CVE-2005-3088

fetchmailconf before 1.49 in fetchmail 6.2.0, 6.2.5 and 6.2.5.2 creates configuration files with insecure world-readable permissions, which allows local users to obtain sensitive information such as passwords.
References
Link Resource
http://fetchmail.berlios.de/fetchmail-SA-2005-02.txt Patch Vendor Advisory
http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html
http://marc.info/?l=bugtraq&m=113042785902031&w=2
http://secunia.com/advisories/17293 Patch Vendor Advisory
http://secunia.com/advisories/17349 Vendor Advisory
http://secunia.com/advisories/17446 Vendor Advisory
http://secunia.com/advisories/17491 Vendor Advisory
http://secunia.com/advisories/17495 Vendor Advisory
http://secunia.com/advisories/17631 Vendor Advisory
http://secunia.com/advisories/18895 Vendor Advisory
http://secunia.com/advisories/21253 Vendor Advisory
http://securitytracker.com/id?1015114
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.443499
http://www.debian.org/security/2005/dsa-900
http://www.gentoo.org/security/en/glsa/glsa-200511-06.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2005:209
http://www.osvdb.org/20267
http://www.redhat.com/support/errata/RHSA-2005-823.html
http://www.securityfocus.com/bid/15179 Patch
http://www.securityfocus.com/bid/19289
http://www.us-cert.gov/cas/techalerts/TA06-214A.html US Government Resource
http://www.vupen.com/english/advisories/2005/2182
http://www.vupen.com/english/advisories/2006/3101
https://usn.ubuntu.com/215-1/
http://fetchmail.berlios.de/fetchmail-SA-2005-02.txt Patch Vendor Advisory
http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html
http://marc.info/?l=bugtraq&m=113042785902031&w=2
http://secunia.com/advisories/17293 Patch Vendor Advisory
http://secunia.com/advisories/17349 Vendor Advisory
http://secunia.com/advisories/17446 Vendor Advisory
http://secunia.com/advisories/17491 Vendor Advisory
http://secunia.com/advisories/17495 Vendor Advisory
http://secunia.com/advisories/17631 Vendor Advisory
http://secunia.com/advisories/18895 Vendor Advisory
http://secunia.com/advisories/21253 Vendor Advisory
http://securitytracker.com/id?1015114
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.443499
http://www.debian.org/security/2005/dsa-900
http://www.gentoo.org/security/en/glsa/glsa-200511-06.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2005:209
http://www.osvdb.org/20267
http://www.redhat.com/support/errata/RHSA-2005-823.html
http://www.securityfocus.com/bid/15179 Patch
http://www.securityfocus.com/bid/19289
http://www.us-cert.gov/cas/techalerts/TA06-214A.html US Government Resource
http://www.vupen.com/english/advisories/2005/2182
http://www.vupen.com/english/advisories/2006/3101
https://usn.ubuntu.com/215-1/
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:fetchmail:fetchmail:6.2.0:*:*:*:*:*:*:*
cpe:2.3:a:fetchmail:fetchmail:6.2.5:*:*:*:*:*:*:*
cpe:2.3:a:fetchmail:fetchmail:6.2.5.2:*:*:*:*:*:*:*

History

21 Nov 2024, 00:01

Type Values Removed Values Added
References () http://fetchmail.berlios.de/fetchmail-SA-2005-02.txt - Patch, Vendor Advisory () http://fetchmail.berlios.de/fetchmail-SA-2005-02.txt - Patch, Vendor Advisory
References () http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html - () http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html -
References () http://marc.info/?l=bugtraq&m=113042785902031&w=2 - () http://marc.info/?l=bugtraq&m=113042785902031&w=2 -
References () http://secunia.com/advisories/17293 - Patch, Vendor Advisory () http://secunia.com/advisories/17293 - Patch, Vendor Advisory
References () http://secunia.com/advisories/17349 - Vendor Advisory () http://secunia.com/advisories/17349 - Vendor Advisory
References () http://secunia.com/advisories/17446 - Vendor Advisory () http://secunia.com/advisories/17446 - Vendor Advisory
References () http://secunia.com/advisories/17491 - Vendor Advisory () http://secunia.com/advisories/17491 - Vendor Advisory
References () http://secunia.com/advisories/17495 - Vendor Advisory () http://secunia.com/advisories/17495 - Vendor Advisory
References () http://secunia.com/advisories/17631 - Vendor Advisory () http://secunia.com/advisories/17631 - Vendor Advisory
References () http://secunia.com/advisories/18895 - Vendor Advisory () http://secunia.com/advisories/18895 - Vendor Advisory
References () http://secunia.com/advisories/21253 - Vendor Advisory () http://secunia.com/advisories/21253 - Vendor Advisory
References () http://securitytracker.com/id?1015114 - () http://securitytracker.com/id?1015114 -
References () http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.443499 - () http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.443499 -
References () http://www.debian.org/security/2005/dsa-900 - () http://www.debian.org/security/2005/dsa-900 -
References () http://www.gentoo.org/security/en/glsa/glsa-200511-06.xml - () http://www.gentoo.org/security/en/glsa/glsa-200511-06.xml -
References () http://www.mandriva.com/security/advisories?name=MDKSA-2005:209 - () http://www.mandriva.com/security/advisories?name=MDKSA-2005:209 -
References () http://www.osvdb.org/20267 - () http://www.osvdb.org/20267 -
References () http://www.redhat.com/support/errata/RHSA-2005-823.html - () http://www.redhat.com/support/errata/RHSA-2005-823.html -
References () http://www.securityfocus.com/bid/15179 - Patch () http://www.securityfocus.com/bid/15179 - Patch
References () http://www.securityfocus.com/bid/19289 - () http://www.securityfocus.com/bid/19289 -
References () http://www.us-cert.gov/cas/techalerts/TA06-214A.html - US Government Resource () http://www.us-cert.gov/cas/techalerts/TA06-214A.html - US Government Resource
References () http://www.vupen.com/english/advisories/2005/2182 - () http://www.vupen.com/english/advisories/2005/2182 -
References () http://www.vupen.com/english/advisories/2006/3101 - () http://www.vupen.com/english/advisories/2006/3101 -
References () https://usn.ubuntu.com/215-1/ - () https://usn.ubuntu.com/215-1/ -

Information

Published : 2005-10-27 10:02

Updated : 2024-11-21 00:01


NVD link : CVE-2005-3088

Mitre link : CVE-2005-3088

CVE.ORG link : CVE-2005-3088


JSON object : View

Products Affected

fetchmail

  • fetchmail
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor