The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


MDKSA-2005:236 - Updated fetchmail packages fix vulnerability


<< Previous INDEX Search src / Print Next >>
From: Mandriva Security Team <security@mandriva.com.>
To: bugtraq@securityfocus.com
Subject: MDKSA-2005:236 - Updated fetchmail packages fix vulnerability
Message-Id: <E1Epxee-0001rA-QK@mercury.mandriva.com.>
Sender: QATeam User <qateam@mercury.mandriva.com.>
Date: Fri, 23 Dec 2005 17:53:00 -0700
X-Virus-Scanned: antivirus-gw at tyumen.ru

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________
 
 Mandriva Linux Security Advisory                         MDKSA-2005:236
 http://www.mandriva.com/security/
 _______________________________________________________________________
 
 Package : fetchmail
 Date    : December 23, 2005
 Affected: 10.1, 10.2, 2006.0, Corporate 3.0
 _______________________________________________________________________
 
 Problem Description:
 
 Fetchmail before 6.3.1 and before 6.2.5.5, when configured for
 multidrop mode, allows remote attackers to cause a DoS (application
 crash) by sending messages without headers from upstream mail
 servers.
 
 The updated packages have been patched to correct this problem.
 _______________________________________________________________________

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-4348
 _______________________________________________________________________
 
 Updated Packages:
 
 Mandriva Linux 10.1:
 9c8726e3d841d87b9cc64a9ce3497021  10.1/RPMS/fetchmail-6.2.5-5.3.101mdk.i586.rpm
 83258675518c03144515f89ae8c78be4  10.1/RPMS/fetchmailconf-6.2.5-5.3.101mdk.i586.rpm
 321a0d1e90bbe0fdb128b96a42ff8e20  10.1/RPMS/fetchmail-daemon-6.2.5-5.3.101mdk.i586.rpm
 fbfde9ae3b5d9e343282d48b1f1053c8  10.1/SRPMS/fetchmail-6.2.5-5.3.101mdk.src.rpm

 Mandriva Linux 10.1/X86_64:
 ff6fb1245bcf6edf9247ad71669d4c46  x86_64/10.1/RPMS/fetchmail-6.2.5-5.3.101mdk.x86_64.rpm
 efb6b95e1ff2c7723460b9c1ac7e4200  x86_64/10.1/RPMS/fetchmailconf-6.2.5-5.3.101mdk.x86_64.rpm
 31c794fae961246e263db99fca4308eb  x86_64/10.1/RPMS/fetchmail-daemon-6.2.5-5.3.101mdk.x86_64.rpm
 fbfde9ae3b5d9e343282d48b1f1053c8  x86_64/10.1/SRPMS/fetchmail-6.2.5-5.3.101mdk.src.rpm

 Mandriva Linux 10.2:
 49e0f1a245c001f08117e20542119796  10.2/RPMS/fetchmail-6.2.5-10.4.102mdk.i586.rpm
 c8d3515770d91ff96190e6e10c400169  10.2/RPMS/fetchmailconf-6.2.5-10.4.102mdk.i586.rpm
 34feb39cc4766bdb9e15df201d085ed0  10.2/RPMS/fetchmail-daemon-6.2.5-10.4.102mdk.i586.rpm
 fbf579f130896de2c645a8460dd88862  10.2/SRPMS/fetchmail-6.2.5-10.4.102mdk.src.rpm

 Mandriva Linux 10.2/X86_64:
 489f797385cc55c378a3faf50faa898e  x86_64/10.2/RPMS/fetchmail-6.2.5-10.4.102mdk.x86_64.rpm
 d6c123681c17748de5f17c2399fdb7c4  x86_64/10.2/RPMS/fetchmailconf-6.2.5-10.4.102mdk.x86_64.rpm
 9e6b77b062ab162d4c215032dc7714f3  x86_64/10.2/RPMS/fetchmail-daemon-6.2.5-10.4.102mdk.x86_64.rpm
 fbf579f130896de2c645a8460dd88862  x86_64/10.2/SRPMS/fetchmail-6.2.5-10.4.102mdk.src.rpm

 Mandriva Linux 2006.0:
 e09c0856591976733a1bc8041e8eb93c  2006.0/RPMS/fetchmail-6.2.5-11.2.20060mdk.i586.rpm
 aba5a8c643b15149976c30ba11116540  2006.0/RPMS/fetchmailconf-6.2.5-11.2.20060mdk.i586.rpm
 d683b66431939e6106b3fee6b8b500f5  2006.0/RPMS/fetchmail-daemon-6.2.5-11.2.20060mdk.i586.rpm
 bb8c5a81a1299a855594849851615d17  2006.0/SRPMS/fetchmail-6.2.5-11.2.20060mdk.src.rpm

 Mandriva Linux 2006.0/X86_64:
 2567bef9f4fc2b8d91fae1e5539d5920  x86_64/2006.0/RPMS/fetchmail-6.2.5-11.2.20060mdk.x86_64.rpm
 33a88c8055504ab5c741be8c84ab1a81  x86_64/2006.0/RPMS/fetchmailconf-6.2.5-11.2.20060mdk.x86_64.rpm
 b2e430f97aed6f30e18144ee57b17b8f  x86_64/2006.0/RPMS/fetchmail-daemon-6.2.5-11.2.20060mdk.x86_64.rpm
 bb8c5a81a1299a855594849851615d17  x86_64/2006.0/SRPMS/fetchmail-6.2.5-11.2.20060mdk.src.rpm

 Corporate 3.0:
 51c54e861eec7692a76b3f5b91bab4b9  corporate/3.0/RPMS/fetchmail-6.2.5-3.3.C30mdk.i586.rpm
 41c74970c74af1fce8eae213f60d108e  corporate/3.0/RPMS/fetchmailconf-6.2.5-3.3.C30mdk.i586.rpm
 53fe277159d6771d83d40c99c3418f51  corporate/3.0/RPMS/fetchmail-daemon-6.2.5-3.3.C30mdk.i586.rpm
 477f8ec8d7ccaba94a529fd4ead38f11  corporate/3.0/SRPMS/fetchmail-6.2.5-3.3.C30mdk.src.rpm

 Corporate 3.0/X86_64:
 7f806d8e2858a008799f0766503f0c7a  x86_64/corporate/3.0/RPMS/fetchmail-6.2.5-3.3.C30mdk.x86_64.rpm
 cb3793ad31fb347d9daf894d7ec7d318  x86_64/corporate/3.0/RPMS/fetchmailconf-6.2.5-3.3.C30mdk.x86_64.rpm
 8030300459d198b72b9e9a83909fc0fb  x86_64/corporate/3.0/RPMS/fetchmail-daemon-6.2.5-3.3.C30mdk.x86_64.rpm
 477f8ec8d7ccaba94a529fd4ead38f11  x86_64/corporate/3.0/SRPMS/fetchmail-6.2.5-3.3.C30mdk.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)

iD8DBQFDrG5ZmqjQ0CJFipgRApfEAKDh472PEyH67pI3/bDJMxgCUqTv+QCfWfLO
I6ekE0okYXHNiq4ToDObDYs=
=IpRj
-----END PGP SIGNATURE-----


<< Previous INDEX Search src / Print Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2024 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру