aboutsummaryrefslogtreecommitdiffstats
path: root/fetchmail-SA-2005-01.txt
blob: d9e9aa2a2273c4d900d7b043f4e2ca281040bbe1 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
fetchmail-SA-2005-01: security announcement

Topic:		remote code injection vulnerability in fetchmail

Author:		Matthias Andree
Version:	1.00
Announced:	2005-07-21
Type:		buffer overrun/stack corruption/code injection
Impact:		account or system compromise possible through malicious
		or compromised POP3 servers
Danger:		high: in sensitive configurations, a full system
		compromise is possible
CVE Name:	CAN-2005-2335
URL:		http://fetchmail.berlios.de/fetchmail-SA-2005-01.txt
		http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=212762
		http://www.vuxml.org/freebsd/3497d7be-2fef-45f4-8162-9063751b573a.html
		http://www.freebsd.org/cgi/query-pr.cgi?pr=83805

Affects:	fetchmail version 6.2.5
		fetchmail version 6.2.0
		(other versions have not been checked)

Not affected:	fetchmail 6.2.5.1
		fetchmail 6.2.6-pre5 (not released yet)
		fetchmail 6.3.0      (not released yet)

		Older versions may not have THIS bug, but had been found
		to contain other security-relevant bugs.

Corrected:	2005-07-20 15:22 UTC (SVN) - committed bugfix (r4143)
		2005-07-20                   fetchmail-patch-6.2.5.1 released

0. Release history

2005-07-20	1.00 initial announcement

1. Background

fetchmail is a software package to retrieve mail from remote POP2, POP3,
IMAP, ETRN or ODMR servers and forward it to local SMTP, LMTP servers or
message delivery agents.

2. Problem description

The POP3 code that deals with UIDs (from the UIDL) reads the responses
returned by the POP3 server into fixed-size buffers allocated on the
stack, without limiting the input length to the buffer size. A
compromised or malicious POP3 server can thus overrun fetchmail's stack.
This affects POP3 and all of its variants, for instance but not limited
to APOP.

3. Impact

Very long UIDs can cause fetchmail to crash, or potentially make it
execute code placed on the stack. In some configurations, fetchmail
is run by the root user to download mail for multiple accounts.

4. Workaround

No reasonable workaround can be offered at this time.

5. Solution

Upgrade your fetchmail package to version 6.2.5.1.
This requires the download of the fetchmail-6.2.5.tar.gz tarball and the
fetchmail-patch-6.2.5.1.gz from BerliOS:

<http://developer.berlios.de/project/showfiles.php?group_id=1824>

Note that the files may be hidden from view later as new releases become
available.

Instructions for patching are given at
<http://developer.berlios.de/forum/forum.php?forum_id=13104>

A. References

fetchmail home page: <http://fetchmail.berlios.de/>

B. Copyright and License

(C) Copyright 2005 by Matthias Andree, <matthias.andree@gmx.de>.
Some rights reserved.

This work is licensed under the Creative Commons
Attribution-NonCommercial-NoDerivs German License. To view a copy of
this license, visit http://creativecommons.org/licenses/by-nc-nd/2.0/de/
or send a letter to Creative Commons; 559 Nathan Abbott Way;
Stanford, California 94305; USA.

END OF fetchmail-SA-2005-01.txt