Home page logo
/

bugtraq logo Bugtraq mailing list archives

[ESA-20010620-01]: fetchmail-ssl buffer overflow
From: EnGarde Secure Linux <security () guardiandigital com>
Date: Thu, 21 Jun 2001 17:07:38 -0400 (EDT)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


+------------------------------------------------------------------------+
| EnGarde Secure Linux Security Advisory                   June 20, 2001 |
| http://www.engardelinux.org/                           ESA-20010620-01 |
|                                                                        |
| Package:  fetchmail-ssl                                                |
| Summary:  There is a buffer overflow in the header handling code of    |
|           the fetchmail-ssl package.                                   |
+------------------------------------------------------------------------+

  EnGarde Secure Linux is a secure distribution of Linux that features
  improved access control, host and network intrusion detection, Web
  based secure remote management, complete e-commerce using AllCommerce,
  and integrated open source security tools.


OVERVIEW
- --------
  There is a buffer overflow vulnerability in the fetchmail-ssl package
  which could potentially be exploited remotely, although no exploit is
  known of at this time.


DETAIL
- ------
  There is a buffer overflow in the header parsing code of fetchmail
  (rfc882.c) which caused fetchmail to die with a segmentation fault
  when it encountered a message with a large "To:" header.

  This bug could be exploited remotely and, if fetchmail is being run
  as root, could allow the attacker to obtain root privileges.  No
  exploit is know of at this time but we highly recommend all users
  update nevertheless.

  We have updated the package to version 5.8.7 to fix this problem.


SOLUTION
- --------
  All users should upgrade to the most recent version, as outlined in
  this advisory.  All updates can be found at:

    ftp://ftp.engardelinux.org/pub/engarde/stable/updates/
    http://ftp.engardelinux.org/pub/engarde/stable/updates/
    http://ftp.ibiblio.org/pub/linux/distributions/engarde/stable/updates/

  Before upgrading the package, the machine must either:

    a) be booted into a "standard" kernel; or
    b) have LIDS disabled.

  To disable LIDS, execute the command:

    # /sbin/lidsadm -S -- -LIDS_GLOBAL

  To install the updated package, execute the command:

    # rpm -Uvh <filename>

  To re-enable LIDS (if it was disabled), execute the command:

    # /sbin/lidsadm -S -- +LIDS_GLOBAL

  To verify the signature of the updated packages, execute the command:

    # rpm -Kv <filename>


UPDATED PACKAGES
- ----------------
  These updated packages are for EnGarde Secure Linux 1.0.1 (Finestra).

  Source Packages:

    SRPMS/fetchmail-ssl-5.8.7-1.0.2.src.rpm
      MD5 Sum:  a3fbe418903aaee80c4d7f68b246bd3b

  Binary Packages:

    i386/fetchmail-ssl-5.8.7-1.0.2.i386.rpm
      MD5 Sum:  fc034811543e4aa5ad913bfa444f7e7f

    i686/fetchmail-ssl-5.8.7-1.0.2.i686.rpm
      MD5 Sum:  dcb18d42dd572432ddb60bd917e2418d


REFERENCES
- ----------

  Guardian Digital's public key:
    http://ftp.engardelinux.org/pub/engarde/ENGARDE-GPG-KEY

  Credit for the discovery of this bug goes to:
    Wolfram Kleff <kleff () cs uni-bonn de>

  fetchmail's Official Web Site:
    http://www.tuxedo.org/~esr/fetchmail/index.html

  Original disclosure of this bug:
    http://bugs.debian.org/100394


- --------------------------------------------------------------------------
$Id: ESA-20010620-01-fetchmail-ssl,v 1.2 2001/06/20 18:51:11 rwm Exp $
- --------------------------------------------------------------------------
Author: Ryan W. Maple, <ryan () guardiandigital com> 
Copyright 2001, Guardian Digital, Inc.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.4 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE7MmIiHD5cqd57fu0RArc7AJsGfdqJYOtAiAw2NG4f03FFk/QEtgCfe6d+
Lrl2lQlTAJWJ+PKUhmp9xYg=
=KhJe
-----END PGP SIGNATURE-----


  By Date           By Thread  

Current thread:
  • [ESA-20010620-01]: fetchmail-ssl buffer overflow EnGarde Secure Linux (Jun 22)
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]
AlienVault