7.5
CVSSv3

CVE-2021-36386

Published: 30/07/2021 Updated: 07/11/2023
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

report_vbuild in report.c in Fetchmail prior to 6.4.20 sometimes omits initialization of the vsnprintf va_list argument, which might allow mail servers to cause a denial of service or possibly have unspecified other impact via long error messages. NOTE: it is unclear whether use of Fetchmail on any realistic platform results in an impact beyond an inconvenience to the client user.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

fetchmail fetchmail

fedoraproject fedora 33

fedoraproject fedora 34

Vendor Advisories

A security issue has been found in fetchmail before version 6420 Missing variable initialization can cause reads from bad memory locations when logging long messages This leads to fetchmail logging random information (and possible information disclosure), or segfaults and aborts, stalling inbound mail ...

Mailing Lists

<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> fetchmail 6421 released/regression fix for 6420's security fix, and UPDATE: fetchmail &lt;= 6419 security announcement 20 ...