fetchmail 4.6.3 through 6.3.16, when debug mode is enabled, does not properly handle invalid characters in a multi-character locale, which allows remote attackers to cause a denial of service (memory consumption and application crash) via a crafted (1) message header or (2) POP3 UIDL list.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:13
Type | Values Removed | Values Added |
---|---|---|
References | () http://developer.berlios.de/project/shownotes.php?group_id=1824&release_id=17512 - | |
References | () http://www.fetchmail.info/fetchmail-SA-2010-02.txt - Patch | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2011:107 - | |
References | () http://www.securityfocus.com/archive/1/511140/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/39556 - |
Information
Published : 2010-05-07 18:24
Updated : 2024-11-21 01:13
NVD link : CVE-2010-1167
Mitre link : CVE-2010-1167
CVE.ORG link : CVE-2010-1167
JSON object : View
Products Affected
fetchmail
- fetchmail
CWE
CWE-20
Improper Input Validation