CVE-2006-5974
Summary
| CVE | CVE-2006-5974 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2006-12-31 05:00:00 UTC |
| Updated | 2018-10-17 21:46:00 UTC |
| Description | fetchmail 6.3.5 and 6.3.6 before 6.3.6-rc4, when refusing a message delivered via the mda option, allows remote attackers to cause a denial of service (crash) via unknown vectors that trigger a NULL pointer dereference when calling the (1) ferror or (2) fflush functions. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| [SECURITY] Fedora Core 5 Update: fetchmail-6.3.6-1.fc5 | FedoraNEWS.ORG |
FEDORA |
fedoranews.org |
|
| 31836 |
OSVDB |
osvdb.org |
|
| Webmail - OVH |
VUPEN |
www.vupen.com |
|
| 2007-0007 |
TRUSTIX |
www.trustix.org |
|
| Fetchmail Remote Denial of Service Vulnerability |
BID |
www.securityfocus.com |
Patch |
| The Slackware Linux Project: Slackware Security Advisories |
SLACKWARE |
slackware.com |
|
| Fetchmail MDA Option Message Refusal Bugs Let Remote Users Deny Service - SecurityTracker |
SECTRACK |
securitytracker.com |
|
| Fedora update for fetchmail - Advisories - Secunia |
SECUNIA |
secunia.com |
Vendor Advisory |
| Slackware update for fetchmail - Advisories - Secunia |
SECUNIA |
secunia.com |
Vendor Advisory |
| Trustix Update for Various Packages - Advisories - Secunia |
SECUNIA |
secunia.com |
Vendor Advisory |
| Gentoo Linux Documentation
--
Fetchmail: Denial of Service and password disclosure |
GENTOO |
security.gentoo.org |
|
| Fetchmail TLS Configuration Security Issue and "MDA" Denial of Service - Advisories - Secunia |
SECUNIA |
secunia.com |
Vendor Advisory |
| Webmail - OVH |
VUPEN |
www.vupen.com |
|
| Gentoo update for fetchmail - Advisories - Secunia |
SECUNIA |
secunia.com |
Vendor Advisory |
| Security Announcement |
SUSE |
www.novell.com |
|
| OpenPKG Corporation: Security: Security Advisories |
OPENPKG |
www.openpkg.com |
|
| Fetchmail - Kostenloser Open Source Mail Daemon |
CONFIRM |
fetchmail.berlios.de |
|
| SecurityFocus |
BUGTRAQ |
www.securityfocus.com |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
Vendor Comments And Credit
| Organization | Published | Contributor | Statement |
|---|
| Red Hat | 2007-01-11 | Mark J Cox | Not vulnerable. This issue does not affect the versions of fetchmail distributed with Red Hat Enterprise Linux 2.1, 3, or 4. |
There are currently no legacy QID mappings associated with this CVE.