August 10, 2001

Debian: fetchmail memory corruption

Author: JT Smith

Posted at LinuxSecurity.com: "Salvatore Sanfilippo found two remotely exploitable problems in
fetchmail while doing a security audit. In both the imap and pop3 code
the input is not verified and used to store a number in an array. Since
no bounds checking is done this can be used by an attacker to write
arbitrary data in memory. An attacker can use this if we can get a user
to transfer mail from a custom imap or pop3 server he controls."

Category:

  • Linux
Click Here!