[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

MDVSA-2012:149 -- Mandriva fetchmail

ID: oval:org.secpod.oval:def:302960Date: (C)2012-11-06   (M)2024-04-17
Class: PATCHFamily: unix




Multiple vulnerabilities has been found and corrected in fetchmail: Fetchmail version 6.3.9 enabled all SSL workarounds which contains a switch to disable a countermeasure against certain attacks against block ciphers that permit guessing the initialization vectors, providing that an attacker can make the application encrypt some data for him -- which is not easily the case . A denial of service flaw was found in the way Fetchmail, a remote mail retrieval and forwarding utility, performed base64 decoding of certain NTLM server responses. Upon sending the NTLM authentication request, Fetchmail did not check if the received response was actually part of NTLM protocol exchange, or server-side error message and session abort. A rogue NTML server could use this flaw to cause fetchmail executable crash . This advisory provides the latest version of fetchmail which is not vulnerable to these issues.

Platform:
Mandriva Linux 2011.0
Product:
fetchmail
Reference:
MDVSA-2012:149
CVE-2011-3389
CVE-2012-3482
CVE    2
CVE-2011-3389
CVE-2012-3482
CPE    1
cpe:/o:mandriva:linux:2011.0

© SecPod Technologies