CVE-2010-1167

NameCVE-2010-1167
Descriptionfetchmail 4.6.3 through 6.3.16, when debug mode is enabled, does not properly handle invalid characters in a multi-character locale, which allows remote attackers to cause a denial of service (memory consumption and application crash) via a crafted (1) message header or (2) POP3 UIDL list.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
fetchmail (PTS)bullseye6.4.16-4+deb11u1fixed
bookworm6.4.37-1fixed
sid, trixie6.4.39-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
fetchmailsource(unstable)6.3.16-2low

Notes

[lenny] - fetchmail <no-dsa> (only vulnerable when run under debug verbosity level)
http://www.fetchmail.info/fetchmail-SA-2010-02.txt
http://gitorious.org/fetchmail/fetchmail/commit/ec06293

Search for package or bug name: Reporting problems