Vulnerability Description
fetchmail 6.3.0 and other versions before 6.3.2 allows remote attackers to cause a denial of service (crash) via crafted e-mail messages that cause a free of an invalid pointer when fetchmail bounces the message to the originator or local postmaster.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Fetchmail | Fetchmail | 6.3.0 |
Related Weaknesses (CWE)
References
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=348747
- http://developer.berlios.de/project/shownotes.php?release_id=8784
- http://fetchmail.berlios.de/fetchmail-SA-2006-01.txtPatchVendor Advisory
- http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html
- http://secunia.com/advisories/18571Vendor Advisory
- http://secunia.com/advisories/18895Vendor Advisory
- http://secunia.com/advisories/21253Vendor Advisory
- http://securitytracker.com/id?1015527
- http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware
- http://www.osvdb.org/22691
- http://www.securityfocus.com/archive/1/422936/100/0/threaded
- http://www.securityfocus.com/bid/16365
- http://www.securityfocus.com/bid/19289
- http://www.us-cert.gov/cas/techalerts/TA06-214A.htmlUS Government Resource
- http://www.vupen.com/english/advisories/2006/0300
FAQ
What is CVE-2006-0321?
CVE-2006-0321 is a vulnerability with a CVSS score of 5.0 (MEDIUM). fetchmail 6.3.0 and other versions before 6.3.2 allows remote attackers to cause a denial of service (crash) via crafted e-mail messages that cause a free of an invalid pointer when fetchmail bounces ...
How severe is CVE-2006-0321?
CVE-2006-0321 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-0321?
Check the references section above for vendor advisories and patch information. Affected products include: Fetchmail Fetchmail.