FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

fetchmail -- remote root/code injection from malicious POP3 server

Affected packages
fetchmail < 6.2.5.1

Details

VuXML ID 3497d7be-2fef-45f4-8162-9063751b573a
Discovery 2005-07-20
Entry 2005-07-20
Modified 2005-07-21

fetchmail's POP3/UIDL code does not truncate received UIDs properly. A malicious or compromised POP3 server can thus corrupt fetchmail's stack and inject code when fetchmail is using UIDL, either through configuration, or as a result of certain server capabilities. Note that fetchmail is run as root on some sites, so an attack might compromise the root account and thus the whole machine.

References

CVE Name CVE-2005-2335
FreeBSD PR ports/83805
URL http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=212762
URL http://www.fetchmail.info/fetchmail-SA-2005-01.txt