Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (E-mail Client)  >   Fetchmail Vendors:   Raymond, Eric S.
(Immunix Issues Fix) Fetchmail Can Be Crashed By Remote Users Sending a Specially Crafted E-mail Message
SecurityTracker Alert ID:  1007973
SecurityTracker URL:
CVE Reference:   CVE-2003-0792   (Links to External Site)
Updated:  Feb 21 2004
Original Entry Date:  Oct 21 2003
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 6.2.4
Description:   A denial of service vulnerability was reported in fetchmail in the processing of long lines. A remote user can cause fetchmail to crash.

It is reported that a remote user can create a specially crafted email message to cause fetchmail to crash. Reports indicate that fetchmail does not properly allocate memory when processing long lines.

No further details were provided.

Impact:   A remote user can cause fetchmail to crash.
Solution:   Immunix has released a fix.

Precompiled binary packages for Immunix 7+ are available at:

A source package for Immunix 7+ is available at:

The Immunix OS 7+ md5sums are:

fb8091d8401059cdc1e7f44efb2f8d5f RPMS/fetchmail-5.9.0-10_imnx_1.i386.rpm
b70e0a1cbd01c40a51496218d14b26f1 RPMS/fetchmailconf-5.9.0-10_imnx_1.i386.rpm
ff1fda573b367c2ac5f81e2c4b3f2d74 SRPMS/fetchmail-5.9.0-10_imnx_1.src.rpm

Vendor URL: (Links to External Site)
Cause:   Exception handling error
Underlying OS:  Linux (Immunix)
Underlying OS Comments:  7+

Message History:   This archive entry is a follow-up to the message listed below.
Oct 17 2003 Fetchmail Can Be Crashed By Remote Users Sending E-mail With Long Lines

 Source Message Contents

Subject:  [Immunix-announce] Immunix Secured OS 7+ fetchmail update

Content-Type: multipart/signed; micalg=pgp-sha1;
	protocol="application/pgp-signature"; boundary="r/w8vo2lxBmCPGjQ"
Content-Disposition: inline

Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

	Immunix Secured OS Security Advisory

Packages updated:	fetchmail, fetchmailconf
Affected products:	Immunix OS 7+
Bugs fixed:		CAN-2002-1365, CAN-2003-0792, CAN-2003-0790
Date:			Fri Oct 17 2003
Advisory ID:		IMNX-2003-7+-023-01
Author:			Seth Arnold <>

  This update fixes several bugs in fetchmail, including a broken
  boundary condition check in the multidrop code, a header overflow that
  neglected to account for '@' signs in email addresses (CAN-2002-1365),
  a header-rewriting bug (CAN-2003-0792), and a head-reading bug
  (CAN-2003-0790; this CAN is likely to be revoked, but the patch appears
  to be nicely defensive).

  Immunix would like to thank Stefan Esser, Dave Jones, Markus Friedl,
  Nalin Dahyabhai, Mark J Cox, and Eric S. Raymond for diagnosing and
  fixing the problems.

  It is unknown if any of these problems lead to more than a Denial of
  Service attack. We do not believe StackGuard provides protection for
  any of the bugs addressed here.

Package names and locations:
  Precompiled binary packages for Immunix 7+ are available at:

  A source package for Immunix 7+ is available at:

Immunix OS 7+ md5sums:
  fb8091d8401059cdc1e7f44efb2f8d5f RPMS/fetchmail-5.9.0-10_imnx_1.i386.rpm
  b70e0a1cbd01c40a51496218d14b26f1 RPMS/fetchmailconf-5.9.0-10_imnx_1.i386.=
  ff1fda573b367c2ac5f81e2c4b3f2d74 SRPMS/fetchmail-5.9.0-10_imnx_1.src.rpm

GPG verification:                                                          =
  Our public keys are available at
  Immunix, Inc., has changed policy with GPG keys. We maintain several
  keys now: C53B2B53 for Immunix 7+ package signing, D3BA6C17 for
  Immunix 7.3 package signing, and 1B7456DA for general security issues.

  Ibiblio is graciously mirroring our updates, so if the links above are
  slow, please try:
  or one of the many mirrors available at:

  ImmunixOS 6.2 is no longer officially supported.
  ImmunixOS 7.0 is no longer officially supported.

Contact information:
  To report vulnerabilities, please contact
  Immunix attempts to conform to the RFP vulnerability disclosure protocol

Content-Type: application/pgp-signature
Content-Disposition: inline

Version: GnuPG v1.0.7 (GNU/Linux)



Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

Immunix-announce mailing list



Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, LLC