USN-520-1: fetchmail vulnerabilities

Ubuntu Security Notice USN-520-1

25th September, 2007

fetchmail vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 7.04
  • Ubuntu 6.10
  • Ubuntu 6.06 LTS

Software description

  • fetchmail

Details

Gaetan Leurent discovered a vulnerability in the APOP protocol based
on MD5 collisions. As fetchmail supports the APOP protocol, this
vulnerability can be used by attackers to discover a portion of the APOP
user's authentication credentials. (CVE-2007-1558)

Earl Chew discovered that fetchmail can be made to de-reference a NULL
pointer when contacting SMTP servers. This vulnerability can be used
by attackers who control the SMTP server to crash fetchmail and cause
a denial of service. (CVE-2007-4565)

Update instructions

The problem can be corrected by updating your system to the following package version:

Ubuntu 7.04:
fetchmail 6.3.6-1ubuntu2.1
Ubuntu 6.10:
fetchmail 6.3.4-1ubuntu4.2
Ubuntu 6.06 LTS:
fetchmail 6.3.2-2ubuntu2.2

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system upgrade is sufficient to effect the
necessary changes.

References

CVE-2007-1558, CVE-2007-4565