Show filters
24 Total Results
Displaying 1-10 of 24
Sort by:
Attacker Value
Unknown
CVE-2021-39272
Disclosure Date: August 30, 2021 (last updated February 23, 2025)
Fetchmail before 6.4.22 fails to enforce STARTTLS session encryption in some circumstances, such as a certain situation with IMAP and PREAUTH.
0
Attacker Value
Unknown
CVE-2021-36386
Disclosure Date: July 30, 2021 (last updated February 23, 2025)
report_vbuild in report.c in Fetchmail before 6.4.20 sometimes omits initialization of the vsnprintf va_list argument, which might allow mail servers to cause a denial of service or possibly have unspecified other impact via long error messages. NOTE: it is unclear whether use of Fetchmail on any realistic platform results in an impact beyond an inconvenience to the client user.
0
Attacker Value
Unknown
CVE-2012-3482
Disclosure Date: December 21, 2012 (last updated October 05, 2023)
Fetchmail 5.0.8 through 6.3.21, when using NTLM authentication in debug mode, allows remote NTLM servers to (1) cause a denial of service (crash and delayed delivery of inbound mail) via a crafted NTLM response that triggers an out-of-bounds read in the base64 decoder, or (2) obtain sensitive information from memory via an NTLM Type 2 message with a crafted Target Name structure, which triggers an out-of-bounds read.
0
Attacker Value
Unknown
CVE-2011-1947
Disclosure Date: June 02, 2011 (last updated October 04, 2023)
fetchmail 5.9.9 through 6.3.19 does not properly limit the wait time after issuing a (1) STARTTLS or (2) STLS request, which allows remote servers to cause a denial of service (application hang) by acknowledging the request but not sending additional packets.
0
Attacker Value
Unknown
CVE-2010-1167
Disclosure Date: May 07, 2010 (last updated October 04, 2023)
fetchmail 4.6.3 through 6.3.16, when debug mode is enabled, does not properly handle invalid characters in a multi-character locale, which allows remote attackers to cause a denial of service (memory consumption and application crash) via a crafted (1) message header or (2) POP3 UIDL list.
0
Attacker Value
Unknown
CVE-2010-0562
Disclosure Date: February 08, 2010 (last updated October 04, 2023)
The sdump function in sdump.c in fetchmail 6.3.11, 6.3.12, and 6.3.13, when running in verbose mode on platforms for which char is signed, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an SSL X.509 certificate containing non-printable characters with the high bit set, which triggers a heap-based buffer overflow during escaping.
0
Attacker Value
Unknown
CVE-2009-2666
Disclosure Date: August 07, 2009 (last updated October 04, 2023)
socket.c in fetchmail before 6.3.11 does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
0
Attacker Value
Unknown
CVE-2008-2711
Disclosure Date: June 16, 2008 (last updated October 04, 2023)
fetchmail 6.3.8 and earlier, when running in -v -v (aka verbose) mode, allows remote attackers to cause a denial of service (crash and persistent mail failure) via a malformed mail message with long headers, which triggers an erroneous dereference when using vsnprintf to format log messages.
0
Attacker Value
Unknown
CVE-2007-4565
Disclosure Date: August 28, 2007 (last updated October 04, 2023)
sink.c in fetchmail before 6.3.9 allows context-dependent attackers to cause a denial of service (NULL dereference and application crash) by refusing certain warning messages that are sent over SMTP.
0
Attacker Value
Unknown
CVE-2006-5867
Disclosure Date: December 31, 2006 (last updated October 04, 2023)
fetchmail before 6.3.6-rc4 does not properly enforce TLS and may transmit cleartext passwords over unsecured links if certain circumstances occur, which allows remote attackers to obtain sensitive information via man-in-the-middle (MITM) attacks.
0