From owner-freebsd-security Fri Aug 17 2:16:35 2001 Delivered-To: freebsd-security@freebsd.org Received: from fledge.watson.org (fledge.watson.org [204.156.12.50]) by hub.freebsd.org (Postfix) with ESMTP id 1CB1037B408 for ; Fri, 17 Aug 2001 02:16:32 -0700 (PDT) (envelope-from arr@watson.org) Received: from localhost (arr@localhost) by fledge.watson.org (8.11.5/8.11.5) with SMTP id f7H9GVv05860 for ; Fri, 17 Aug 2001 05:16:31 -0400 (EDT) (envelope-from arr@watson.org) Date: Fri, 17 Aug 2001 05:16:31 -0400 (EDT) From: "Andrew R. Reiter" To: freebsd-security@freebsd.org Subject: fetchmail fix -- Deleted other thread :-( Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.org To answer the question, kkenn updated the fetchmail package to get the non-vulnerable version. If you check the cvs log: revision 1.127 date: 2001/08/09 21:35:36; author: kris; state: Exp; lines: +2 -2 Upgrade to 5.8.17 ("Another victory for Open Source!"). This fixes a remotely exploitable buffer overflow when connecting to a malicious server. So, update your ports. Andrew *-------------................................................. | Andrew R. Reiter | arr@fledge.watson.org | "It requires a very unusual mind | to undertake the analysis of the obvious" -- A.N. Whitehead To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message