Upstream information

CVE-2005-2335 at MITRE

Description

Buffer overflow in the POP3 client in Fetchmail before 6.2.5.2 allows remote POP3 servers to cause a denial of service and possibly execute arbitrary code via long UIDL responses. NOTE: a typo in an advisory accidentally used the wrong CVE identifier for the Fetchmail issue. This is the correct identifier.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having moderate severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 5
Vector AV:N/AC:L/Au:N/C:N/I:N/A:P
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact None
Integrity Impact None
Availability Impact Partial
SUSE Bugzilla entry: 97555

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SuSE Linux 8.2 for IA32
  • fetchmail >= 6.2.1-41
SuSE Linux 9.0 for AMD64
SuSE Linux 9.0 for IA32
  • fetchmail >= 6.2.3-85
SUSE LINUX 9.1 for IA32
SUSE LINUX 9.1 for x86-64
  • fetchmail >= 6.2.5-49.9
SUSE LINUX 9.2
  • fetchmail >= 6.2.5-54.4
SUSE LINUX 9.3
  • fetchmail >= 6.2.5-59.4
SUSE LINUX Retail Solution 8
SuSE Linux Desktop 1.0
SuSE Linux Enterprise Server 8 for AMD64
SuSE Linux Enterprise Server 8 for IBM iSeries and IBM pSeries
SuSE Linux Enterprise Server 8 for IBM zSeries
SuSE Linux Enterprise Server 8 for IPF
SuSE Linux Openexchange Server 4
SuSE Linux School Server for i386
SuSE Linux Standard Server 8
UnitedLinux 1.0
  • fetchmail >= 5.9.13-155
core9.ppc
core9.ia64
core9.x86
slox4,2.x86
core9.s390
YOU Patch Nr: 10354
Novell Linux Desktop 9 for x86
Novell Linux Desktop 9 for x86_64
Open Enterprise Server
  • fetchmail >= 6.2.5-49.9
core9.ppc
core9.ia64
core9.x86
slox4,2.x86
core9.s390
YOU Patch Nr: 10354