aboutsummaryrefslogtreecommitdiffstats
path: root/website
diff options
context:
space:
mode:
Diffstat (limited to 'website')
-rw-r--r--website/.htaccess1
l---------[-rw-r--r--]website/fetchmail-SA-2021-01.txt120
l---------website/fetchmail-SA-2021-02.txt1
-rwxr-xr-xwebsite/host-scripts/upload-website.sh2
-rw-r--r--website/index.html63
-rw-r--r--website/multidrop.de.html76
-rw-r--r--website/multidrop.html2
-rw-r--r--website/security.html41
8 files changed, 109 insertions, 197 deletions
diff --git a/website/.htaccess b/website/.htaccess
new file mode 100644
index 00000000..413d6e1e
--- /dev/null
+++ b/website/.htaccess
@@ -0,0 +1 @@
+AddCharset UTF-8 .txt
diff --git a/website/fetchmail-SA-2021-01.txt b/website/fetchmail-SA-2021-01.txt
index 5f2563be..edf55708 100644..120000
--- a/website/fetchmail-SA-2021-01.txt
+++ b/website/fetchmail-SA-2021-01.txt
@@ -1,119 +1 @@
------BEGIN PGP SIGNED MESSAGE-----
-Hash: SHA512
-
-fetchmail-SA-2021-01: DoS or information disclosure logging long messages
-
-Topics: fetchmail denial of service or information disclosure when logging long messages
-
-Author: Matthias Andree
-Version: 1.1
-Announced: 2021-07-28
-Type: missing variable initialization can cause read from bad memory
- locations
-Impact: fetchmail logs random information, or segfaults and aborts,
- stalling inbound mail
-Danger: low
-Acknowledgment: Christian Herdtweck, Intra2net AG, Tübingen, Germany
- for analysis and report and a patch suggestion
-
-CVE Name: CVE-2021-36386
-URL: https://www.fetchmail.info/fetchmail-SA-2021-01.txt
-Project URL: https://www.fetchmail.info/
-
-Affects: - fetchmail releases up to and including 6.4.19
-
-Not affected: - fetchmail releases 6.4.20 and newer
-
-Corrected in: c546c829 Git commit hash
-
- 2021-07-28 fetchmail 6.4.20 release tarball
-
-
-0. Release history
-==================
-
-2021-07-07 initial report to maintainer
-2021-07-28 1.0 release
-2021-07-28 1.1 update Git commit hash with correction
-
-
-1. Background
-=============
-
-fetchmail is a software package to retrieve mail from remote POP3, IMAP,
-ETRN or ODMR servers and forward it to local SMTP, LMTP servers or
-message delivery agents. fetchmail supports SSL and TLS security layers
-through the OpenSSL library, if enabled at compile time and if also
-enabled at run time, in both SSL/TLS-wrapped mode on dedicated ports as
-well as in-band-negotiated "STARTTLS" and "STLS" modes through the
-regular protocol ports.
-
-
-2. Problem description and Impact
-=================================
-
-Fetchmail has long had support to assemble log/error messages that are
-generated piecemeal, and takes care to reallocate the output buffer as needed.
-In the reallocation case, i. e. when long log messages are assembled that can
-stem from very long headers, and on systems that have a varargs.h/stdarg.h
-interface (all modern systems), fetchmail's code would fail to reinitialize
-the va_list argument to vsnprintf.
-
-The exact effects depend on the verbose mode (how many -v are given) of
-fetchmail, computer architecture, compiler, operating system and
-configuration. On some systems, the code just works without ill effects, some
-systems log a garbage message (potentially disclosing sensitive information),
-some systems log literally "(null)", some systems trigger SIGSEGV (signal
-#11), which crashes fetchmail, causing a denial of service on fetchmail's end.
-
-
-3. Solution
-===========
-
-Install fetchmail 6.4.20 or newer.
-
-The fetchmail source code is available from
-<https://sourceforge.net/projects/fetchmail/files/>.
-
-Distributors are encouraged to review the NEWS file and move forward to
-6.4.20, rather than backport individual security fixes, because doing so
-routinely misses other fixes crucial to fetchmail's proper operation,
-for which no security announcements are issued, or documentation,
-or translation updates.
-
-Fetchmail 6.4.X releases have been made with a focus on unchanged user and
-program interfaces so as to avoid disruptions when upgrading from 6.3.Z or
-6.4.X to 6.4.Y with Y > X. Care was taken to not change the interface
-incompatibly.
-
-
-A. Copyright, License and Non-Warranty
-======================================
-
-(C) Copyright 2021 by Matthias Andree, <matthias.andree@gmx.de>.
-Some rights reserved.
-
-fetchmail-SA-2021-01 © 2021 by Matthias Andree is licensed under CC
-BY-ND 4.0. To view a copy of this license, visit
-http://creativecommons.org/licenses/by-nd/4.0/
-
-THIS WORK IS PROVIDED FREE OF CHARGE AND WITHOUT ANY WARRANTIES.
-Use the information herein at your own risk.
-
-END of fetchmail-SA-2021-01
------BEGIN PGP SIGNATURE-----
-
-iQIzBAEBCgAdFiEE3EplW9mTzUhx+oIQ5BKxVu/zhVoFAmEBxbQACgkQ5BKxVu/z
-hVoESA/+JKX4wAG0v1+4+7yG8SsmWfWORnUzKLTVcjAu5osdQ1DamFgDEMqSd/ft
-JswQdzMJfGSngKG+VgXPEu3l9jHyVWDwTWM7aKIo6VsRtJ6yBmBBQBQF5TSUARr7
-55Wm+GqNOQj4fp4xDvcswiMAbgpDZhtJEtWZhv96Uz6F+gjZ6qdufAYQlrPcH8AK
-ByJTs9Alc9LqOgP0touXz+CMkJFjizsFBiB5YzrHjVlryojvVmrF858nt1AgeUFC
-h8mWd9Y7qsJ+7OeF2BN5qre10LlJnEO3rZPz5OWcOYKCCuGka9nne9LjaouKLnY9
-8Yn4CqRMNhyj+5fXzNiXohJmjn2vZ/dgd/0mwNo5zyeC4z6J9KQuDS+/StGAyvLR
-fHppSu8SNctw0EiEephZcDGd/rI6MzpfTwP7b1fy/TD3YcezMPNRRTTH2AxidbXh
-/rSMVKWJ0tAucoEX3pR+6CVY8Eb0VZ09+iSqCmWe6Wsb9KN71K60FGVpnEq8BNWc
-aRqk0JXugPxuiJIXQLIP8AnxMW/XJoJNDs37OkfFhNkkhRDjT7pmu7l+9eIIYiTI
-cxpECB53pd6xlJb08KixDa2hu2UqjmfRe0KA//HaiUJy7RyGkxRbZ1GnMJHrCHCR
-/YYyOJbe6yTMnWVI6Auva8WJNuHSZvdvKasAenDAHZy96mUj8FE=
-=1rxO
------END PGP SIGNATURE-----
+../fetchmail-SA-2021-01.txt \ No newline at end of file
diff --git a/website/fetchmail-SA-2021-02.txt b/website/fetchmail-SA-2021-02.txt
new file mode 120000
index 00000000..fa6f0b4f
--- /dev/null
+++ b/website/fetchmail-SA-2021-02.txt
@@ -0,0 +1 @@
+../fetchmail-SA-2021-02.txt \ No newline at end of file
diff --git a/website/host-scripts/upload-website.sh b/website/host-scripts/upload-website.sh
index aeee1755..56dad034 100755
--- a/website/host-scripts/upload-website.sh
+++ b/website/host-scripts/upload-website.sh
@@ -29,7 +29,7 @@ rsync \
--copy-links --times --checksum --verbose \
--exclude host-scripts \
--exclude .git --exclude '*~' --exclude '#*#' \
- * \
+ * .htaccess \
"${SOURCEFORGE_LOGIN},fetchmail@web.sourceforge.net:htdocs/" &
pids="$pids $!"
diff --git a/website/index.html b/website/index.html
index 8474b8f7..91c02eda 100644
--- a/website/index.html
+++ b/website/index.html
@@ -1,5 +1,4 @@
-<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
- "http://www.w3.org/TR/html4/loose.dtd">
+<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<link rel="stylesheet" href="sitestyle.css" type="text/css">
@@ -15,7 +14,7 @@
<table width="100%" cellpadding="0" summary="Canned page header">
<tr>
<td>Fetchmail</td>
-<td align="right"><!-- update date -->2021-08-03</td>
+<td align="right"><!-- update date -->2024-01-31</td>
</tr>
</table>
</div>
@@ -43,21 +42,47 @@
<h1>Fetchmail</h1>
<div style="background-color:#c0ffc0;color:#000000;">
- <h1>NEWS: FETCHMAIL 6.5.0-beta4 release</h1>
- <p>On 2021-08-03, <a
+ <h1>NEWS: FETCHMAIL 6.4.38 RELEASE</h1>
+ <p>On 2024-01-31, <a
+ href="https://sourceforge.net/projects/fetchmail/files/branch_6.4/">fetchmail
+ 6.4.38 has been released.</a> It updates translations, and tightens OpenSSL/wolfSSL version requirements in order to track their security fixes and deprecations.
+ <p>OpenSSL 3.0.9, 3.1.4, 3.2.0 and wolfSSL 5.6.2 (or newer on the respective
+ compatible branches) remain supported.</p>
+ <p>6.4.37 updated translations.</p>
+ <p>6.4.36 updated translations.</p>
+ <p>6.4.35 updated translations and bumped SSL/TLS library version requirements.</p>
+ <p>6.4.34 fixed a critical softbounce bug (courtesy of Horváth Zsolt) and updates translations.
+ <p>6.4.33 updated translations.</p>
+ <p>6.4.32 updated translations and finds both rst2html5 with and without .py suffix when rebuilding the distribution.</p>
+ <p>6.4.31 updated the configure script for --with-ssl properly identifying the right
+ OpenSSL on a system with multiple OpenSSL versions installed, and updates the
+ manual page and its HTML conversion process, and adds some error checking to the .netrc parser.</p>
+ <p>6.4.30 updated the Romanian translation (courtesy of Remus-Gabriel
+ Chelu).</p>
+ <p>6.4.29 updated the Vietnamese translation (courtesy of Trần Ngọc Quân).</p>
+ <p>6.4.28 updated the Spanish translation (courtesy of Cristian Othón Martínez
+ Vera) and added a fix to the manual page (courtesy of Jeremy Petch).</p>
+ <p>6.4.26 added a wolfSSL compatibility workaround and updated the Serbian translation (courtesy of Miroslav Nikoli&#263;).</p>
+ <p>6.4.25 (released 2021-12-10) updated translations and the manual page and several other documentation
+ files, adds preliminary wolfSSL 5.0 support on systems that provide a C99
+ compiler, fixed up a specific fix for a compatibility issue
+ with the end-of-life OpenSSL 1.0.2 around the expiry of the DST Root CA X3
+ certificate which impairs connectivity to Let's-Encrypt-certified sites.
+ Supported OpenSSL versions 1.1.1 and newer are unaffected.</p>
+ <p>Note that you should use a supported OpenSSL version, currently 1.1.1 or
+ 3.0. wolfSSL 5.0 support is currently considered experimental.</p>
+ <p>Also note that OpenSSL's licensing changed between 1.1.1 and 3.0.0, the
+ latter now uses the Apache License 2.0. See the file COPYING for
+ details.</p>
+ <h1>NEWS: FETCHMAIL 6.5.0.beta9 release</h1>
+ <p>On 2023-01-06, <a
href="https://sourceforge.net/projects/fetchmail/files/branch_6.5/">fetchmail
- 6.5.0.beta4 has been released (click this link to download, or to see recent changes).</a>
- It fixes the security bug CVE-2021-36386 also fixed in 6.4.20.</p>
- <h1>NEWS: FETCHMAIL 6.4.20 RELEASE</h1>
- <p>On 2021-07-28, <a
- href="https://sourceforge.net/projects/fetchmail/files/branch_6.4/">fetchmail
- 6.4.20 has been released (click this link to download, or to see recent changes).</a>
- It fixes security bug CVE-2021-36386, see the link under <a href="#security-alerts">SECURITY ALERTS</a> below for details.
- </p>
- <p>Note that you should use OpenSSL 1.1.1 or newer to compile.
- OpenSSL 1.0.2 has been in end-of-life status since Late 2019.</p>
- <p>Note also that fetchmail 6.3.x versions are discontinued and no longer
- supported (the youngest 6.3.26 was released in 2013).</p>
+ 6.5.0.beta9 has been released (click this link to download, or to see recent changes).</a>
+ It brings the 6.5.0 betas back in line with 6.4.35, and has a few changes
+ of its own, including C++17 compatibility, a new IMAP-only --moveto option
+ to preserve seen message in a separate folder, and fixes Received: lines for time zones
+ that have sub-minute offsets (usually TAI-based timezones).<br>
+ Note that lzip as compression is discontinued, fetchmail ships as .tar.xz.</p>
</div>
<div style="background-color:#ffe0c0;color:#000000;font-size:85%">
@@ -225,8 +250,8 @@ competition.
<p><a
href="https://sourceforge.net/projects/getlive/">GetLive</a>, a successor to
the discontinued Gotmail. (Gotmail was a script to fetch mail from Hotmail,
-written by Peter Hawkins, see <a
-href="http://linux.cudeso.be/linuxdoc/gotmail.php">gotmail</a>.)</p>
+written by Peter Hawkins, which used to live at the now defunct
+http://linux.cudeso.be/linuxdoc/gotmail.php)</p>
<p>There's a program called
<a href="http://mailfilter.sourceforge.net/">mailfilter</a> which can be used
diff --git a/website/multidrop.de.html b/website/multidrop.de.html
index e132a9d7..c727c051 100644
--- a/website/multidrop.de.html
+++ b/website/multidrop.de.html
@@ -6,10 +6,10 @@
<meta name="generator" content=
"HTML Tidy for Linux/x86 (vers 1st April 2002), see www.w3.org">
- <title>Voraussetzungen fr funktionierendes Multidrop</title>
+ <title>Voraussetzungen für funktionierendes Multidrop</title>
<meta name="author" content="Matthias Andree">
<meta http-equiv="Content-Type" content=
- "text/html;charset=iso-8859-15">
+ "text/html;charset=utf-8">
<link rev="made" href="mailto:matthias.andree@gmx.de">
<style type="text/css">
<!--
@@ -23,7 +23,7 @@
<body>
<a href="multidrop.html">Link to English-language version/Link zur englischen Sprachfassung</a>
- <h1>Voraussetzungen fr funktionierendes Multidrop</h1>
+ <h1>Voraussetzungen für funktionierendes Multidrop</h1>
<address>
<a href="mailto:matthias.andree@gmx.de">Matthias Andree</a> 2003-10-12
@@ -32,42 +32,42 @@
<h2>Einleitung</h2>
<p>Viele Provider bieten ihren Kunden ein POP3-Multidrop oder
- "domain-in-a-mailbox"-Schema an, um fr mehrere Empfnger in
+ "domain-in-a-mailbox"-Schema an, um für mehrere Empfänger in
einer Domain die Mail "in einem Rutsch" abholen zu lassen.</p>
<p>Oft genug geht so ein Unterfangen dann bei der Mailabholung
- schief, die Ursachen und Abhilfen dafr sollen hier nher
+ schief, die Ursachen und Abhilfen dafür sollen hier näher
betrachtet werden.</p>
<h2>Eingangsbetrachtungen</h2>
- <p>POP3, das Post-Office-Protokoll Version 3, war ursprnglich
- dazu gedacht, Mail fr einen einzelnen Benutzer zu
- transportieren. Es erhlt den sogenannten Umschlag
- ("Envelope"), der die tatschlichen Empfnger und Absender
+ <p>POP3, das Post-Office-Protokoll Version 3, war ursprünglich
+ dazu gedacht, Mail für einen einzelnen Benutzer zu
+ transportieren. Es erhält den sogenannten Umschlag
+ ("Envelope"), der die tatsächlichen Empfänger und Absender
angibt, nicht.</p>
<p>Nun wird oft der Absender im Header "Return-Path"
- hinterlegt, bezglich des Empfngers kocht sich jeder
- Programmierer eines Mailservers seine eigene Suppe. Gngig sind
+ hinterlegt, bezüglich des Empfängers kocht sich jeder
+ Programmierer eines Mailservers seine eigene Suppe. Gängig sind
"gar nichts" (sendmail), "Delivered-To:" (qmail, evtl. mit
- einem Prfix, Postfix), "X-Envelope-To:" (bestimmte
+ einem Präfix, Postfix), "X-Envelope-To:" (bestimmte
procmail-Setups) und "X-Original-To:" (neuere Postfix-Versionen
- zustzlich zum Delivered-To:).</p>
+ zusätzlich zum Delivered-To:).</p>
<p><strong>Wichtige Hintergrundinformation:</strong> Die
- Mail-HEADER wie To:, Cc:, Bcc: sind fr die Zustellung der Mail
- NICHT RELEVANT. Die Mailzustellung erfolgt ausschlielich
+ Mail-HEADER wie To:, Cc:, Bcc: sind für die Zustellung der Mail
+ NICHT RELEVANT. Die Mailzustellung erfolgt ausschließlich
anhand des UMSCHLAGS, wie bei der Sackpost auch!</p>
- <p>Es ist zwar hufig so, dass der Umschlag bei der ersten
+ <p>Es ist zwar häufig so, dass der Umschlag bei der ersten
Einlieferung der Mail aus den Headern erzeugt wird, doch NUR
- DER UMSCHLAG trgt, im Gegensatz zum HEADER (Briefkopf), die
- vollstndige Information:</p>
+ DER UMSCHLAG trägt, im Gegensatz zum HEADER (Briefkopf), die
+ vollständige Information:</p>
<ul>
<li>Bcc: wird bei erster Gelegenheit entfernt, er soll ja
- beim Empfnger nicht mehr sichtbar sein</li>
+ beim Empfänger nicht mehr sichtbar sein</li>
<li>To: und Cc: werden bei Mailweiterleitungen nicht an das
Ziel angepasst</li>
@@ -77,20 +77,20 @@
Liste bestellt hat</li>
</ul>
- <p>Der Umstand, mehrere Empfnger in einer Mailbox zu
- vereinigen, erfordert nun, dass der tatschliche Empfnger der
+ <p>Der Umstand, mehrere Empfänger in einer Mailbox zu
+ vereinigen, erfordert nun, dass der tatsächliche Empfänger der
Mail hinterlegt wird, damit die Mail richtig zugestellt werden
- kann. POP3 trifft hierfr keine Vorkehrungen, daher mssen sie
- auerhalb des Protokolls eingerichtet werden. Es bietet sich
- hierfr der Mailheader an.</p>
+ kann. POP3 trifft hierfür keine Vorkehrungen, daher müssen sie
+ außerhalb des Protokolls eingerichtet werden. Es bietet sich
+ hierfür der Mailheader an.</p>
<h2>Voraussetzungen</h2>
<p>Unter bestimmten Voraussetzungen kann POP3-Multidrop dennoch
- zuverlssig funktionieren. Diese sind:</p>
+ zuverlässig funktionieren. Diese sind:</p>
<ol>
- <li>Der Provider MUSS fr jeden Empfnger der eigenen Domain
+ <li>Der Provider MUSS für jeden Empfänger der eigenen Domain
eine Kopie der Mail in die Mailbox werfen.</li>
<li>Der Provider MUSS in JEDER Mail den sogenannten "Envelope
@@ -101,7 +101,7 @@
<li>Der POP3-Client (Mercury/32, fetchmail, getmail, ...)
MUSS den Header, in dem der "Envelope Recipient" hinterlegt
- ist, zuverlssig erkennen und ausschlielich anhand seiner
+ ist, zuverlässig erkennen und ausschließlich anhand seiner
die Mail zustellen.</li>
<li><strong>Der POP3-Client DARF KEINESFALLS die To: oder
@@ -112,32 +112,32 @@
vertretbar).</strong></li>
</ol>
- <h2>Erklrungen</h2>
+ <h2>Erklärungen</h2>
<dl>
<dt>Ad 1:</dt>
- <dd>Ist diese Voraussetzung nicht erfllt, werden bei Mails,
- die an mehrere Empfnger der eigenen Domain gehen, einige
- Empfnger die Mail nicht bekommen.</dd>
+ <dd>Ist diese Voraussetzung nicht erfüllt, werden bei Mails,
+ die an mehrere Empfänger der eigenen Domain gehen, einige
+ Empfänger die Mail nicht bekommen.</dd>
<dt>Ad 2:</dt>
<dd>
- Ist diese Voraussetzung nicht erfllt, kommt es zu
+ Ist diese Voraussetzung nicht erfüllt, kommt es zu
Fehlzustellungen. Der Versuch, die Information aus den
- Mailheadern selbst (To:, Cc:) zu entnehmen, ist gefhrlich
- und unzuverlssig:
+ Mailheadern selbst (To:, Cc:) zu entnehmen, ist gefährlich
+ und unzuverlässig:
<ul>
- <li>Einerseits kann Mail an Mailinglisten zurckgeschickt
+ <li>Einerseits kann Mail an Mailinglisten zurückgeschickt
werden, deren Adresse oft im To:- oder Cc:-Header steht,
- was eine Mailschleife auslst, die unbedingt vermieden
+ was eine Mailschleife auslöst, die unbedingt vermieden
werden muss (weil sie Kosten verursacht)</li>
- <li>andererseits ist die Regenerierung von Empfngern,
+ <li>andererseits ist die Regenerierung von Empfängern,
die beim Absender im "Bcc:"-Header eingetragen waren,
- nicht mglich, da der Bcc:-Header beim Transport entfernt
+ nicht möglich, da der Bcc:-Header beim Transport entfernt
werden muss, wie der Name "Blind Carbon Copy" schon
andeutet.</li>
</ul>
diff --git a/website/multidrop.html b/website/multidrop.html
index 2de3efc3..aa885ef9 100644
--- a/website/multidrop.html
+++ b/website/multidrop.html
@@ -9,7 +9,7 @@
<title>Requisites for working multidrop mailboxes</title>
<meta name="author" content="Matthias Andree">
<meta http-equiv="Content-Type" content=
- "text/html;charset=iso-8859-15">
+ "text/html;charset=utf-8">
<link rev="made" href="mailto:matthias.andree@gmx.de">
<style type="text/css">
<!--
diff --git a/website/security.html b/website/security.html
index 98129b07..113015b6 100644
--- a/website/security.html
+++ b/website/security.html
@@ -27,10 +27,10 @@
<a href="fetchmail-FAQ.html" title="Fetchmail FAQ">FAQ</a><br>
<a href="fetchmail-FAQ.pdf" title="Fetchmail FAQ as PDF">FAQ (PDF)</a><br>
<a href="design-notes.html">Design Notes</a><br>
- <a href="http://sourceforge.net/projects/fetchmail/files/">Download</a><br>
+ <a href="https://sourceforge.net/projects/fetchmail/files/">Download</a><br>
Security/Errata<br>
<a href="https://gitlab.com/fetchmail/fetchmail/">Development</a><br>
- <a href="http://sourceforge.net/projects/fetchmail/">Project Page</a><br>
+ <a href="https://sourceforge.net/projects/fetchmail/">Project Page</a><br>
<hr>
</div>
@@ -49,25 +49,28 @@
<li><a name="cve-2012-3482"
href="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-3482">CVE-2012-3482:</a>
-->
+ <li><a name="cve-2021-39272"
+ href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39272">CVE-2021-39272:</a>
+ Fetchmail would <a href="fetchmail-SA-2021-02.txt">fail to negotiate a TLS encrypted session in some circumstances, continuing a clear-text connection.</a></li>
<li><a name="cve-2021-36386"
- href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36386">CVE-2021-36386:</a>
+ href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36386">CVE-2021-36386:</a>
Fetchmail could <a href="fetchmail-SA-2021-01.txt">log possibly
sensitive data or garbage, or crash, when logging information longer
than 2 kB, on some systems.</a></li>
<li><a name="cve-2012-3482"
- href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3482">CVE-2012-3482:</a>
+ href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3482">CVE-2012-3482:</a>
Fetchmail could <a href="fetchmail-SA-2012-02.txt">crash and
possibly reveal fragments of confidential data</a> during
NTLM authentication.</li>
<li><a name="cve-2011-3389"
- href="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3389">CVE-2011-3389:</a>
+ href="https://nvd.nist.gov/vuln/detail/CVE-2011-3389">CVE-2011-3389:</a>
<a href="fetchmail-SA-2012-01.txt">Fetchmail was vulnerable
to chosen-plaintext attacks against cipher block
chaining initialization vectors because it disabled an
OpenSSL countermeasure against this attack.</a>
</li>
<li><a name="cve-2011-1947"
- href="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-1947">CVE-2011-1947:</a>
+ href="https://nvd.nist.gov/vuln/detail/CVE-2011-1947">CVE-2011-1947:</a>
Fetchmail <a href="fetchmail-SA-2011-01.txt"> could hang for
indefinite amounts of time during STARTTLS negotiations</a>,
causing mail fetches to stall. This was a long-standing bug
@@ -77,7 +80,7 @@
properly.</a> This was a long-standing bug fixed in release
6.3.18.</li>
<li><a name="cve-2010-1167"
- href="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-1167">CVE-2010-1167:</a>
+ href="https://nvd.nist.gov/vuln/detail/CVE-2010-1167">CVE-2010-1167:</a>
Fetchmail <a href="fetchmail-SA-2010-02.txt">could exhaust all
available memory and abort on certain computers (for
instance Linux) in multibyte locales (for instance UTF-8)
@@ -85,21 +88,21 @@
This bug was introduced long before 6.0.0 and has been fixed in
release 6.3.17.</li>
<li><a name="cve-2010-0562"
- href="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-0562">CVE-2010-0562:</a> Fetchmail <a href="fetchmail-SA-2010-01.txt">would overrun the heap when displaying X.509 TLS/SSL certificates with characters with high bit set in verbose mode on platforms where char is a signed type.</a> This bug was introduced in release 6.3.11 and has been fixed in release 6.3.14.</li>
- <li><a name="cve-2009-2666" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2666">CVE-2009-2666:</a> Fetchmail <a href="fetchmail-SA-2009-01.txt">was found to validate SSL/TLS X.509 certificates improperly and allow man-in-the-middle-attacks to go undetected.</a> This bug has been fixed in release 6.3.11. For previous versions, use the <a href="fetchmail-SA-2009-01.txt">patch contained in the security announcement.</a></li>
- <li><a name="cve-2008-2711" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2711">CVE-2008-2711:</a> Fetchmail can <a href="fetchmail-SA-2008-01.txt">crash in verbose mode when logging long message headers.</a> This bug has been fixed in release 6.3.9. For 6.3.8, use the <a href="fetchmail-SA-2008-01.txt">patch contained in the security announcement.</a></li>
- <li><a name="cve-2007-4565" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4565">CVE-2007-4565:</a> Fetchmail can <a href="fetchmail-SA-2007-02.txt">crash when the SMTP server refuses a warning message generated by fetchmail.</a> This bug was introduced in fetchmail 4.6.8 and has been fixed in release 6.3.9. For 6.3.8, use the <a href="fetchmail-SA-2007-02.txt">patch contained in this security announcement.</a></li>
- <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1558">CVE-2007-1558:</a> Fetchmail's APOP client was found to <a href="fetchmail-SA-2007-01.txt">validate APOP challenges insufficiently, making man-in-the-middle attacks on APOP secrets unnecessarily easier than need be.</a> This bug was long-standing, fetchmail 6.3.8 and newer validate the APOP challenge more strictly.</li>
- <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5974">CVE-2006-5974:</a> Fetchmail was found to <a href="fetchmail-SA-2006-03.txt">crash when refusing a message that was bound to be delivered by an MDA.</a> This bug was introduced into fetchmail 6.3.5 and fixed in 6.3.6.</li>
- <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5867">CVE-2006-5867:</a> Fetchmail was found to <a href="fetchmail-SA-2006-02.txt">omit TLS or send the password in clear text despite the configuration stating otherwise.</a> This was a long-standing bug reported by Isaac Wilcox, fixed in fetchmail 6.3.6. There will be no 6.2.X releases to fix this bug in 6.2.X.</li>
- <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0321">CVE-2006-0321:</a> Fetchmail was found to <a href="fetchmail-SA-2006-01.txt">crash after bouncing a message with bad addresses. This bug was introduced with fetchmail 6.3.0 and fixed in fetchmail 6.3.2.</a></li>
- <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4348">CVE-2005-4348:</a> Fetchmail was found to contain <a href="fetchmail-SA-2005-03.txt">a bug (null pointer dereference) that can be exploited to a denial of service attack</a> when fetchmail runs in multidrop mode. 6.2.5.5 and 6.3.1 have this bug fixed.</li>
- <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3088">CVE-2005-3088:</a> Fetchmailconf was found to <a href="fetchmail-SA-2005-02.txt">open the configuration files world-readable, writing data to them, and only then tightening up permissions</a>, which may cause password information to be visible to other users. This bug affected fetchmail 6.2.0, 6.2.5 and 6.2.5.2. The bug is fixed in fetchmail 6.2.5.4 and 6.3.0.</li>
- <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2335">CVE-2005-2335:</a> Fetchmail was found to contain a <a href="fetchmail-SA-2005-01.txt">remotely exploitable code injection vulnerability (potentially privileged code)</a> in the POP3 code, affecting both the 6.2.0 and 6.2.5 releases. 6.2.5.2, 6.2.5.4 and 6.3.0 have got this bug fixed. (Other versions have not been checked if they contain this bug.)</li>
+ href="https://nvd.nist.gov/vuln/detail/CVE-2010-0562">CVE-2010-0562:</a> Fetchmail <a href="fetchmail-SA-2010-01.txt">would overrun the heap when displaying X.509 TLS/SSL certificates with characters with high bit set in verbose mode on platforms where char is a signed type.</a> This bug was introduced in release 6.3.11 and has been fixed in release 6.3.14.</li>
+ <li><a name="cve-2009-2666" href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2666">CVE-2009-2666:</a> Fetchmail <a href="fetchmail-SA-2009-01.txt">was found to validate SSL/TLS X.509 certificates improperly and allow man-in-the-middle-attacks to go undetected.</a> This bug has been fixed in release 6.3.11. For previous versions, use the <a href="fetchmail-SA-2009-01.txt">patch contained in the security announcement.</a></li>
+ <li><a name="cve-2008-2711" href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2711">CVE-2008-2711:</a> Fetchmail can <a href="fetchmail-SA-2008-01.txt">crash in verbose mode when logging long message headers.</a> This bug has been fixed in release 6.3.9. For 6.3.8, use the <a href="fetchmail-SA-2008-01.txt">patch contained in the security announcement.</a></li>
+ <li><a name="cve-2007-4565" href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4565">CVE-2007-4565:</a> Fetchmail can <a href="fetchmail-SA-2007-02.txt">crash when the SMTP server refuses a warning message generated by fetchmail.</a> This bug was introduced in fetchmail 4.6.8 and has been fixed in release 6.3.9. For 6.3.8, use the <a href="fetchmail-SA-2007-02.txt">patch contained in this security announcement.</a></li>
+ <li><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1558">CVE-2007-1558:</a> Fetchmail's APOP client was found to <a href="fetchmail-SA-2007-01.txt">validate APOP challenges insufficiently, making man-in-the-middle attacks on APOP secrets unnecessarily easier than need be.</a> This bug was long-standing, fetchmail 6.3.8 and newer validate the APOP challenge more strictly.</li>
+ <li><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5974">CVE-2006-5974:</a> Fetchmail was found to <a href="fetchmail-SA-2006-03.txt">crash when refusing a message that was bound to be delivered by an MDA.</a> This bug was introduced into fetchmail 6.3.5 and fixed in 6.3.6.</li>
+ <li><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5867">CVE-2006-5867:</a> Fetchmail was found to <a href="fetchmail-SA-2006-02.txt">omit TLS or send the password in clear text despite the configuration stating otherwise.</a> This was a long-standing bug reported by Isaac Wilcox, fixed in fetchmail 6.3.6. There will be no 6.2.X releases to fix this bug in 6.2.X.</li>
+ <li><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0321">CVE-2006-0321:</a> Fetchmail was found to <a href="fetchmail-SA-2006-01.txt">crash after bouncing a message with bad addresses. This bug was introduced with fetchmail 6.3.0 and fixed in fetchmail 6.3.2.</a></li>
+ <li><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4348">CVE-2005-4348:</a> Fetchmail was found to contain <a href="fetchmail-SA-2005-03.txt">a bug (null pointer dereference) that can be exploited to a denial of service attack</a> when fetchmail runs in multidrop mode. 6.2.5.5 and 6.3.1 have this bug fixed.</li>
+ <li><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3088">CVE-2005-3088:</a> Fetchmailconf was found to <a href="fetchmail-SA-2005-02.txt">open the configuration files world-readable, writing data to them, and only then tightening up permissions</a>, which may cause password information to be visible to other users. This bug affected fetchmail 6.2.0, 6.2.5 and 6.2.5.2. The bug is fixed in fetchmail 6.2.5.4 and 6.3.0.</li>
+ <li><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2335">CVE-2005-2335:</a> Fetchmail was found to contain a <a href="fetchmail-SA-2005-01.txt">remotely exploitable code injection vulnerability (potentially privileged code)</a> in the POP3 code, affecting both the 6.2.0 and 6.2.5 releases. 6.2.5.2, 6.2.5.4 and 6.3.0 have got this bug fixed. (Other versions have not been checked if they contain this bug.)</li>
</ul>
<p style="font-size:100%"><strong>Please <a
- href="http://sourceforge.net/projects/fetchmail/files/">update
+ href="https://sourceforge.net/projects/fetchmail/files/">update
to the newest fetchmail version</a>.</strong></p>
</div>
</body>