aboutsummaryrefslogtreecommitdiffstats
path: root/fetchmail-features.html
Commit message (Expand)AuthorAgeFilesLines
* Revise a bunch of links.Matthias Andree2006-03-311-1/+1
* Enable Date replacement.Matthias Andree2005-08-281-2/+2
* INCOMPATIBLE: DROP --netsec/-T option, NET_SECURITY macro - the required libr...Matthias Andree2005-07-301-3/+0
* Rename design-notes.html to esrs-design-notes.html. Remove ~esr/ path from li...Matthias Andree2005-07-201-2/+0
* Make this conformant XHTML. Remove inet6-apps requirement from IPv6. Mention ...Matthias Andree2005-07-031-5/+5
* Support faked IDLE.Eric S. Raymond2003-07-221-3/+4
* First round ofmlong-delayed bug fixes.Eric S. Raymond2003-07-171-4/+4
* IDLE and CYgwin fix patch.Eric S. Raymond2003-02-281-3/+3
* Note STARTTLS.Eric S. Raymond2002-09-091-2/+4
* XML headers everywhere.Eric S. Raymond2002-07-301-2/+3
* XML conversionEric S. Raymond2002-07-281-183/+212
* Cleanup.Eric S. Raymond2002-07-281-9/+10
* Prepare for 6.0.0.Eric S. Raymond2002-06-081-5/+5
* Initial version of ESMTP AUTH.Eric S. Raymond2002-03-091-2/+4
* Documentation fixes.Eric S. Raymond2001-07-251-3/+3
* Tracepolls switch implemented.Eric S. Raymond2001-06-051-2/+5
* Added new feature.Eric S. Raymond2001-05-141-2/+4
* Security fix.Eric S. Raymond2001-03-121-3/+3
* Fallback MDA.Eric S. Raymond2001-03-071-2/+5
* Added POP3 version of CRAM-MD5.Eric S. Raymond2001-02-111-7/+9
* First cut at ODMR support.Eric S. Raymond2001-02-071-2/+4
* Samuel Leo's LMTP enhancement.Eric S. Raymond2000-12-061-2/+4
* The retry patch.Eric S. Raymond2000-12-011-2/+4
* David Taylor's fixes for the UIDL code.Eric S. Raymond2000-08-061-2/+6
* Added dropdelivered.Eric S. Raymond2000-07-231-2/+9
* Julian Haight's changes.Eric S. Raymond2000-06-071-3/+11
* Ready to merge in Julian Haight's changes.Eric S. Raymond2000-06-071-5/+7
* BeOS support.Eric S. Raymond2000-04-081-2/+5
* speed improvement by usingh SEARCH UNSEEN.Eric S. Raymond2000-04-071-2/+10
* We now match suffixes.Eric S. Raymond2000-03-131-3/+7
* Implemented support for RFC2177 IDLE command.Eric S. Raymond2000-03-061-3/+7
* LinuxWorld hacks.Eric S. Raymond2000-02-051-2/+6
* Reread .fetchmailrc when it's changed in daemon mode.Eric S. Raymond1999-12-211-2/+6
* IPv6 patches.Eric S. Raymond1999-12-191-3/+5
* This preliminary SSL patch goes to Mike.Eric S. Raymond1999-10-271-2/+7
* NTLM support integrated.Eric S. Raymond1999-09-141-2/+4
* CRAM-MD5 authentication support a la RFC2195.Eric S. Raymond1999-06-081-2/+4
* Enable expunge to controil POP2 and POP3 checkpointing.Eric S. Raymond1999-04-181-2/+7
* FreeBSD support.Eric S. Raymond1999-02-071-2/+4
* Make the mimedecode default TRUE.Eric S. Raymond1999-01-101-3/+4
* Typo fix.Eric S. Raymond1999-01-071-3/+3
* HTML cleanup.Eric S. Raymond1999-01-021-5/+4
* RFC1894 conformance.Eric S. Raymond1998-12-301-3/+3
* gcc -Wall cleanup.Eric S. Raymond1998-12-151-4/+6
* Added bouncemail.Eric S. Raymond1998-11-291-2/+4
* Internationalization support via GNU gettext().Eric S. Raymond1998-11-261-2/+4
* Gerald Britton's support for mixed Kerberos and Hesiod.Eric S. Raymond1998-11-171-2/+4
* Added BSMTP option.Eric S. Raymond1998-10-301-2/+4
* Now we can use --limit with daemon mode.Eric S. Raymond1998-10-161-3/+6
* Documentation improvements.Eric S. Raymond1998-10-091-3/+3
="cve-2007-4565" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4565">CVE-2007-4565:</a> Fetchmail can <a href="fetchmail-SA-2007-02.txt">crash when the SMTP server refuses a warning message generated by fetchmail.</a> This bug was introduced in fetchmail 4.6.8 and has been fixed in release 6.3.9. For 6.3.8, use the <a href="fetchmail-SA-2007-02.txt">patch contained in this security announcement.</a></li> <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1558">CVE-2007-1558:</a> Fetchmail's APOP client was found to <a href="fetchmail-SA-2007-01.txt">validate APOP challenges insufficiently, making man-in-the-middle attacks on APOP secrets unnecessarily easier than need be.</a> This bug was long-standing, fetchmail 6.3.8 and newer validate the APOP challenge more strictly.</li> <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5974">CVE-2006-5974:</a> Fetchmail was found to <a href="fetchmail-SA-2006-03.txt">crash when refusing a message that was bound to be delivered by an MDA.</a> This bug was introduced into fetchmail 6.3.5 and fixed in 6.3.6.</li> <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5867">CVE-2006-5867:</a> Fetchmail was found to <a href="fetchmail-SA-2006-02.txt">omit TLS or send the password in clear text despite the configuration stating otherwise.</a> This was a long-standing bug reported by Isaac Wilcox, fixed in fetchmail 6.3.6. There will be no 6.2.X releases to fix this bug in 6.2.X.</li> <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0321">CVE-2006-0321:</a> Fetchmail was found to <a href="fetchmail-SA-2006-01.txt">crash after bouncing a message with bad addresses. This bug was introduced with fetchmail 6.3.0 and fixed in fetchmail 6.3.2.</a></li> <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4348">CVE-2005-4348:</a> Fetchmail was found to contain <a href="fetchmail-SA-2005-03.txt">a bug (null pointer dereference) that can be exploited to a denial of service attack</a> when fetchmail runs in multidrop mode. 6.2.5.5 and 6.3.1 have this bug fixed.</li> <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3088">CVE-2005-3088:</a> Fetchmailconf was found to <a href="fetchmail-SA-2005-02.txt">open the configuration files world-readable, writing data to them, and only then tightening up permissions</a>, which may cause password information to be visible to other users. This bug affected fetchmail 6.2.0, 6.2.5 and 6.2.5.2. The bug is fixed in fetchmail 6.2.5.4 and 6.3.0.</li> <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2335">CVE-2005-2335:</a> Fetchmail was found to contain a <a href="fetchmail-SA-2005-01.txt">remotely exploitable code injection vulnerability (potentially privileged code)</a> in the POP3 code, affecting both the 6.2.0 and 6.2.5 releases. 6.2.5.2, 6.2.5.4 and 6.3.0 have got this bug fixed. (Other versions have not been checked if they contain this bug.)</li> </ul> <p style="font-size:100%"><strong>Please <a href="http://developer.berlios.de/project/showfiles.php?group_id=1824">update to the newest fetchmail version</a>.</strong></p> </div> </body> </html>