CVE-2001-0819

A buffer overflow in Linux fetchmail before 5.8.6 allows remote attackers to execute arbitrary code via a large 'To:' field in an email header.
References
Link Resource
ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:43.fetchmail.asc
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000403
http://download.immunix.org/ImmunixOS/7.0/updates/IMNX-2001-70-025-01
http://www.caldera.com/support/security/advisories/CSSA-2001-022.1.txt
http://www.debian.org/security/2001/dsa-060 Patch Vendor Advisory
http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-063.php3?dis=7.1
http://www.linuxsecurity.com/advisories/other_advisory-1451.html Patch Vendor Advisory
http://www.novell.com/linux/security/advisories/2001_026_fetchmail_txt.html
http://www.redhat.com/support/errata/RHSA-2001-103.html
http://www.securityfocus.com/bid/2877 Patch Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/6704
ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:43.fetchmail.asc
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000403
http://download.immunix.org/ImmunixOS/7.0/updates/IMNX-2001-70-025-01
http://www.caldera.com/support/security/advisories/CSSA-2001-022.1.txt
http://www.debian.org/security/2001/dsa-060 Patch Vendor Advisory
http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-063.php3?dis=7.1
http://www.linuxsecurity.com/advisories/other_advisory-1451.html Patch Vendor Advisory
http://www.novell.com/linux/security/advisories/2001_026_fetchmail_txt.html
http://www.redhat.com/support/errata/RHSA-2001-103.html
http://www.securityfocus.com/bid/2877 Patch Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/6704
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:fetchmail:fetchmail:*:*:*:*:*:*:*:*
cpe:2.3:a:fetchmail:fetchmail:4.5.1:*:*:*:*:*:*:*
cpe:2.3:a:fetchmail:fetchmail:4.5.2:*:*:*:*:*:*:*
cpe:2.3:a:fetchmail:fetchmail:4.5.3:*:*:*:*:*:*:*
cpe:2.3:a:fetchmail:fetchmail:4.5.4:*:*:*:*:*:*:*
cpe:2.3:a:fetchmail:fetchmail:4.5.5:*:*:*:*:*:*:*
cpe:2.3:a:fetchmail:fetchmail:4.5.6:*:*:*:*:*:*:*
cpe:2.3:a:fetchmail:fetchmail:4.5.7:*:*:*:*:*:*:*
cpe:2.3:a:fetchmail:fetchmail:4.5.8:*:*:*:*:*:*:*
cpe:2.3:a:fetchmail:fetchmail:4.6.0:*:*:*:*:*:*:*
cpe:2.3:a:fetchmail:fetchmail:4.6.1:*:*:*:*:*:*:*
cpe:2.3:a:fetchmail:fetchmail:4.6.2:*:*:*:*:*:*:*
cpe:2.3:a:fetchmail:fetchmail:4.6.3:*:*:*:*:*:*:*
cpe:2.3:a:fetchmail:fetchmail:4.6.4:*:*:*:*:*:*:*
cpe:2.3:a:fetchmail:fetchmail:4.6.5:*:*:*:*:*:*:*
cpe:2.3:a:fetchmail:fetchmail:4.6.6:*:*:*:*:*:*:*
cpe:2.3:a:fetchmail:fetchmail:4.6.7:*:*:*:*:*:*:*
cpe:2.3:a:fetchmail:fetchmail:4.6.8:*:*:*:*:*:*:*
cpe:2.3:a:fetchmail:fetchmail:4.6.9:*:*:*:*:*:*:*
cpe:2.3:a:fetchmail:fetchmail:4.7.0:*:*:*:*:*:*:*
cpe:2.3:a:fetchmail:fetchmail:4.7.1:*:*:*:*:*:*:*
cpe:2.3:a:fetchmail:fetchmail:4.7.2:*:*:*:*:*:*:*
cpe:2.3:a:fetchmail:fetchmail:4.7.3:*:*:*:*:*:*:*
cpe:2.3:a:fetchmail:fetchmail:4.7.4:*:*:*:*:*:*:*
cpe:2.3:a:fetchmail:fetchmail:4.7.5:*:*:*:*:*:*:*
cpe:2.3:a:fetchmail:fetchmail:4.7.6:*:*:*:*:*:*:*
cpe:2.3:a:fetchmail:fetchmail:4.7.7:*:*:*:*:*:*:*
cpe:2.3:a:fetchmail:fetchmail:5.0.0:*:*:*:*:*:*:*
cpe:2.3:a:fetchmail:fetchmail:5.0.1:*:*:*:*:*:*:*
cpe:2.3:a:fetchmail:fetchmail:5.0.2:*:*:*:*:*:*:*
cpe:2.3:a:fetchmail:fetchmail:5.0.3:*:*:*:*:*:*:*
cpe:2.3:a:fetchmail:fetchmail:5.0.4:*:*:*:*:*:*:*
cpe:2.3:a:fetchmail:fetchmail:5.0.5:*:*:*:*:*:*:*
cpe:2.3:a:fetchmail:fetchmail:5.0.6:*:*:*:*:*:*:*
cpe:2.3:a:fetchmail:fetchmail:5.0.7:*:*:*:*:*:*:*
cpe:2.3:a:fetchmail:fetchmail:5.0.8:*:*:*:*:*:*:*
cpe:2.3:a:fetchmail:fetchmail:5.1.0:*:*:*:*:*:*:*
cpe:2.3:a:fetchmail:fetchmail:5.1.4:*:*:*:*:*:*:*
cpe:2.3:a:fetchmail:fetchmail:5.2.0:*:*:*:*:*:*:*
cpe:2.3:a:fetchmail:fetchmail:5.2.1:*:*:*:*:*:*:*
cpe:2.3:a:fetchmail:fetchmail:5.2.3:*:*:*:*:*:*:*
cpe:2.3:a:fetchmail:fetchmail:5.2.4:*:*:*:*:*:*:*
cpe:2.3:a:fetchmail:fetchmail:5.2.7:*:*:*:*:*:*:*
cpe:2.3:a:fetchmail:fetchmail:5.2.8:*:*:*:*:*:*:*
cpe:2.3:a:fetchmail:fetchmail:5.3.0:*:*:*:*:*:*:*
cpe:2.3:a:fetchmail:fetchmail:5.3.1:*:*:*:*:*:*:*
cpe:2.3:a:fetchmail:fetchmail:5.3.3:*:*:*:*:*:*:*
cpe:2.3:a:fetchmail:fetchmail:5.3.8:*:*:*:*:*:*:*
cpe:2.3:a:fetchmail:fetchmail:5.4.0:*:*:*:*:*:*:*
cpe:2.3:a:fetchmail:fetchmail:5.4.3:*:*:*:*:*:*:*
cpe:2.3:a:fetchmail:fetchmail:5.4.4:*:*:*:*:*:*:*
cpe:2.3:a:fetchmail:fetchmail:5.4.5:*:*:*:*:*:*:*
cpe:2.3:a:fetchmail:fetchmail:5.5.0:*:*:*:*:*:*:*
cpe:2.3:a:fetchmail:fetchmail:5.5.2:*:*:*:*:*:*:*
cpe:2.3:a:fetchmail:fetchmail:5.5.3:*:*:*:*:*:*:*
cpe:2.3:a:fetchmail:fetchmail:5.5.5:*:*:*:*:*:*:*
cpe:2.3:a:fetchmail:fetchmail:5.5.6:*:*:*:*:*:*:*
cpe:2.3:a:fetchmail:fetchmail:5.6.0:*:*:*:*:*:*:*
cpe:2.3:a:fetchmail:fetchmail:5.7.0:*:*:*:*:*:*:*
cpe:2.3:a:fetchmail:fetchmail:5.7.2:*:*:*:*:*:*:*
cpe:2.3:a:fetchmail:fetchmail:5.7.4:*:*:*:*:*:*:*
cpe:2.3:a:fetchmail:fetchmail:5.8:*:*:*:*:*:*:*
cpe:2.3:a:fetchmail:fetchmail:5.8.1:*:*:*:*:*:*:*
cpe:2.3:a:fetchmail:fetchmail:5.8.2:*:*:*:*:*:*:*
cpe:2.3:a:fetchmail:fetchmail:5.8.3:*:*:*:*:*:*:*
cpe:2.3:a:fetchmail:fetchmail:5.8.4:*:*:*:*:*:*:*

History

20 Nov 2024, 23:36

Type Values Removed Values Added
References () ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:43.fetchmail.asc - () ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:43.fetchmail.asc -
References () http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000403 - () http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000403 -
References () http://download.immunix.org/ImmunixOS/7.0/updates/IMNX-2001-70-025-01 - () http://download.immunix.org/ImmunixOS/7.0/updates/IMNX-2001-70-025-01 -
References () http://www.caldera.com/support/security/advisories/CSSA-2001-022.1.txt - () http://www.caldera.com/support/security/advisories/CSSA-2001-022.1.txt -
References () http://www.debian.org/security/2001/dsa-060 - Patch, Vendor Advisory () http://www.debian.org/security/2001/dsa-060 - Patch, Vendor Advisory
References () http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-063.php3?dis=7.1 - () http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-063.php3?dis=7.1 -
References () http://www.linuxsecurity.com/advisories/other_advisory-1451.html - Patch, Vendor Advisory () http://www.linuxsecurity.com/advisories/other_advisory-1451.html - Patch, Vendor Advisory
References () http://www.novell.com/linux/security/advisories/2001_026_fetchmail_txt.html - () http://www.novell.com/linux/security/advisories/2001_026_fetchmail_txt.html -
References () http://www.redhat.com/support/errata/RHSA-2001-103.html - () http://www.redhat.com/support/errata/RHSA-2001-103.html -
References () http://www.securityfocus.com/bid/2877 - Patch, Vendor Advisory () http://www.securityfocus.com/bid/2877 - Patch, Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/6704 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/6704 -

Information

Published : 2001-12-06 05:00

Updated : 2024-11-20 23:36


NVD link : CVE-2001-0819

Mitre link : CVE-2001-0819

CVE.ORG link : CVE-2001-0819


JSON object : View

Products Affected

fetchmail

  • fetchmail
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer