Fetchmail (aka fetchmail-ssl) before 5.8.17 allows a remote malicious (1) IMAP server or (2) POP/POP3 server to overwrite arbitrary memory and possibly gain privileges via a negative index number as part of a response to a LIST request.
| Version | Base score | Base severity | Vector |
|---|
| Hyperlink | Resource Type |
|---|
Fetchmail (aka fetchmail-ssl) before 5.8.17 allows a remote malicious (1) IMAP server or (2) POP/POP3 server to overwrite arbitrary memory and possibly gain privileges via a negative index number as part of a response to a LIST request.
| Type | CWE ID | Description |
|---|---|---|
| text | N/A | n/a |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Hyperlink | Resource |
|---|---|
| http://www.novell.com/linux/security/advisories/2001_026_fetchmail_txt.html | vendor-advisory x_refsource_SUSE |
| http://www.debian.org/security/2001/dsa-071 | vendor-advisory x_refsource_DEBIAN |
| http://www.redhat.com/support/errata/RHSA-2001-103.html | vendor-advisory x_refsource_REDHAT |
| http://www.securityfocus.com/bid/3166 | vdb-entry x_refsource_BID |
| http://archives.neohapsis.com/archives/bugtraq/2001-08/0118.html | mailing-list x_refsource_BUGTRAQ |
| http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000419 | vendor-advisory x_refsource_CONECTIVA |
| http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-072.php3 | vendor-advisory x_refsource_MANDRAKE |
| http://www.linuxsecurity.com/advisories/other_advisory-1555.html | vendor-advisory x_refsource_ENGARDE |
| http://www.securityfocus.com/bid/3164 | vdb-entry x_refsource_BID |
| http://www.iss.net/security_center/static/6965.php | vdb-entry x_refsource_XF |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
Fetchmail (aka fetchmail-ssl) before 5.8.17 allows a remote malicious (1) IMAP server or (2) POP/POP3 server to overwrite arbitrary memory and possibly gain privileges via a negative index number as part of a response to a LIST request.
| Date Added | Due Date | Vulnerability Name | Required Action |
|---|---|---|---|
| N/A |
| Type | Version | Base score | Base severity | Vector |
|---|---|---|---|---|
| Primary | 2.0 | 10.0 | HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
Vulnerability in fetchmail 5.5.0-2 and earlier in the AUTHENTICATE GSSAPI command.