Fetchmail Invalid free() on Message Bounce Lets Remote Users Deny Service
SecurityTracker Alert ID: 1015527|
SecurityTracker URL: http://securitytracker.com/id/1015527
(Links to External Site)
Date: Jan 23 2006
Denial of service via network|
Fix Available: Yes Vendor Confirmed: Yes |
Version(s): 6.3.0 - prior to 6.3.2|
A vulnerability was reported in Fetchmail. A remote user can cause the service to crash.|
When fetchmail bounces a message to the originator or to the local postmaster, fetchmail may invoke a free() call with an invalid pointer and crash.
Nathaniel W. Turner discovered this vulnerability.
A remote user can cause the fetchmail process to crash.|
The vendor has issued a fixed version (6.3.2), available at:|
The vendor's advisory is available at:
Vendor URL: fetchmail.berlios.de/fetchmail-SA-2006-01.txt (Links to External Site)
|Underlying OS: Linux (Any), UNIX (Any)|
Source Message Contents
Date: Sun, 22 Jan 2006 14:19:18 +0100|
Subject: [VulnWatch] fetchmail security announcement fetchmail-SA-2006-01
fetchmail-SA-2006-01: crash when bouncing messages.
Topics: #1 crash when bouncing a message
#2 fetchmail 6.2.5.X end of life
Author: Matthias Andree
Type: free() with bogus pointer
Impact: fetchmail crashes
Credits: Nathaniel W. Turner (bug report)
CVE Name: CVE-2006-0321
Project URL: http://fetchmail.berlios.de/
Affects: fetchmail release >= 6.3.0
fetchmail release < 6.3.2
fetchmail release candidates 6.3.2-rc1, -rc2 and -rc3
Not affected: fetchmail release candidate 6.3.2-rc4
other versions not mentioned here or in the previous
sections have not been checked
Corrected: 2006-01-19 fetchmail 6.3.2-rc4
2006-01-22 fetchmail 6.3.2
0. Release history
2006-01-19 internal review draft
2006-01-20 add CVE ID
2006-01-22 release 1.0
fetchmail is a software package to retrieve mail from remote POP2, POP3,
IMAP, ETRN or ODMR servers and forward it to local SMTP, LMTP servers or
message delivery agents.
fetchmail ships with a graphical, Python/Tkinter based configuration
utility named "fetchmailconf" to help the user create configuration (run
control) files for fetchmail.
2. Problem description and Impact
Fetchmail contains a bug that causes itself to crash when bouncing a
message to the originator or to the local postmaster. The crash happens
after the bounce message has been sent, when fetchmail tries to free the
dynamic array of failed addresses, and calls the free() function with an
invalid pointer. This bug was introduced short before fetchmail 6.3.0
and is not present in the now discontinued 6.2.X series (see below).
None known at this time.
Download and install fetchmail 6.3.2 or a newer stable release from
fetchmail's project site at
5. End of life announcement
The aged fetchmail 6.2.5.X branch is discontinued effective immediately.
No further releases from the 6.2.5.X branch will be made.
The new 6.3.X stable branch has been available since 2005-11-30
and will not change except for bugfixes, documentation and message
A. Copyright, License and Warranty
(C) Copyright 2006 by Matthias Andree, <email@example.com>.
Some rights reserved.
This work is licensed under the Creative Commons
Attribution-NonCommercial-NoDerivs German License. To view a copy of
this license, visit http://creativecommons.org/licenses/by-nc-nd/2.0/de/
or send a letter to Creative Commons; 559 Nathan Abbott Way;
Stanford, California 94305; USA.
THIS WORK IS PROVIDED FREE OF CHARGE AND WITHOUT ANY WARRANTIES.
Use the information herein at your own risk.
END OF fetchmail-SA-2006-01.txt