Gentoo Archives: gentoo-announce

From: Daniel Ahlberg <aliz@g.o>
To: gentoo-announce@g.o
Subject: [gentoo-announce] GLSA: fetchmail
Date: Tue, 01 Oct 2002 04:41:37
Message-Id: 200210011141.35358.aliz@gentoo.org
1 -----BEGIN PGP SIGNED MESSAGE-----
2 Hash: SHA1
3
4 - - --------------------------------------------------------------------
5 GENTOO LINUX SECURITY ANNOUNCEMENT
6 - - --------------------------------------------------------------------
7
8 PACKAGE :fetchmail
9 SUMMARY :remote vulnerabilities
10 DATE :2002-10-01 09:30 UTC
11
12 - - --------------------------------------------------------------------
13
14 OVERVIEW
15
16 Stefan Esser from e-matters has discovered several buffer overflows and
17 a broken boundary check within Fetchmail.
18
19 DETAIL
20
21 If Fetchmail is running in multidrop mode these flaws can be used by
22 remote attackers to crash it or to execute arbitrary code with the
23 permissions of the user running fetchmail. Depending on the configuration
24 this allows a remote root compromise.
25
26 Read the full advisory at
27 http://security.e-matters.de/advisories/032002.html
28
29 SOLUTION
30
31 It is recommended that all Gentoo Linux users who are running
32 net-mail/fetchmai-0.59.14 and earlier update their systems
33 as follows:
34
35 emerge rsync
36 emerge fetchmail
37 emerge clean
38
39 - - --------------------------------------------------------------------
40 aliz@g.o - GnuPG key is available at www.gentoo.org/~aliz
41 - - --------------------------------------------------------------------
42 -----BEGIN PGP SIGNATURE-----
43 Version: GnuPG v1.0.7 (GNU/Linux)
44
45 iD8DBQE9mW3NfT7nyhUpoZMRAoJ6AJ41suU2KJD26V3wvarxaNm/8tWbdACgwMHd
46 ZPGFHT6dYy0B68RvjIu4oQM=
47 =JWvB
48 -----END PGP SIGNATURE-----