Upstream information

CVE-2006-5974 at MITRE

Description

fetchmail 6.3.5 and 6.3.6 before 6.3.6-rc4, when refusing a message delivered via the mda option, allows remote attackers to cause a denial of service (crash) via unknown vectors that trigger a NULL pointer dereference when calling the (1) ferror or (2) fflush functions.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having important severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 7.8
Vector AV:N/AC:L/Au:N/C:N/I:N/A:C
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact None
Integrity Impact None
Availability Impact Complete
SUSE Bugzilla entries: 223507 [RESOLVED / FIXED], 239002 [RESOLVED / DUPLICATE]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SUSE Linux Enterprise Server 11 SP1
  • fetchmail >= 6.3.8.90-13.16.1
  • fetchmailconf >= 6.3.8.90-13.16.1
Patchnames:
SUSE Linux Enterprise Server 11 SP1 GA fetchmail-6.3.8.90-13.16.1
SUSE Linux Enterprise Server 11 SP2
  • fetchmail >= 6.3.8.90-13.20.19.1
  • fetchmailconf >= 6.3.8.90-13.20.19.1
Patchnames:
SUSE Linux Enterprise Server 11 SP2 GA fetchmail-6.3.8.90-13.20.19.1
SUSE Linux Enterprise Server 11 SP3
  • fetchmail >= 6.3.8.90-13.20.19.1
  • fetchmailconf >= 6.3.8.90-13.20.19.1
Patchnames:
SUSE Linux Enterprise Server 11 SP3 GA fetchmail-6.3.8.90-13.20.19.1
SUSE Linux Enterprise Server 11 SP4
  • fetchmail >= 6.3.8.90-13.20.19.1
  • fetchmailconf >= 6.3.8.90-13.20.19.1
Patchnames:
SUSE Linux Enterprise Server 11 SP4 GA fetchmail-6.3.8.90-13.20.19.1
openSUSE Tumbleweed
  • fetchmail >= 6.4.21-2.1
  • fetchmailconf >= 6.4.21-2.1
Patchnames:
openSUSE-Tumbleweed-2024-10753


SUSE Timeline for this CVE

CVE page created: Fri Jun 28 05:17:27 2013
CVE page last modified: Sat Jun 15 20:48:16 2024