exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Mandriva Linux Security Advisory 2010-037

Mandriva Linux Security Advisory 2010-037
Posted Feb 16, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-037 - The sdump function in sdump.c in fetchmail 6.3.11, 6.3.12, and 6.3.13, when running in verbose mode on platforms for which char is signed, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an SSL X.509 certificate containing non-printable characters with the high bit set, which triggers a heap-based buffer overflow during escaping. This update provides fetchmail 6.3.14, which is not vulnerable to this issue.

tags | advisory, remote, denial of service, overflow, arbitrary
systems | linux, mandriva
advisories | CVE-2010-0562
SHA-256 | a0d164b3f8214565099f864d7d92bc2d97f7048af315e7a19ffc5b957dc2e861

Mandriva Linux Security Advisory 2010-037

Change Mirror Download

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2010:037
http://www.mandriva.com/security/
_______________________________________________________________________

Package : fetchmail
Date : February 16, 2010
Affected: 2010.0
_______________________________________________________________________

Problem Description:

A vulnerability have been discovered and corrected in fetchmail:

The sdump function in sdump.c in fetchmail 6.3.11, 6.3.12, and 6.3.13,
when running in verbose mode on platforms for which char is signed,
allows remote attackers to cause a denial of service (application
crash) or possibly execute arbitrary code via an SSL X.509 certificate
containing non-printable characters with the high bit set, which
triggers a heap-based buffer overflow during escaping (CVE-2010-0562).

This update provides fetchmail 6.3.14, which is not vulnerable to
this issue.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0562
http://www.fetchmail.info/fetchmail-SA-2010-01.txt
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2010.0:
d8d72bfeb0a3f4db1760728f495a2de9 2010.0/i586/fetchmail-6.3.14-0.1mdv2010.0.i586.rpm
b58db1070a6efcd9d28ffc89f66b544c 2010.0/i586/fetchmailconf-6.3.14-0.1mdv2010.0.i586.rpm
b794d75bdab692813b345f32a9969658 2010.0/i586/fetchmail-daemon-6.3.14-0.1mdv2010.0.i586.rpm
f8be812911fb7f7042b981e8c2ad1094 2010.0/SRPMS/fetchmail-6.3.14-0.1mdv2010.0.src.rpm

Mandriva Linux 2010.0/X86_64:
b56fed87fa44e6d446be4135b322e9d3 2010.0/x86_64/fetchmail-6.3.14-0.1mdv2010.0.x86_64.rpm
6d8d033e916b62f700e68b27d55e0c5b 2010.0/x86_64/fetchmailconf-6.3.14-0.1mdv2010.0.x86_64.rpm
09b165f3e522197967d5b05317a1d92e 2010.0/x86_64/fetchmail-daemon-6.3.14-0.1mdv2010.0.x86_64.rpm
f8be812911fb7f7042b981e8c2ad1094 2010.0/SRPMS/fetchmail-6.3.14-0.1mdv2010.0.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFLemFtmqjQ0CJFipgRArz6AJ9tQaqkzAvzTZlgtT9BIFJFE6SD1QCeMU9r
vxGTHsLKs6WOax3plmPFSGQ=
=7tik
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close