Bug 163819

Summary: CAN-2005-2335 fetchmail overflow from malicious pop3 server
Product: [Fedora] Fedora Reporter: Mark J. Cox <mjc>
Component: fetchmailAssignee: Miloslav Trmač <mitr>
Status: CLOSED ERRATA QA Contact: Brock Organ <borgan>
Severity: medium Docs Contact:
Priority: medium    
Version: 4CC: security-response-team
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2005-07-22 08:08:51 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Mark J. Cox 2005-07-21 13:13:46 UTC
It's likely this will be completely caught by FC4 FORTIFY_SOURCE however I've
not verified it yet.  See RHEL bug for (private) proof of concept.

+++ This bug was initially created as a clone of Bug #163816 +++

We were alerted today to a Debian bug report showing a flaw where a malicious
POP3 server could overflow a stack buffer in fetchmail.

Draft advisory at http://fetchmail.berlios.de/fetchmail-SA-2005-01.txt

More details at end of http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=212762

Comment 1 Mark J. Cox 2005-07-21 13:29:26 UTC
(Actually it isn't and wouldn't be caught by FORTIFY_SOURCE)

Comment 2 Miloslav Trmač 2005-07-22 08:08:51 UTC
Fixed in fetchmail-6.2.5-7.fc[34].1