Vulnerability Name: | CVE-2005-4348 (CCN-23713) | ||||||||||||||||||||
Assigned: | 2005-12-19 | ||||||||||||||||||||
Published: | 2005-12-19 | ||||||||||||||||||||
Updated: | 2018-10-19 | ||||||||||||||||||||
Summary: | fetchmail before 6.3.1 and before 6.2.5.5, when configured for multidrop mode, allows remote attackers to cause a denial of service (application crash) by sending messages without headers from upstream mail servers. | ||||||||||||||||||||
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
| ||||||||||||||||||||
CVSS v2 Severity: | 7.8 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C) 5.8 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)
3.7 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
| ||||||||||||||||||||
Vulnerability Type: | CWE-399 | ||||||||||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||||||||||
References: | Source: SGI Type: Broken Link 20070201-01-P Source: MISC Type: Issue Tracking, Mailing List, Third Party Advisory http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=343836 Source: MITRE Type: CNA CVE-2005-4348 Source: CCN Type: Apple Security Update 2006-004 About Security Update 2006-004 Source: CCN Type: Fetchmail Security Annoucement fetchmail-SA-2005-03 fetchmail-SA-2005-03: security announcement Source: CONFIRM Type: Broken Link http://fetchmail.berlios.de/fetchmail-SA-2005-03.txt Source: CCN Type: RHSA-2007-0018 Moderate: fetchmail security update Source: CCN Type: SA17891 Fetchmail Headerless Message Denial of Service Vulnerability Source: SECUNIA Type: Third Party Advisory 17891 Source: SECUNIA Type: Third Party Advisory 18172 Source: SECUNIA Type: Third Party Advisory 18231 Source: SECUNIA Type: Third Party Advisory 18266 Source: SECUNIA Type: Third Party Advisory 18433 Source: SECUNIA Type: Third Party Advisory 18463 Source: SECUNIA Type: Third Party Advisory 18895 Source: CCN Type: SA21253 Mac OS X Security Update Fixes Multiple Vulnerabilities Source: SECUNIA Type: Third Party Advisory 21253 Source: SECUNIA Type: Third Party Advisory 24007 Source: SECUNIA Type: Third Party Advisory 24284 Source: CCN Type: SECTRACK ID: 1015383 Fetchmail Can Be Crashed By Remote Users By Sending a Headerless Message Source: SECTRACK Type: Third Party Advisory, VDB Entry 1015383 Source: SLACKWARE Type: Third Party Advisory SSA:2006-045-01 Source: CCN Type: ASA-2007-111 fetchmail security update (RHSA-2007-0018) Source: DEBIAN Type: Third Party Advisory DSA-939 Source: DEBIAN Type: DSA-939 fetchmail -- programming error Source: SUSE Type: Broken Link SUSE-SR:2007:004 Source: OSVDB Type: Broken Link 21906 Source: CCN Type: OSVDB ID: 21906 Fetchmail Multidrop Mode Headerless Message Remote DoS Source: REDHAT Type: Third Party Advisory RHSA-2007:0018 Source: BUGTRAQ Type: UNKNOWN 20051221 fetchmail security announcement fetchmail-SA-2005-03 (CVE-2005-4348) Source: BUGTRAQ Type: UNKNOWN 20060526 rPSA-2006-0084-1 fetchmail Source: BID Type: Third Party Advisory, VDB Entry 15987 Source: CCN Type: BID-15987 Fetchmail Missing Email Header Remote Denial of Service Vulnerability Source: BID Type: Third Party Advisory, VDB Entry 19289 Source: CCN Type: BID-19289 Apple Mac OS X Multiple Security Vulnerabilities Source: TRUSTIX Type: Broken Link 2006-0002 Source: CCN Type: TLSA-2007-3 Three vulnerabilities discovered in fetchmail Source: CCN Type: USN-233-1 fetchmail vulnerability Source: VUPEN Type: Permissions Required, Third Party Advisory ADV-2005-2996 Source: VUPEN Type: Permissions Required, Third Party Advisory ADV-2006-3101 Source: MANDRIVA Type: Third Party Advisory MDKSA-2005:236 Source: XF Type: Third Party Advisory, VDB Entry fetchmail-null-pointer-dos(23713) Source: XF Type: UNKNOWN fetchmail-null-pointer-dos(23713) Source: OVAL Type: Third Party Advisory oval:org.mitre.oval:def:9659 Source: UBUNTU Type: UNKNOWN USN-233-1 Source: SUSE Type: SUSE-SR:2007:004 SUSE Security Summary Report | ||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration RedHat 1: Configuration RedHat 2: Configuration RedHat 3: Configuration RedHat 4: Configuration RedHat 5: Denotes that component is vulnerable | ||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||
| |||||||||||||||||||||
BACK |