Date: Sun, 2 Sep 2007 13:48:48 +0200 (CEST) From: Matthias Andree <matthias.andree@gmx.de> To: FreeBSD-gnats-submit@FreeBSD.org Cc: secteam@FreeBSD.org Subject: ports/116012: [PATCH] security/vuxml: add CVE-2007-4565 (fetchmail DoS) Message-ID: <20070902114848.9FFBB5C59@rho.emma.line.org> Resent-Message-ID: <200709021220.l82CK22I089633@freefall.freebsd.org>
next in thread | raw e-mail | index | archive | help
>Number: 116012 >Category: ports >Synopsis: [PATCH] security/vuxml: add CVE-2007-4565 (fetchmail DoS) >Confidential: no >Severity: non-critical >Priority: low >Responsible: freebsd-ports-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: change-request >Submitter-Id: current-users >Arrival-Date: Sun Sep 02 12:20:02 GMT 2007 >Closed-Date: >Last-Modified: >Originator: Matthias Andree >Release: FreeBSD 6.2-RELEASE-p7 i386 >Organization: >Environment: System: FreeBSD rho.emma.line.org 6.2-RELEASE-p7 FreeBSD 6.2-RELEASE-p7 #1: Fri Aug 31 14:58:52 CEST 2007 >Description: Document fetchmail denial of service vulnerability. Port maintainer (secteam@FreeBSD.org) is cc'd. Generated with FreeBSD Port Tools 0.77 >How-To-Repeat: >Fix: --- vuxml-1.1_1.patch begins here --- diff -ruN --exclude=CVS /usr/ports/security/vuxml/vuln.xml /usr/home/emma/ports/security/vuxml/vuln.xml --- /usr/ports/security/vuxml/vuln.xml Sat Sep 1 18:04:23 2007 +++ /usr/home/emma/ports/security/vuxml/vuln.xml Sun Sep 2 13:29:56 2007 @@ -34,6 +34,40 @@ --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="45500f74-5947-11dc-87c1-000e2e5785ad"> + <topic>fetchmail -- denial of service on reject of local warning message</topic> + <affects> + <package> + <name>fetchmail</name> + <range><ge>4.6.8</ge><lt>6.3.8_4</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Matthias Andree reports:</p> + <blockquote cite="http://www.fetchmail.info/fetchmail-SA-2007-02.txt"> + <p>fetchmail will generate warning messages in certain + circumstances (for instance, when leaving oversized messages + on the server or login to the upstream fails) and send them + to the local postmaster or the user running it.</p> + + <p>If this warning message is then refused by the SMTP listener + that fetchmail is forwarding the message to, fetchmail + crashes and does not collect further messages until it is + restarted.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2007-4565</cvename> + <url>http://www.fetchmail.info/fetchmail-SA-2007-02.txt</url> + </references> + <dates> + <discovery>2007-07-29</discovery> + <entry>2007-09-02</entry> + </dates> + </vuln> + <vuln vid="d944719e-42f4-4864-89ed-f045b541919f"> <topic>gtar -- Directory traversal vulnerability</topic> <affects> --- vuxml-1.1_1.patch ends here --- >Release-Note: >Audit-Trail: >Unformatted:
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20070902114848.9FFBB5C59>