Linux Today: Linux News On Internet Time.

More on LinuxToday

Immunix OS Security Advisory: fetchmail

Jun 15, 2001, 13:30 (0 Talkback[s])
Date: Thu, 14 Jun 2001 16:54:35 -0700
From: Immunix Security Team <>
Subject: fetchmail update -- Immunix OS 6.2, 7.0-beta, 7.0

        Immunix OS Security Advisory

Packages updated:       fetchmail
Affected products:      Immunix OS 6.2, 7.0-beta, and 7.0
Bugs fixed:             immunix/1618
Date:                   Wed Jun 13 2001
Advisory ID:            IMNX-2001-70-025-01
Author:                 Seth Arnold <>

  Fetchmail, as shipped with Immunix OS 6.2 and 7.0, contains a buffer
  overflow in the handling of headers. StackGuard will prevent exploits
  from granting privileges; however, denial of service attacks are


  Thanks go to Wolfram Kleff for finding this problem and Henrique de
  Moraes Holschuh for supplying a fix.

Package names and locations:
  Precompiled binary packages for Immunix 6.2 are available at:

  Source packages for Immunix 6.2 are available at:

  Precompiled binary packages for Immunix 7.0-beta and 7.0 are available at:

  Source package for Immunix 7.0-beta and 7.0 is available at:

md5sums of the packages:
  ea10b64694935dd20be38df09924736a  RPMS/fetchmail-5.3.1-2_StackGuard.i386.rpm
  fdebb78fcabdc43a811f9ed546252850  RPMS/fetchmailconf-5.3.1-2_StackGuard.i386.rpm
  eb7af556575d1d0e6e59976aa5b09730  SRPMS/fetchmail-5.3.1-2_StackGuard.src.rpm

  e8169308534f68bc978ed2c1bc0aeeca  RPMS/fetchmail-5.5.0-4_imnx.i386.rpm
  242f4aa0fe21c71f1ddce4cf5c6cb0a0  RPMS/fetchmailconf-5.5.0-4_imnx.i386.rpm
  c8c4069439fe66caf013fea502947ada  SRPMS/fetchmail-5.5.0-4_imnx.src.rpm

GPG verification:                                                          

  Our public key is available at

  *** NOTE *** This key is different from the one used in advisories       

  IMNX-2001-70-020-01 and earlier.

Online version of all Immunix 6.2 updates and advisories:

Online version of all Immunix 7.0-beta updates and advisories:

Online version of all Immunix 7.0 updates and advisories:

  Ibiblio is graciously mirroring our updates, so if the links above are
  slow, please try:
  or one of the many mirrors available at:

Contact information:
  To report vulnerabilities, please contact WireX=20
  attempts to conform to the RFP vulnerability disclosure protocol