TITLE: Debian update for fetchmail SECUNIA ADVISORY ID: SA18433 VERIFY ADVISORY: http://secunia.com/advisories/18433/ CRITICAL: Not critical IMPACT: DoS WHERE: >From remote OPERATING SYSTEM: Debian GNU/Linux 3.1 http://secunia.com/product/5307/ Debian GNU/Linux unstable alias sid http://secunia.com/product/530/ DESCRIPTION: Debian has issued an update for fetchmail. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). For more information: SA17891 SOLUTION: Apply updated packages. -- Debian GNU/Linux 3.1 alias sarge -- Source archives: http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12sarge4.dsc Size/MD5 checksum: 650 da6a5aa9e110932fb67071233c390fa2 http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12sarge4.diff.gz Size/MD5 checksum: 150807 6ccb7da887a4b42997e08ef27fbebf55 http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5.orig.tar.gz Size/MD5 checksum: 1257376 9956b30139edaa4f5f77c4d0dbd80225 Architecture independent components: http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail-ssl_6.2.5-12sarge4_all.deb Size/MD5 checksum: 42234 7f4fae48064a57eae406d72676ab0e54 http://security.debian.org/pool/updates/main/f/fetchmail/fetchmailconf_6.2.5-12sarge4_all.deb Size/MD5 checksum: 101308 1d2a6d40b517a3fc447e2f2d30319fbf Alpha architecture: http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12sarge4_alpha.deb Size/MD5 checksum: 572964 d87d2f1dd059d0aa4854253405c7fdc3 AMD64 architecture: http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12sarge4_amd64.deb Size/MD5 checksum: 555706 9b819cf25859874a1a37585eed8664d6 ARM architecture: http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12sarge4_arm.deb Size/MD5 checksum: 549176 ae3b2abd6c4408c8be07a8a8065cd2ab Intel IA-32 architecture: http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12sarge4_i386.deb Size/MD5 checksum: 547692 3bc3343f756f1fea4bc7b731cc6e2fed Intel IA-64 architecture: http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12sarge4_ia64.deb Size/MD5 checksum: 597004 c1f497a0ac9ba4f04ab31e1ad66ff729 HP Precision architecture: http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12sarge4_hppa.deb Size/MD5 checksum: 561572 cbc31b2ececa0e02ec1a2fa6bc02c019 Motorola 680x0 architecture: http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12sarge4_m68k.deb Size/MD5 checksum: 537914 1ac30118a80e1b516fbdcaf9e53f3264 Big endian MIPS architecture: http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12sarge4_mips.deb Size/MD5 checksum: 556594 6704277ba1a9b9706e6e921ee76e0931 Little endian MIPS architecture: http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12sarge4_mipsel.deb Size/MD5 checksum: 556424 f82021920ac82e2126580a3f594953a1 PowerPC architecture: http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12sarge4_powerpc.deb Size/MD5 checksum: 556180 b72003c6bbec3bfeeeade4bc94b2f7ff IBM S/390 architecture: http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12sarge4_s390.deb Size/MD5 checksum: 554496 90790158afe5fb2f5da3eafdfb6d5874 Sun Sparc architecture: http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12sarge4_sparc.deb Size/MD5 checksum: 549094 d1533c572fe845b7e49e88fb40acf0fb -- Debian GNU/Linux unstable alias sid -- Fixed in version 6.3.1-1. ORIGINAL ADVISORY: http://www.debian.org/security/2006/dsa-939 OTHER REFERENCES: SA17891: http://secunia.com/advisories/17891/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------