7.8
CVSSv2

CVE-2005-4348

Published: 21/12/2005 Updated: 19/10/2018
CVSS v2 Base Score: 7.8 | Impact Score: 6.9 | Exploitability Score: 10
VMScore: 694
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Summary

fetchmail prior to 6.3.1 and prior to 6.2.5.5, when configured for multidrop mode, allows remote malicious users to cause a denial of service (application crash) by sending messages without headers from upstream mail servers.

Vulnerable Product Search on Vulmon Subscribe to Product

fetchmail fetchmail

Vendor Advisories

Debian Bug report logs - #343836 (CVE-2005-4348) Security: DoS attack possible - crashes on empty message Package: fetchmail; Maintainer for fetchmail is Laszlo Boszormenyi (GCS) <gcs@debianorg>; Source for fetchmail is src:fetchmail (PTS, buildd, popcon) Reported by: Steve Fosdick <dbugs@pelvouxnildramcouk> Date ...
Steve Fosdick discovered a remote Denial of Service vulnerability in fetchmail When using fetchmail in ‘multidrop’ mode, a malicious email server could cause a crash by sending an email without any headers Since fetchmail is commonly called automatically (with cron, for example), this crash could go unnoticed ...

References

CWE-399http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=343836http://fetchmail.berlios.de/fetchmail-SA-2005-03.txthttp://secunia.com/advisories/17891http://www.securityfocus.com/bid/15987http://secunia.com/advisories/18172http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:236http://securitytracker.com/id?1015383http://secunia.com/advisories/18231http://secunia.com/advisories/18266http://www.debian.org/security/2005/dsa-939http://secunia.com/advisories/18433http://secunia.com/advisories/18895http://www.trustix.org/errata/2006/0002/http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.443499http://secunia.com/advisories/18463http://www.osvdb.org/21906http://secunia.com/advisories/21253http://www.securityfocus.com/bid/19289http://www.redhat.com/support/errata/RHSA-2007-0018.htmlhttp://secunia.com/advisories/24007http://www.novell.com/linux/security/advisories/2007_4_sr.htmlftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.aschttp://secunia.com/advisories/24284http://www.vupen.com/english/advisories/2006/3101http://www.vupen.com/english/advisories/2005/2996https://exchange.xforce.ibmcloud.com/vulnerabilities/23713https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9659https://usn.ubuntu.com/233-1/http://www.securityfocus.com/archive/1/435197/100/0/threadedhttp://www.securityfocus.com/archive/1/420098/100/0/threadedhttps://bugs.debian.org/cgi-bin/bugreport.cgi?bug=343836https://usn.ubuntu.com/233-1/https://nvd.nist.gov