CVE-2006-0321
CVSS5.0
发布时间 :2006-01-23 19:03:00
修订时间 :2011-03-07 21:29:46
NMCOS    

[原文]fetchmail 6.3.0 and other versions before 6.3.2 allows remote attackers to cause a denial of service (crash) via crafted e-mail messages that cause a free of an invalid pointer when fetchmail bounces the message to the originator or local postmaster.


[CNNVD]Eric S. Raymond Fetchmail回弹邮件拒绝服务漏洞(CNNVD-200601-302)

        Fetchmail是一款由Eric S. Raymond维护的免费开放源代码邮件分发系统。
        Fetchmail在处理意外的回弹邮件时存在漏洞,远程攻击者可能利用此漏洞对Fetchmail造成拒绝服务攻击。当Fetchmail在处理畸形的回弹邮件时会导致进程崩溃。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CWE (弱点类目)

CWE-20 [输入验证不恰当]

- CPE (受影响的平台与产品)

cpe:/a:fetchmail:fetchmail:6.3.1Fetchmail 6.3.1
cpe:/a:fetchmail:fetchmail:6.3.0Fetchmail 6.3.0

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0321
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-0321
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200601-302
(官方数据源) CNNVD

- 其它链接及资源

http://www.us-cert.gov/cas/techalerts/TA06-214A.html
(UNKNOWN)  CERT  TA06-214A
http://fetchmail.berlios.de/fetchmail-SA-2006-01.txt
(VENDOR_ADVISORY)  CONFIRM  http://fetchmail.berlios.de/fetchmail-SA-2006-01.txt
http://xforce.iss.net/xforce/xfdb/24265
(UNKNOWN)  XF  fetchmail-message-bounce-dos(24265)
http://www.vupen.com/english/advisories/2006/3101
(UNKNOWN)  VUPEN  ADV-2006-3101
http://www.vupen.com/english/advisories/2006/0300
(UNKNOWN)  VUPEN  ADV-2006-0300
http://www.securityfocus.com/bid/19289
(UNKNOWN)  BID  19289
http://www.securityfocus.com/bid/16365
(UNKNOWN)  BID  16365
http://www.securityfocus.com/archive/1/archive/1/422936/100/0/threaded
(UNKNOWN)  BUGTRAQ  20060122 fetchmail security announcement fetchmail-SA-2006-01 (CVE-2006-0321)
http://www.osvdb.org/22691
(UNKNOWN)  OSVDB  22691
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.443499
(UNKNOWN)  SLACKWARE  SSA:2006-045-01
http://securitytracker.com/id?1015527
(UNKNOWN)  SECTRACK  1015527
http://secunia.com/advisories/21253
(VENDOR_ADVISORY)  SECUNIA  21253
http://secunia.com/advisories/18895
(VENDOR_ADVISORY)  SECUNIA  18895
http://secunia.com/advisories/18571
(VENDOR_ADVISORY)  SECUNIA  18571
http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html
(UNKNOWN)  APPLE  APPLE-SA-2006-08-01
http://developer.berlios.de/project/shownotes.php?release_id=8784
(UNKNOWN)  CONFIRM  http://developer.berlios.de/project/shownotes.php?release_id=8784
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=348747
(UNKNOWN)  CONFIRM  http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=348747

- 漏洞信息

Eric S. Raymond Fetchmail回弹邮件拒绝服务漏洞
中危 其他
2006-01-23 00:00:00 2006-01-24 00:00:00
远程  
        Fetchmail是一款由Eric S. Raymond维护的免费开放源代码邮件分发系统。
        Fetchmail在处理意外的回弹邮件时存在漏洞,远程攻击者可能利用此漏洞对Fetchmail造成拒绝服务攻击。当Fetchmail在处理畸形的回弹邮件时会导致进程崩溃。

- 公告与补丁

        目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
        http://www.catb.org/~esr/

- 漏洞信息

22691
Fetchmail Bounced Message DoS
Remote / Network Access Denial of Service
Loss of Availability
Exploit Public Vendor Verified

- 漏洞描述

Fetchmail contains a flaw that may allow a remote denial of service. The issue is triggered when a message is bounced to the originator or the local postmaster, and will result in loss of availability for the service.

- 时间线

2006-01-22 Unknow
2006-01-22 Unknow

- 解决方案

Upgrade to version 6.3.2 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Fetchmail Bounced Message Denial Of Service Vulnerability
Failure to Handle Exceptional Conditions 16365
Yes No
2006-01-24 12:00:00 2006-08-02 09:11:00
Nathaniel W. Turner is credited with the discovery of this vulnerability.

- 受影响的程序版本

Slackware Linux 10.2
Slackware Linux 10.1
Slackware Linux 10.0
Slackware Linux 9.1
Slackware Linux 9.0
Slackware Linux 8.1
Slackware Linux -current
Eric Raymond Fetchmail 6.3.2 rc3
Eric Raymond Fetchmail 6.3.2 rc2
Eric Raymond Fetchmail 6.3.1 -rc1
Eric Raymond Fetchmail 6.3.1
Eric Raymond Fetchmail 6.3 .0
Eric Raymond Fetchmail 6.3.2 rc1
Cosmicperl Directory Pro 10.0.3
Apple Mac OS X Server 10.4.7
Apple Mac OS X Server 10.4.6
Apple Mac OS X Server 10.4.5
Apple Mac OS X Server 10.4.4
Apple Mac OS X Server 10.4.3
Apple Mac OS X Server 10.4.2
Apple Mac OS X Server 10.4.1
Apple Mac OS X Server 10.4
Apple Mac OS X Server 10.3.9
Apple Mac OS X Server 10.3.8
Apple Mac OS X Server 10.3.7
Apple Mac OS X Server 10.3.6
Apple Mac OS X Server 10.3.5
Apple Mac OS X Server 10.3.4
Apple Mac OS X Server 10.3.3
Apple Mac OS X Server 10.3.2
Apple Mac OS X Server 10.3.1
Apple Mac OS X Server 10.3
Apple Mac OS X Server 10.2.8
Apple Mac OS X Server 10.2.7
Apple Mac OS X Server 10.2.6
Apple Mac OS X Server 10.2.5
Apple Mac OS X Server 10.2.4
Apple Mac OS X Server 10.2.3
Apple Mac OS X Server 10.2.2
Apple Mac OS X Server 10.2.1
Apple Mac OS X Server 10.2
Apple Mac OS X Server 10.1.5
Apple Mac OS X Server 10.1.4
Apple Mac OS X Server 10.1.3
Apple Mac OS X Server 10.1.2
Apple Mac OS X Server 10.1.1
Apple Mac OS X Server 10.1
Apple Mac OS X Server 10.0
Apple Mac OS X 10.4.7
Apple Mac OS X 10.4.6
Apple Mac OS X 10.4.5
Apple Mac OS X 10.4.4
Apple Mac OS X 10.4.3
Apple Mac OS X 10.4.2
Apple Mac OS X 10.4.1
Apple Mac OS X 10.4
Apple Mac OS X 10.3.9
Apple Mac OS X 10.3.8
Apple Mac OS X 10.3.7
Apple Mac OS X 10.3.6
Apple Mac OS X 10.3.5
Apple Mac OS X 10.3.4
Apple Mac OS X 10.3.3
Apple Mac OS X 10.3.2
Apple Mac OS X 10.3.1
Apple Mac OS X 10.3
Apple Mac OS X 10.2.8
Apple Mac OS X 10.2.7
Apple Mac OS X 10.2.6
Apple Mac OS X 10.2.5
Apple Mac OS X 10.2.4
Apple Mac OS X 10.2.3
Apple Mac OS X 10.2.2
Apple Mac OS X 10.2.1
Apple Mac OS X 10.2
Apple Mac OS X 10.1.5
Apple Mac OS X 10.1.4
Apple Mac OS X 10.1.3
Apple Mac OS X 10.1.2
Apple Mac OS X 10.1.1
Apple Mac OS X 10.1
Apple Mac OS X 10.1
Apple Mac OS X 10.0.4
Apple Mac OS X 10.0.3
Apple Mac OS X 10.0.2
Apple Mac OS X 10.0.1
Apple Mac OS X 10.0 3
Apple Mac OS X 10.0
Eric Raymond Fetchmail 6.3.2 rc4
Eric Raymond Fetchmail 6.3.2

- 不受影响的程序版本

Eric Raymond Fetchmail 6.3.2 rc4
Eric Raymond Fetchmail 6.3.2

- 漏洞讨论

Fetchmail is prone to a denial-of-service vulnerability. This issue is due to a failure in the application to properly handle bounced messages.

An attacker can exploit this issue to cause fetchmail to crash, effectively denying service to legitimate users.

- 漏洞利用

An exploit is not required.

- 解决方案

The vendor has released an update to address this issue. Please see the advisory section for more information.


Eric Raymond Fetchmail 6.3.2 rc1

Apple Mac OS X Server 10.3.9

Apple Mac OS X 10.3.9

Apple Mac OS X 10.4.7

Eric Raymond Fetchmail 6.3 .0

Eric Raymond Fetchmail 6.3.1 -rc1

Eric Raymond Fetchmail 6.3.1

Eric Raymond Fetchmail 6.3.2 rc2

Eric Raymond Fetchmail 6.3.2 rc3

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站