User: Password:
|
|
Subscribe / Log in / New account

Mandriva alert MDVSA-2012:149 (fetchmail)

From:  security@mandriva.com
To:  security-announce@mandrivalinux.org
Subject:  [Security Announce] [ MDVSA-2012:149 ] fetchmail
Date:  Sat, 01 Sep 2012 16:11:00 +0200
Message-ID:  <E1T7oPd-0002rw-3p@titan.mandriva.com>
Archive-link:  Article, Thread

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDVSA-2012:149 http://www.mandriva.com/security/ _______________________________________________________________________ Package : fetchmail Date : September 1, 2012 Affected: 2011., Enterprise Server 5.0 _______________________________________________________________________ Problem Description: Multiple vulnerabilities has been found and corrected in fetchmail: Fetchmail version 6.3.9 enabled all SSL workarounds (SSL_OP_ALL) which contains a switch to disable a countermeasure against certain attacks against block ciphers that permit guessing the initialization vectors, providing that an attacker can make the application (fetchmail) encrypt some data for him -- which is not easily the case (aka a BEAST attack) (CVE-2011-3389). A denial of service flaw was found in the way Fetchmail, a remote mail retrieval and forwarding utility, performed base64 decoding of certain NTLM server responses. Upon sending the NTLM authentication request, Fetchmail did not check if the received response was actually part of NTLM protocol exchange, or server-side error message and session abort. A rogue NTML server could use this flaw to cause fetchmail executable crash (CVE-2012-3482). This advisory provides the latest version of fetchmail (6.3.22) which is not vulnerable to these issues. _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3482 http://www.fetchmail.info/fetchmail-SA-2012-01.txt http://www.fetchmail.info/fetchmail-SA-2012-02.txt _______________________________________________________________________ Updated Packages: Mandriva Linux 2011: 70875792da1b3364cc35eafbf803720a 2011/i586/fetchmail-6.3.22-0.1-mdv2011.0.i586.rpm 10a80277160da304e4cd1d1716af8af1 2011/i586/fetchmailconf-6.3.22-0.1-mdv2011.0.i586.rpm 0a06b35a176703c84f59042463c58257 2011/i586/fetchmail-daemon-6.3.22-0.1-mdv2011.0.i586.rpm 908499180e7bd8ce77c5aa0cfb45f5f4 2011/SRPMS/fetchmail-6.3.22-0.1.src.rpm Mandriva Linux 2011/X86_64: 3fbfd18fd97b80c487d49027a8e866c2 2011/x86_64/fetchmail-6.3.22-0.1-mdv2011.0.x86_64.rpm dfaaadff76dcb1d559de6bdcba975832 2011/x86_64/fetchmailconf-6.3.22-0.1-mdv2011.0.x86_64.rpm faac11439dfa603e7999c37ced006ebf 2011/x86_64/fetchmail-daemon-6.3.22-0.1-mdv2011.0.x86_64.rpm 908499180e7bd8ce77c5aa0cfb45f5f4 2011/SRPMS/fetchmail-6.3.22-0.1.src.rpm Mandriva Enterprise Server 5: 8baa56904b83b49128b49510e78eb5ca mes5/i586/fetchmail-6.3.22-0.1mdvmes5.2.i586.rpm 505d3831e0c319f8869994ee8785df98 mes5/i586/fetchmailconf-6.3.22-0.1mdvmes5.2.i586.rpm 4d494a41525dc93ba0ec0938a9e8c0a1 mes5/i586/fetchmail-daemon-6.3.22-0.1mdvmes5.2.i586.rpm 244ec881f39b978004b3a2c148c4379a mes5/SRPMS/fetchmail-6.3.22-0.1mdvmes5.2.src.rpm Mandriva Enterprise Server 5/X86_64: 470d43ce1b232f3e1976607a56e22da1 mes5/x86_64/fetchmail-6.3.22-0.1mdvmes5.2.x86_64.rpm ddf8fb8d0a9543d92803ef20aeb175d1 mes5/x86_64/fetchmailconf-6.3.22-0.1mdvmes5.2.x86_64.rpm b1bc07da8fe90f923b9353306f4bb9fe mes5/x86_64/fetchmail-daemon-6.3.22-0.1mdvmes5.2.x86_64.rpm 244ec881f39b978004b3a2c148c4379a mes5/SRPMS/fetchmail-6.3.22-0.1mdvmes5.2.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team <security*mandriva.com> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux) iD8DBQFQQeqimqjQ0CJFipgRAkySAJwNo99KpEtoWSIl9p5/yf78f7X5rQCfRKQA hF1gKQwh51zfuZjJT9ZVMTI= =7qxZ -----END PGP SIGNATURE----- To unsubscribe, send a email to sympa@mandrivalinux.org with this subject : unsubscribe security-announce _______________________________________________________ Want to buy your Pack or Services from Mandriva? Go to http://www.mandrivastore.com Join the Club : http://www.mandrivaclub.com _______________________________________________________


(Log in to post comments)


Copyright © 2017, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds