445
VMScore

CVE-2021-36386

Published: 30/07/2021 Updated: 07/11/2023
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

report_vbuild in report.c in Fetchmail prior to 6.4.20 sometimes omits initialization of the vsnprintf va_list argument, which might allow mail servers to cause a denial of service or possibly have unspecified other impact via long error messages. NOTE: it is unclear whether use of Fetchmail on any realistic platform results in an impact beyond an inconvenience to the client user.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

fetchmail fetchmail

fedoraproject fedora 33

fedoraproject fedora 34

Vendor Advisories

A security issue has been found in fetchmail before version 6420 Missing variable initialization can cause reads from bad memory locations when logging long messages This leads to fetchmail logging random information (and possible information disclosure), or segfaults and aborts, stalling inbound mail ...

Mailing Lists

Greetings, I have announced fetchmail 6420 today, which fixes the issue shown in the security announcement below fetchmail 6420 is available from <sourceforgenet/projects/fetchmail/files/branch_64/> The source archive is available at: <sourceforgenet/projects/fetchmail/files/branch_64/fetchmail-6420tarxz/d ...
UPDATE: While fetchmail 6420 fixed CVE-2021-36386, it introduced a bug WRT buffered logging that got fixed in 6421 Packagers should either upgrade all the way to 6421, or pick the near-trivial regression fix from section #3 below or Git commit d3db2da1 can be cherry-picked from the GitLab or SourceForge repos fetchmail 6421 is availabl ...