Jump to content

Security Advisories (MDKSA-2005:209): fetchmail


aru
 Share

Recommended Posts

Mandriva Security Advisories MDKSA-2005:209 : fetchmail

 

Updated fetchmail packages fixes fetchmailconf vulnerability

November 9th, 2005

 

Thomas Wolff and Miloslav Trmac discovered a race condition in the fetchmailconf program.fetchmailconf would create the initial output configuration file with insecure permissions and only after writing would it change permissions to be more restrictive.During that time, passwords and other data could be exposed to other users on the system unless the user used a more restrictive umask setting. As well, the Mandriva Linux 2006 packages did not contain the patch that corrected the issues fixed in MDKSA-2005:126, namely a buffer overflow in fetchmail's POP3 client (CAN-2005-2355). The updated packages have been patched to address this issue, and the Mandriva 2006 packages have also been patched to correct CAN-2005-2355.

 

 

The released versions of Mandriva GNU/Linux affected are:

  • 10.1
  • CS2.1
  • CS3.0
  • 10.2
  • 2006.0

Full information about this advisory, including the updated packages, is available at:

www.mandriva.com/security/advisories?name=MDKSA-2005:209

 

Other references:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3088

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2355

 

Posted automatically by aru (mdksec2mub v: mdksec2mub,v 0.14 2005/05/15 18:06:11 aru Exp aru $)

Link to comment
Share on other sites

 Share

×
×
  • Create New...