fetchmail before 6.3.1 and before 6.2.5.5, when configured for multidrop mode, allows remote attackers to cause a denial of service (application crash) by sending messages without headers from upstream mail servers.

Project Subscriptions

Vendors Products
Fetchmail Subscribe
Fetchmail Subscribe
Enterprise Linux Subscribe
Advisories
Source ID Title
Debian DSA Debian DSA DSA-939-1 New fetchmail packages fix denial of service
EUVD EUVD EUVD-2005-4343 fetchmail before 6.3.1 and before 6.2.5.5, when configured for multidrop mode, allows remote attackers to cause a denial of service (application crash) by sending messages without headers from upstream mail servers.
Ubuntu USN Ubuntu USN USN-233-1 fetchmail vulnerability
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

References
Link Providers
ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc cve-icon cve-icon
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=343836 cve-icon cve-icon
http://fetchmail.berlios.de/fetchmail-SA-2005-03.txt cve-icon cve-icon
http://secunia.com/advisories/17891 cve-icon cve-icon
http://secunia.com/advisories/18172 cve-icon cve-icon
http://secunia.com/advisories/18231 cve-icon cve-icon
http://secunia.com/advisories/18266 cve-icon cve-icon
http://secunia.com/advisories/18433 cve-icon cve-icon
http://secunia.com/advisories/18463 cve-icon cve-icon
http://secunia.com/advisories/18895 cve-icon cve-icon
http://secunia.com/advisories/21253 cve-icon cve-icon
http://secunia.com/advisories/24007 cve-icon cve-icon
http://secunia.com/advisories/24284 cve-icon cve-icon
http://securitytracker.com/id?1015383 cve-icon cve-icon
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.443499 cve-icon cve-icon
http://www.debian.org/security/2005/dsa-939 cve-icon cve-icon
http://www.novell.com/linux/security/advisories/2007_4_sr.html cve-icon cve-icon
http://www.osvdb.org/21906 cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2007-0018.html cve-icon cve-icon
http://www.securityfocus.com/archive/1/420098/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/archive/1/435197/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/bid/15987 cve-icon cve-icon
http://www.securityfocus.com/bid/19289 cve-icon cve-icon
http://www.trustix.org/errata/2006/0002/ cve-icon cve-icon
http://www.vupen.com/english/advisories/2005/2996 cve-icon cve-icon
http://www.vupen.com/english/advisories/2006/3101 cve-icon cve-icon
http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:236 cve-icon cve-icon
https://exchange.xforce.ibmcloud.com/vulnerabilities/23713 cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2005-4348 cve-icon
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9659 cve-icon cve-icon
https://usn.ubuntu.com/233-1/ cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2005-4348 cve-icon
History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-07T23:38:51.851Z

Reserved: 2005-12-19T00:00:00

Link: CVE-2005-4348

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2005-12-21T00:03:00.000

Modified: 2025-04-03T01:03:51.193

Link: CVE-2005-4348

cve-icon Redhat

Severity : Low

Publid Date: 2005-12-19T00:00:00Z

Links: CVE-2005-4348 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses