A denial of service flaw was found in the way Fetchmail, a remote mail retrieval and forwarding utility, performed base64 decoding of certain NTLM server responses. Upon sending the NTLM authentication request, Fetchmail did not check if the received response was actually part of NTLM protocol exchange, or server-side error message and session abort. A rogue NTML server could use this flaw to cause fetchmail executable crash. Upstream patches: [1] http://gitorious.org/fetchmail/fetchmail/commit/3fbc7cd331602c76f882d1b507cd05c1d824ba8b [1a] https://gitorious.org/fetchmail/fetchmail/commit/c189f6a54f36f5b6f7734303db3cfc52311aab5f [1b] https://gitorious.org/fetchmail/fetchmail/commit/b3e0cd2d558b5ccf06c816eed38c883d7462d3d4 Upstream advisory (not available yet): [2] http://www.fetchmail.info/fetchmail-SA-2012-02.txt CVE request: [3] http://www.openwall.com/lists/oss-security/2012/08/13/9 References: [4] https://bugs.gentoo.org/show_bug.cgi?id=431284
This issue affects the versions of the fetchmail package, as shipped with Fedora release of 16 and 17. Please schedule an update.
Created fetchmail tracking bugs for this issue Affects: fedora-all [bug 847989]
fetchmail-6.3.22-1.fc17 has been pushed to the Fedora 17 stable repository. If problems still persist, please make note of it in this bug report.