exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Mandriva Linux Security Advisory 2012-149

Mandriva Linux Security Advisory 2012-149
Posted Sep 1, 2012
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2012-149 - Fetchmail version 6.3.9 enabled all SSL workarounds which contains a switch to disable a countermeasure against certain attacks against block ciphers that permit guessing the initialization vectors, providing that an attacker can make the application encrypt some data for him -- which is not easily the case. A denial of service flaw was found in the way Fetchmail, a remote mail retrieval and forwarding utility, performed base64 decoding of certain NTLM server responses. Upon sending the NTLM authentication request, Fetchmail did not check if the received response was actually part of NTLM protocol exchange, or server-side error message and session abort. A rogue NTML server could use this flaw to cause fetchmail executable crash. This advisory provides the latest version of fetchmail which is not vulnerable to these issues.

tags | advisory, remote, denial of service, protocol
systems | linux, mandriva
advisories | CVE-2011-3389, CVE-2012-3482
SHA-256 | ff6bd28f326c0bdc5a3cd94d56f5a10beddfa815b3ba6d4fe35ecc0b7acf34f4

Mandriva Linux Security Advisory 2012-149

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2012:149
http://www.mandriva.com/security/
_______________________________________________________________________

Package : fetchmail
Date : September 1, 2012
Affected: 2011., Enterprise Server 5.0
_______________________________________________________________________

Problem Description:

Multiple vulnerabilities has been found and corrected in fetchmail:

Fetchmail version 6.3.9 enabled all SSL workarounds (SSL_OP_ALL) which
contains a switch to disable a countermeasure against certain attacks
against block ciphers that permit guessing the initialization vectors,
providing that an attacker can make the application (fetchmail) encrypt
some data for him -- which is not easily the case (aka a BEAST attack)
(CVE-2011-3389).

A denial of service flaw was found in the way Fetchmail, a remote mail
retrieval and forwarding utility, performed base64 decoding of certain
NTLM server responses. Upon sending the NTLM authentication request,
Fetchmail did not check if the received response was actually part
of NTLM protocol exchange, or server-side error message and session
abort. A rogue NTML server could use this flaw to cause fetchmail
executable crash (CVE-2012-3482).

This advisory provides the latest version of fetchmail (6.3.22)
which is not vulnerable to these issues.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3482
http://www.fetchmail.info/fetchmail-SA-2012-01.txt
http://www.fetchmail.info/fetchmail-SA-2012-02.txt
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2011:
70875792da1b3364cc35eafbf803720a 2011/i586/fetchmail-6.3.22-0.1-mdv2011.0.i586.rpm
10a80277160da304e4cd1d1716af8af1 2011/i586/fetchmailconf-6.3.22-0.1-mdv2011.0.i586.rpm
0a06b35a176703c84f59042463c58257 2011/i586/fetchmail-daemon-6.3.22-0.1-mdv2011.0.i586.rpm
908499180e7bd8ce77c5aa0cfb45f5f4 2011/SRPMS/fetchmail-6.3.22-0.1.src.rpm

Mandriva Linux 2011/X86_64:
3fbfd18fd97b80c487d49027a8e866c2 2011/x86_64/fetchmail-6.3.22-0.1-mdv2011.0.x86_64.rpm
dfaaadff76dcb1d559de6bdcba975832 2011/x86_64/fetchmailconf-6.3.22-0.1-mdv2011.0.x86_64.rpm
faac11439dfa603e7999c37ced006ebf 2011/x86_64/fetchmail-daemon-6.3.22-0.1-mdv2011.0.x86_64.rpm
908499180e7bd8ce77c5aa0cfb45f5f4 2011/SRPMS/fetchmail-6.3.22-0.1.src.rpm

Mandriva Enterprise Server 5:
8baa56904b83b49128b49510e78eb5ca mes5/i586/fetchmail-6.3.22-0.1mdvmes5.2.i586.rpm
505d3831e0c319f8869994ee8785df98 mes5/i586/fetchmailconf-6.3.22-0.1mdvmes5.2.i586.rpm
4d494a41525dc93ba0ec0938a9e8c0a1 mes5/i586/fetchmail-daemon-6.3.22-0.1mdvmes5.2.i586.rpm
244ec881f39b978004b3a2c148c4379a mes5/SRPMS/fetchmail-6.3.22-0.1mdvmes5.2.src.rpm

Mandriva Enterprise Server 5/X86_64:
470d43ce1b232f3e1976607a56e22da1 mes5/x86_64/fetchmail-6.3.22-0.1mdvmes5.2.x86_64.rpm
ddf8fb8d0a9543d92803ef20aeb175d1 mes5/x86_64/fetchmailconf-6.3.22-0.1mdvmes5.2.x86_64.rpm
b1bc07da8fe90f923b9353306f4bb9fe mes5/x86_64/fetchmail-daemon-6.3.22-0.1mdvmes5.2.x86_64.rpm
244ec881f39b978004b3a2c148c4379a mes5/SRPMS/fetchmail-6.3.22-0.1mdvmes5.2.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)

iD8DBQFQQeqimqjQ0CJFipgRAkySAJwNo99KpEtoWSIl9p5/yf78f7X5rQCfRKQA
hF1gKQwh51zfuZjJT9ZVMTI=
=7qxZ
-----END PGP SIGNATURE-----


Login or Register to add favorites

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close