Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | |||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.51211 |
Kategorie: | Red Hat Local Security Checks |
Titel: | RedHat Security Advisory RHSA-2002:294 |
Zusammenfassung: | NOSUMMARY |
Beschreibung: | Description: The remote host is missing updates announced in advisory RHSA-2002:294. Updated Fetchmail packages are available for Red Hat Linux Advanced Server which close a remotely-exploitable vulnerability in unpatched versions of Fetchmail prior to 6.2.0. [Updated 06 Feb 2003] Added fixed packages for Advanced Workstation Fetchmail is a remote mail retrieval and forwarding utility intended for use over on-demand TCP/IP links such as SLIP and PPP connections. A bug has been found in the header parsing code in versions of Fetchmail prior to 6.2.0. The bug allows a remote attacker to crash Fetchmail and potentially execute arbitrary code by sending a carefully crafted email which is parsed by Fetchmail. All users of Fetchmail are advised to upgrade to the errata packages containing a backported fix which corrects this issue. Solution: Please note that this update is available via Red Hat Network. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date http://rhn.redhat.com/errata/RHSA-2002-294.html http://tuxedo.org/~ esr/fetchmail/NEWS http://security.e-matters.de/advisories/052002.html Risk factor : High CVSS Score: 7.5 |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2002-1365 BugTraq ID: 6390 http://www.securityfocus.com/bid/6390 Bugtraq: 20021213 Advisory 05/2002: Another Fetchmail Remote Vulnerability (Google Search) http://marc.info/?l=bugtraq&m=103979751818638&w=2 Bugtraq: 20021215 GLSA: fetchmail (Google Search) http://marc.info/?l=bugtraq&m=104004858802000&w=2 Caldera Security Advisory: CSSA-2003-001.0 ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2003-001.0.txt Conectiva Linux advisory: CLA-2002:554 http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000554 Debian Security Information: DSA-216 (Google Search) http://www.debian.org/security/2002/dsa-216 En Garde Linux Advisory: ESA-20030127-002 Immunix Linux Advisory: IMNX-2003-7+-023-01 http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:011 http://security.e-matters.de/advisories/052002.html http://www.redhat.com/support/errata/RHSA-2002-293.html http://www.redhat.com/support/errata/RHSA-2002-294.html http://www.redhat.com/support/errata/RHSA-2003-155.html SuSE Security Announcement: SuSE-SA:2003:001 (Google Search) XForce ISS Database: fetchmail-address-header-bo(10839) https://exchange.xforce.ibmcloud.com/vulnerabilities/10839 |
Copyright | Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com |
Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |