchmail:5.9.8
...
CWE    1
CWE-119

© SecPod Technologies