Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2005-2335 (GCVE-0-2005-2335)
Vulnerability from cvelistv5
- n/a
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T22:22:48.888Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "APPLE-SA-2006-08-01", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html" }, { "name": "14349", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/14349" }, { "name": "SUSE-SR:2005:018", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2005_18_sr.html" }, { "name": "ADV-2006-3101", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/3101" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.redhat.com/archives/fedora-announce-list/2005-July/msg00104.html" }, { "name": "ADV-2005-1171", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2005/1171" }, { "name": "21253", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21253" }, { "name": "19289", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/19289" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://fetchmail.berlios.de/fetchmail-SA-2005-01.txt" }, { "name": "18174", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/18174" }, { "name": "TA06-214A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA06-214A.html" }, { "name": "oval:org.mitre.oval:def:1124", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1124" }, { "name": "FEDORA-2005-613", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://www.redhat.com/archives/fedora-announce-list/2005-July/msg00088.html" }, { "name": "oval:org.mitre.oval:def:1038", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1038" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://developer.berlios.de/project/shownotes.php?release_id=6617" }, { "name": "20060801 DMA[2006-0801a] - \u0027Apple OSX fetchmail buffer overflow\u0027", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/441856/100/200/threaded" }, { "name": "oval:org.mitre.oval:def:8833", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8833" }, { "name": "DSA-774", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2005/dsa-774" }, { "name": "RHSA-2005:640", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-640.html" }, { "name": "FEDORA-2005-614", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://www.redhat.com/archives/fedora-announce-list/2005-July/msg00089.html" }, { "name": "20060526 rPSA-2006-0084-1 fetchmail", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/435197/100/0/threaded" }, { "name": "16176", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/16176" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-07-21T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in the POP3 client in Fetchmail before 6.2.5.2 allows remote POP3 servers to cause a denial of service and possibly execute arbitrary code via long UIDL responses. NOTE: a typo in an advisory accidentally used the wrong CVE identifier for the Fetchmail issue. This is the correct identifier." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-19T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "APPLE-SA-2006-08-01", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html" }, { "name": "14349", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/14349" }, { "name": "SUSE-SR:2005:018", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2005_18_sr.html" }, { "name": "ADV-2006-3101", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/3101" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.redhat.com/archives/fedora-announce-list/2005-July/msg00104.html" }, { "name": "ADV-2005-1171", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2005/1171" }, { "name": "21253", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21253" }, { "name": "19289", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/19289" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://fetchmail.berlios.de/fetchmail-SA-2005-01.txt" }, { "name": "18174", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/18174" }, { "name": "TA06-214A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA06-214A.html" }, { "name": "oval:org.mitre.oval:def:1124", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1124" }, { "name": "FEDORA-2005-613", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://www.redhat.com/archives/fedora-announce-list/2005-July/msg00088.html" }, { "name": "oval:org.mitre.oval:def:1038", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1038" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://developer.berlios.de/project/shownotes.php?release_id=6617" }, { "name": "20060801 DMA[2006-0801a] - \u0027Apple OSX fetchmail buffer overflow\u0027", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/441856/100/200/threaded" }, { "name": "oval:org.mitre.oval:def:8833", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8833" }, { "name": "DSA-774", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2005/dsa-774" }, { "name": "RHSA-2005:640", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-640.html" }, { "name": "FEDORA-2005-614", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://www.redhat.com/archives/fedora-announce-list/2005-July/msg00089.html" }, { "name": "20060526 rPSA-2006-0084-1 fetchmail", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/435197/100/0/threaded" }, { "name": "16176", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/16176" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-2335", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in the POP3 client in Fetchmail before 6.2.5.2 allows remote POP3 servers to cause a denial of service and possibly execute arbitrary code via long UIDL responses. NOTE: a typo in an advisory accidentally used the wrong CVE identifier for the Fetchmail issue. This is the correct identifier." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "APPLE-SA-2006-08-01", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html" }, { "name": "14349", "refsource": "BID", "url": "http://www.securityfocus.com/bid/14349" }, { "name": "SUSE-SR:2005:018", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2005_18_sr.html" }, { "name": "ADV-2006-3101", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/3101" }, { "name": "http://www.redhat.com/archives/fedora-announce-list/2005-July/msg00104.html", "refsource": "MISC", "url": "http://www.redhat.com/archives/fedora-announce-list/2005-July/msg00104.html" }, { "name": "ADV-2005-1171", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2005/1171" }, { "name": "21253", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21253" }, { "name": "19289", "refsource": "BID", "url": "http://www.securityfocus.com/bid/19289" }, { "name": "http://fetchmail.berlios.de/fetchmail-SA-2005-01.txt", "refsource": "CONFIRM", "url": "http://fetchmail.berlios.de/fetchmail-SA-2005-01.txt" }, { "name": "18174", "refsource": "OSVDB", "url": "http://www.osvdb.org/18174" }, { "name": "TA06-214A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA06-214A.html" }, { "name": "oval:org.mitre.oval:def:1124", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1124" }, { "name": "FEDORA-2005-613", "refsource": "FEDORA", "url": "http://www.redhat.com/archives/fedora-announce-list/2005-July/msg00088.html" }, { "name": "oval:org.mitre.oval:def:1038", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1038" }, { "name": "http://developer.berlios.de/project/shownotes.php?release_id=6617", "refsource": "CONFIRM", "url": "http://developer.berlios.de/project/shownotes.php?release_id=6617" }, { "name": "20060801 DMA[2006-0801a] - \u0027Apple OSX fetchmail buffer overflow\u0027", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/441856/100/200/threaded" }, { "name": "oval:org.mitre.oval:def:8833", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8833" }, { "name": "DSA-774", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2005/dsa-774" }, { "name": "RHSA-2005:640", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2005-640.html" }, { "name": "FEDORA-2005-614", "refsource": "FEDORA", "url": "http://www.redhat.com/archives/fedora-announce-list/2005-July/msg00089.html" }, { "name": "20060526 rPSA-2006-0084-1 fetchmail", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/435197/100/0/threaded" }, { "name": "16176", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/16176" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-2335", "datePublished": "2005-07-27T04:00:00", "dateReserved": "2005-07-21T00:00:00", "dateUpdated": "2024-08-07T22:22:48.888Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2005-2335\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2005-07-27T04:00:00.000\",\"lastModified\":\"2025-04-03T01:03:51.193\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Buffer overflow in the POP3 client in Fetchmail before 6.2.5.2 allows remote POP3 servers to cause a denial of service and possibly execute arbitrary code via long UIDL responses. NOTE: a typo in an advisory accidentally used the wrong CVE identifier for the Fetchmail issue. This is the correct identifier.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"6.2.5.1\",\"matchCriteriaId\":\"B61F7795-769B-45F4-A178-5D307C23B5DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:4.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF519D04-7596-42C6-A1D8-FC1018D1A414\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:4.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9AFEC739-BDFA-4D14-9A04-96FFB71AE330\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:4.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1923712-7B88-483E-B38A-0EA6FB38EB38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:4.5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9608A96-D131-401B-B041-09ADEEB59354\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:4.5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4555DBB-B63B-4637-86A9-399B34B27D14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:4.5.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8AB8504-8CD1-4013-9413-1378F3BAE0AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:4.5.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DC47DA9-D110-4E6B-9F5B-D17ECB942B40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:4.5.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"345D0848-958F-4B44-8F31-0793C36A5ADD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:4.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E179061-FB6A-44AA-8EAC-4916719D9A28\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:4.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58A6B5F4-C799-45C4-9EAD-A55023767033\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:4.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54FDB8B9-5537-4E08-8FA0-931D4BED43E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:4.6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7EB9B1D-C6B0-494B-8A8C-752E5659EA1D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:4.6.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC13DE1B-1428-4842-9567-BBE5EEF7042F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:4.6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"215ED879-1E26-4FF4-8857-18499C5DE3A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:4.6.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72604F3D-2DE8-4BFF-97D5-4AFA64399201\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:4.6.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8792F7FF-9E56-4201-89FD-F0146D4F0DF9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:4.6.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B12812E8-1C5B-46CF-A266-EE19C5CD3B12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:4.6.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DEAA0E8-746D-446D-AAEA-0ED287766332\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:4.7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D3E14C3-82AE-4D4A-8963-438BECBA5678\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:4.7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DCFB7BB-2879-4EB7-BE1D-163238E313C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:4.7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6ED223B6-1864-415C-96D6-64E1EDE4C840\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:4.7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"14CBC8ED-CC10-40B6-8AA7-9F1342432ECB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:4.7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3417C2E-1117-4FE7-B2FA-74CAB57235B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:4.7.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07C61DC4-50D5-44B2-92F8-A59C65144108\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:4.7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31A37E19-1E07-4FD0-AC6D-6AC3ED954787\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:4.7.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"570C9443-81CE-42AC-B4A6-3B2ABAD97EC5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"853DD3E0-668F-4FAC-BA0B-D4E9C416D646\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEF70FCA-5DA4-4C0B-B876-0345FA077D44\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF0C4F7C-0003-4C77-AE22-A9C2FCBFAF3B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78D12F53-07DE-447D-8403-40EB75B91955\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19ECB844-F378-4A94-B9FC-A731B8186013\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3169AA63-79F6-4B89-9405-8F6A2FB6FD64\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88D1D54C-81A4-44CE-BE12-798CF7DD2CC4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6615C7D-09B5-4943-A124-2FF9A0F4B927\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF18219F-0406-4D46-90DE-EA2A17C8EFF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87B56DFD-BDA9-4D8B-BE54-BF59B762D574\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33EA0CA8-468F-4A94-8DA3-5D820AB65973\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA21C847-57ED-4E7D-9366-6038467D9080\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0450BD04-15D2-4122-A210-6225B89BDA7F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18428805-AEB2-4BA4-9762-906B59CE74D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFCCBB15-DFFE-4A57-A029-E57707D15E04\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.2.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0427B5C8-265C-47C3-9BAB-B2A0EAA1DEE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.2.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89A4B962-BE5B-471C-83EF-674525C5AE83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7166ECCB-54FB-44EA-BA80-4D2AAF494AF2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B309C89-99E2-4F0B-976C-95E44A45ADC5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3DE7EE7-F627-4955-8D95-1F00F1F85C7D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.3.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D549098D-FE16-4BCB-91C4-D71A8C8D2E9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57BFA165-6E2E-49AF-9E2D-3D8923CF36C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5C67DFF-A1BE-4486-A11F-CD3729927220\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D365E6E-8777-4084-BEC8-7CBF4997D976\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20C4FF28-0DBA-4995-8252-2D62FF896BC4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F80C6B9B-AFCE-46A1-8DEF-51C1B526EB18\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF667DB5-F41E-4E73-A01F-4EC3F60BAD0C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2B144FA-A901-4CDF-AC3D-7F5E820B7A4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96774635-9A12-4DAB-BCF6-2D678F244CE9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.5.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFD2EE7A-36CB-4A26-8EEB-DACA2864D921\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3898EBC-75A9-4DDD-A0AF-2CDEC72DAE4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4267DCE8-985C-416D-A6B7-536585E5A573\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50E63EDF-FF0A-447C-A3FC-7BA2414C15CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61DDD4A1-6185-41B6-A715-4C70F0AA2631\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B10A7E3C-07CD-48A6-9075-5314B4E1EEAB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"319955A4-27A8-46FF-ACE7-97E6DF27B2DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"925CF3DD-682B-40E6-900C-23F784CD9239\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.8.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16366780-611E-4217-A614-EBA01421D148\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.8.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43AEA36F-E730-4305-9CB6-738A7152F02E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.8.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B9536BA-6334-4957-9632-6D64365B88AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.8.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F52FA32B-8048-4FD7-9D20-20DC5E52098B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.8.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FA92DF1-3AAD-46AC-A9E4-E9386C977818\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.8.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"837D66DB-F9CB-41F1-A091-BCFBAC2F45B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.8.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74D12B67-6E66-419A-A28F-6306402931EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.8.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A71FCBED-B25D-48E3-916C-FBA9E0DE8D12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A17995E-DCAF-465A-8ABD-F1EA0D538784\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.9.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93D03D78-C56E-4189-97FC-916C918EDFEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.9.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19A66C77-041F-4A12-8A36-233A6B50641C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.9.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C945059C-EF39-486D-A804-FBB8704AB927\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.9.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1258CA65-FBC1-4848-A9E5-A8F5E5D6FBD5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.9.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A91C6418-41F0-46EB-ACFC-FCE907F5AA87\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.9.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C020534-7596-496C-B9B0-739F58F6F4EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:6.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A77D40C-6FF5-42BD-9EFB-B532824D7606\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:6.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F04C6A76-2718-4DBA-8972-A3EECDDB1A17\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:6.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38ACD96E-5582-4ED0-BBB1-C891094D8217\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:6.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"264386DA-747F-492C-B660-D49BE9DB7139\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:6.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC4066AC-BE10-4189-86F6-BF94443738DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:6.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C25A146-50D5-4BA2-ABA2-20BF8784D7DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:6.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72E76256-997F-4229-9B03-7BC3074F359D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:6.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A717C50-2C5A-4CD1-B2E6-8CDF450940CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:6.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61F908FF-9986-4F71-B0B6-D6A86555EF56\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:6.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"816E9640-A932-4E2F-9793-689F80D2AA89\"}]}]}],\"references\":[{\"url\":\"http://developer.berlios.de/project/shownotes.php?release_id=6617\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://fetchmail.berlios.de/fetchmail-SA-2005-01.txt\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/16176\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/21253\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.debian.org/security/2005/dsa-774\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2005_18_sr.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.osvdb.org/18174\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/archives/fedora-announce-list/2005-July/msg00088.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/archives/fedora-announce-list/2005-July/msg00089.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.redhat.com/archives/fedora-announce-list/2005-July/msg00104.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2005-640.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/435197/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/441856/100/200/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/14349\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.securityfocus.com/bid/19289\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA06-214A.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.vupen.com/english/advisories/2005/1171\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/3101\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1038\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1124\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8833\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://developer.berlios.de/project/shownotes.php?release_id=6617\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://fetchmail.berlios.de/fetchmail-SA-2005-01.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/16176\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/21253\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.debian.org/security/2005/dsa-774\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2005_18_sr.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.osvdb.org/18174\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/archives/fedora-announce-list/2005-July/msg00088.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/archives/fedora-announce-list/2005-July/msg00089.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.redhat.com/archives/fedora-announce-list/2005-July/msg00104.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2005-640.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/435197/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/441856/100/200/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/14349\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.securityfocus.com/bid/19289\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA06-214A.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.vupen.com/english/advisories/2005/1171\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/3101\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1038\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1124\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8833\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
ghsa-64xp-j337-hw4c
Vulnerability from github
Buffer overflow in the POP3 client in Fetchmail before 6.2.5.2 allows remote POP3 servers to cause a denial of service and possibly execute arbitrary code via long UIDL responses. NOTE: a typo in an advisory accidentally used the wrong CVE identifier for the Fetchmail issue. This is the correct identifier.
{ "affected": [], "aliases": [ "CVE-2005-2335" ], "database_specific": { "cwe_ids": [ "CWE-119" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2005-07-27T04:00:00Z", "severity": "MODERATE" }, "details": "Buffer overflow in the POP3 client in Fetchmail before 6.2.5.2 allows remote POP3 servers to cause a denial of service and possibly execute arbitrary code via long UIDL responses. NOTE: a typo in an advisory accidentally used the wrong CVE identifier for the Fetchmail issue. This is the correct identifier.", "id": "GHSA-64xp-j337-hw4c", "modified": "2022-05-01T02:07:21Z", "published": "2022-05-01T02:07:21Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2335" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1038" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1124" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8833" }, { "type": "WEB", "url": "http://developer.berlios.de/project/shownotes.php?release_id=6617" }, { "type": "WEB", "url": "http://fetchmail.berlios.de/fetchmail-SA-2005-01.txt" }, { "type": "WEB", "url": "http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/16176" }, { "type": "WEB", "url": "http://secunia.com/advisories/21253" }, { "type": "WEB", "url": "http://www.debian.org/security/2005/dsa-774" }, { "type": "WEB", "url": "http://www.novell.com/linux/security/advisories/2005_18_sr.html" }, { "type": "WEB", "url": "http://www.osvdb.org/18174" }, { "type": "WEB", "url": "http://www.redhat.com/archives/fedora-announce-list/2005-July/msg00088.html" }, { "type": "WEB", "url": "http://www.redhat.com/archives/fedora-announce-list/2005-July/msg00089.html" }, { "type": "WEB", "url": "http://www.redhat.com/archives/fedora-announce-list/2005-July/msg00104.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2005-640.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/435197/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/441856/100/200/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/14349" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/19289" }, { "type": "WEB", "url": "http://www.us-cert.gov/cas/techalerts/TA06-214A.html" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2005/1171" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2006/3101" } ], "schema_version": "1.4.0", "severity": [] }
gsd-2005-2335
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2005-2335", "description": "Buffer overflow in the POP3 client in Fetchmail before 6.2.5.2 allows remote POP3 servers to cause a denial of service and possibly execute arbitrary code via long UIDL responses. NOTE: a typo in an advisory accidentally used the wrong CVE identifier for the Fetchmail issue. This is the correct identifier.", "id": "GSD-2005-2335", "references": [ "https://www.suse.com/security/cve/CVE-2005-2335.html", "https://www.debian.org/security/2005/dsa-774", "https://access.redhat.com/errata/RHSA-2005:640" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2005-2335" ], "details": "Buffer overflow in the POP3 client in Fetchmail before 6.2.5.2 allows remote POP3 servers to cause a denial of service and possibly execute arbitrary code via long UIDL responses. NOTE: a typo in an advisory accidentally used the wrong CVE identifier for the Fetchmail issue. This is the correct identifier.", "id": "GSD-2005-2335", "modified": "2023-12-13T01:20:10.957316Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-2335", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in the POP3 client in Fetchmail before 6.2.5.2 allows remote POP3 servers to cause a denial of service and possibly execute arbitrary code via long UIDL responses. NOTE: a typo in an advisory accidentally used the wrong CVE identifier for the Fetchmail issue. This is the correct identifier." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "APPLE-SA-2006-08-01", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html" }, { "name": "14349", "refsource": "BID", "url": "http://www.securityfocus.com/bid/14349" }, { "name": "SUSE-SR:2005:018", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2005_18_sr.html" }, { "name": "ADV-2006-3101", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/3101" }, { "name": "http://www.redhat.com/archives/fedora-announce-list/2005-July/msg00104.html", "refsource": "MISC", "url": "http://www.redhat.com/archives/fedora-announce-list/2005-July/msg00104.html" }, { "name": "ADV-2005-1171", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2005/1171" }, { "name": "21253", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21253" }, { "name": "19289", "refsource": "BID", "url": "http://www.securityfocus.com/bid/19289" }, { "name": "http://fetchmail.berlios.de/fetchmail-SA-2005-01.txt", "refsource": "CONFIRM", "url": "http://fetchmail.berlios.de/fetchmail-SA-2005-01.txt" }, { "name": "18174", "refsource": "OSVDB", "url": "http://www.osvdb.org/18174" }, { "name": "TA06-214A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA06-214A.html" }, { "name": "oval:org.mitre.oval:def:1124", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1124" }, { "name": "FEDORA-2005-613", "refsource": "FEDORA", "url": "http://www.redhat.com/archives/fedora-announce-list/2005-July/msg00088.html" }, { "name": "oval:org.mitre.oval:def:1038", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1038" }, { "name": "http://developer.berlios.de/project/shownotes.php?release_id=6617", "refsource": "CONFIRM", "url": "http://developer.berlios.de/project/shownotes.php?release_id=6617" }, { "name": "20060801 DMA[2006-0801a] - \u0027Apple OSX fetchmail buffer overflow\u0027", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/441856/100/200/threaded" }, { "name": "oval:org.mitre.oval:def:8833", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8833" }, { "name": "DSA-774", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2005/dsa-774" }, { "name": "RHSA-2005:640", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2005-640.html" }, { "name": "FEDORA-2005-614", "refsource": "FEDORA", "url": "http://www.redhat.com/archives/fedora-announce-list/2005-July/msg00089.html" }, { "name": "20060526 rPSA-2006-0084-1 fetchmail", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/435197/100/0/threaded" }, { "name": "16176", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/16176" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:6.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.9.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.8.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.8.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.7.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.4.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.4.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.2.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.2.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.0.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.0.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:4.7.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:4.7.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:4.6.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:4.6.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:4.5.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:4.5.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:6.2.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.9.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.9.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.8.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.8.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.5.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.3.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.0.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.0.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:4.7.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:4.7.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:4.6.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:4.6.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:4.5.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:4.5.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.8.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.7.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:6.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.9.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.9.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.8.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.8.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.5.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.5.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.5.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.1.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:4.7.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:4.7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:4.6.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:4.6.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:4.5.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:4.5.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.8.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:6.3.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:4.5.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:6.2.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:6.1.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "6.2.5.1", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:6.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:6.2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:6.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.9.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.8.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.8.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.4.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.2.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.2.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.0.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.0.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:4.7.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:4.7.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:4.6.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:4.6.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:4.6.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:4.6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:4.5.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:6.2.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-2335" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Buffer overflow in the POP3 client in Fetchmail before 6.2.5.2 allows remote POP3 servers to cause a denial of service and possibly execute arbitrary code via long UIDL responses. NOTE: a typo in an advisory accidentally used the wrong CVE identifier for the Fetchmail issue. This is the correct identifier." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-119" } ] } ] }, "references": { "reference_data": [ { "name": "http://fetchmail.berlios.de/fetchmail-SA-2005-01.txt", "refsource": "CONFIRM", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://fetchmail.berlios.de/fetchmail-SA-2005-01.txt" }, { "name": "http://developer.berlios.de/project/shownotes.php?release_id=6617", "refsource": "CONFIRM", "tags": [ "Patch" ], "url": "http://developer.berlios.de/project/shownotes.php?release_id=6617" }, { "name": "FEDORA-2005-613", "refsource": "FEDORA", "tags": [], "url": "http://www.redhat.com/archives/fedora-announce-list/2005-July/msg00088.html" }, { "name": "FEDORA-2005-614", "refsource": "FEDORA", "tags": [ "Patch" ], "url": "http://www.redhat.com/archives/fedora-announce-list/2005-July/msg00089.html" }, { "name": "http://www.redhat.com/archives/fedora-announce-list/2005-July/msg00104.html", "refsource": "MISC", "tags": [], "url": "http://www.redhat.com/archives/fedora-announce-list/2005-July/msg00104.html" }, { "name": "14349", "refsource": "BID", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/14349" }, { "name": "16176", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/16176" }, { "name": "18174", "refsource": "OSVDB", "tags": [], "url": "http://www.osvdb.org/18174" }, { "name": "DSA-774", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2005/dsa-774" }, { "name": "RHSA-2005:640", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-640.html" }, { "name": "SUSE-SR:2005:018", "refsource": "SUSE", "tags": [], "url": "http://www.novell.com/linux/security/advisories/2005_18_sr.html" }, { "name": "APPLE-SA-2006-08-01", "refsource": "APPLE", "tags": [], "url": "http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html" }, { "name": "21253", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21253" }, { "name": "19289", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/19289" }, { "name": "TA06-214A", "refsource": "CERT", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA06-214A.html" }, { "name": "ADV-2005-1171", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2005/1171" }, { "name": "ADV-2006-3101", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2006/3101" }, { "name": "oval:org.mitre.oval:def:8833", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8833" }, { "name": "oval:org.mitre.oval:def:1124", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1124" }, { "name": "oval:org.mitre.oval:def:1038", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1038" }, { "name": "20060801 DMA[2006-0801a] - \u0027Apple OSX fetchmail buffer overflow\u0027", "refsource": "BUGTRAQ", "tags": [], "url": "http://www.securityfocus.com/archive/1/441856/100/200/threaded" }, { "name": "20060526 rPSA-2006-0084-1 fetchmail", "refsource": "BUGTRAQ", "tags": [], "url": "http://www.securityfocus.com/archive/1/435197/100/0/threaded" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false } }, "lastModifiedDate": "2018-10-19T15:32Z", "publishedDate": "2005-07-27T04:00Z" } } }
rhsa-2005:640
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated fetchmail packages that fix a security flaw are now available.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "Fetchmail is a remote mail retrieval and forwarding utility.\n\nA buffer overflow was discovered in fetchmail\u0027s POP3 client. A malicious\nserver could cause send a carefully crafted message UID and cause fetchmail\nto crash or potentially execute arbitrary code as the user running\nfetchmail. The Common Vulnerabilities and Exposures project assigned the\nname CAN-2005-2335 to this issue.\n\nUsers of fetchmail should update to this erratum package which contains a\nbackported patch to correct this issue.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2005:640", "url": "https://access.redhat.com/errata/RHSA-2005:640" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "163816", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=163816" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2005/rhsa-2005_640.json" } ], "title": "Red Hat Security Advisory: fetchmail security update", "tracking": { "current_release_date": "2025-10-09T12:43:10+00:00", "generator": { "date": "2025-10-09T12:43:10+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.9" } }, "id": "RHSA-2005:640", "initial_release_date": "2005-07-25T07:50:00+00:00", "revision_history": [ { "date": "2005-07-25T07:50:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2005-07-25T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-10-09T12:43:10+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 3", "product": { "name": "Red Hat Enterprise Linux AS version 3", "product_id": "3AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::as" } } }, { "category": "product_name", "name": "Red Hat Desktop version 3", "product": { "name": "Red Hat Desktop version 3", "product_id": "3Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 3", "product": { "name": "Red Hat Enterprise Linux ES version 3", "product_id": "3ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 3", "product": { "name": "Red Hat Enterprise Linux WS version 3", "product_id": "3WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::ws" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.ia64", "product": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.ia64", "product_id": "fetchmail-debuginfo-0:6.2.0-3.el3.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.0-3.el3.2?arch=ia64" } } }, { "category": "product_version", "name": "fetchmail-0:6.2.0-3.el3.2.ia64", "product": { "name": "fetchmail-0:6.2.0-3.el3.2.ia64", "product_id": "fetchmail-0:6.2.0-3.el3.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@6.2.0-3.el3.2?arch=ia64" } } }, { "category": "product_version", "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.ia64", "product": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.ia64", "product_id": "fetchmail-debuginfo-0:6.2.5-6.el4.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.5-6.el4.2?arch=ia64" } } }, { "category": "product_version", "name": "fetchmail-0:6.2.5-6.el4.2.ia64", "product": { "name": "fetchmail-0:6.2.5-6.el4.2.ia64", "product_id": "fetchmail-0:6.2.5-6.el4.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@6.2.5-6.el4.2?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.x86_64", "product": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.x86_64", "product_id": "fetchmail-debuginfo-0:6.2.0-3.el3.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.0-3.el3.2?arch=x86_64" } } }, { "category": "product_version", "name": "fetchmail-0:6.2.0-3.el3.2.x86_64", "product": { "name": "fetchmail-0:6.2.0-3.el3.2.x86_64", "product_id": "fetchmail-0:6.2.0-3.el3.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@6.2.0-3.el3.2?arch=x86_64" } } }, { "category": "product_version", "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.x86_64", "product": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.x86_64", "product_id": "fetchmail-debuginfo-0:6.2.5-6.el4.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.5-6.el4.2?arch=x86_64" } } }, { "category": "product_version", "name": "fetchmail-0:6.2.5-6.el4.2.x86_64", "product": { "name": "fetchmail-0:6.2.5-6.el4.2.x86_64", "product_id": "fetchmail-0:6.2.5-6.el4.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@6.2.5-6.el4.2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.i386", "product": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.i386", "product_id": "fetchmail-debuginfo-0:6.2.0-3.el3.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.0-3.el3.2?arch=i386" } } }, { "category": "product_version", "name": "fetchmail-0:6.2.0-3.el3.2.i386", "product": { "name": "fetchmail-0:6.2.0-3.el3.2.i386", "product_id": "fetchmail-0:6.2.0-3.el3.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@6.2.0-3.el3.2?arch=i386" } } }, { "category": "product_version", "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.i386", "product": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.i386", "product_id": "fetchmail-debuginfo-0:6.2.5-6.el4.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.5-6.el4.2?arch=i386" } } }, { "category": "product_version", "name": "fetchmail-0:6.2.5-6.el4.2.i386", "product": { "name": "fetchmail-0:6.2.5-6.el4.2.i386", "product_id": "fetchmail-0:6.2.5-6.el4.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@6.2.5-6.el4.2?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "fetchmail-0:6.2.0-3.el3.2.src", "product": { "name": "fetchmail-0:6.2.0-3.el3.2.src", "product_id": "fetchmail-0:6.2.0-3.el3.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@6.2.0-3.el3.2?arch=src" } } }, { "category": "product_version", "name": "fetchmail-0:6.2.5-6.el4.2.src", "product": { "name": "fetchmail-0:6.2.5-6.el4.2.src", "product_id": "fetchmail-0:6.2.5-6.el4.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@6.2.5-6.el4.2?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.ppc", "product": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.ppc", "product_id": "fetchmail-debuginfo-0:6.2.0-3.el3.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.0-3.el3.2?arch=ppc" } } }, { "category": "product_version", "name": "fetchmail-0:6.2.0-3.el3.2.ppc", "product": { "name": "fetchmail-0:6.2.0-3.el3.2.ppc", "product_id": "fetchmail-0:6.2.0-3.el3.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@6.2.0-3.el3.2?arch=ppc" } } }, { "category": "product_version", "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.ppc", "product": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.ppc", "product_id": "fetchmail-debuginfo-0:6.2.5-6.el4.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.5-6.el4.2?arch=ppc" } } }, { "category": "product_version", "name": "fetchmail-0:6.2.5-6.el4.2.ppc", "product": { "name": "fetchmail-0:6.2.5-6.el4.2.ppc", "product_id": "fetchmail-0:6.2.5-6.el4.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@6.2.5-6.el4.2?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.s390x", "product": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.s390x", "product_id": "fetchmail-debuginfo-0:6.2.0-3.el3.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.0-3.el3.2?arch=s390x" } } }, { "category": "product_version", "name": "fetchmail-0:6.2.0-3.el3.2.s390x", "product": { "name": "fetchmail-0:6.2.0-3.el3.2.s390x", "product_id": "fetchmail-0:6.2.0-3.el3.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@6.2.0-3.el3.2?arch=s390x" } } }, { "category": "product_version", "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.s390x", "product": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.s390x", "product_id": "fetchmail-debuginfo-0:6.2.5-6.el4.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.5-6.el4.2?arch=s390x" } } }, { "category": "product_version", "name": "fetchmail-0:6.2.5-6.el4.2.s390x", "product": { "name": "fetchmail-0:6.2.5-6.el4.2.s390x", "product_id": "fetchmail-0:6.2.5-6.el4.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@6.2.5-6.el4.2?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.s390", "product": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.s390", "product_id": "fetchmail-debuginfo-0:6.2.0-3.el3.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.0-3.el3.2?arch=s390" } } }, { "category": "product_version", "name": "fetchmail-0:6.2.0-3.el3.2.s390", "product": { "name": "fetchmail-0:6.2.0-3.el3.2.s390", "product_id": "fetchmail-0:6.2.0-3.el3.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@6.2.0-3.el3.2?arch=s390" } } }, { "category": "product_version", "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.s390", "product": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.s390", "product_id": "fetchmail-debuginfo-0:6.2.5-6.el4.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.5-6.el4.2?arch=s390" } } }, { "category": "product_version", "name": "fetchmail-0:6.2.5-6.el4.2.s390", "product": { "name": "fetchmail-0:6.2.5-6.el4.2.s390", "product_id": "fetchmail-0:6.2.5-6.el4.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@6.2.5-6.el4.2?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.2.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:fetchmail-0:6.2.0-3.el3.2.i386" }, "product_reference": "fetchmail-0:6.2.0-3.el3.2.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.2.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:fetchmail-0:6.2.0-3.el3.2.ia64" }, "product_reference": "fetchmail-0:6.2.0-3.el3.2.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.2.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:fetchmail-0:6.2.0-3.el3.2.ppc" }, "product_reference": "fetchmail-0:6.2.0-3.el3.2.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.2.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:fetchmail-0:6.2.0-3.el3.2.s390" }, "product_reference": "fetchmail-0:6.2.0-3.el3.2.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.2.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:fetchmail-0:6.2.0-3.el3.2.s390x" }, "product_reference": "fetchmail-0:6.2.0-3.el3.2.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.2.src as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:fetchmail-0:6.2.0-3.el3.2.src" }, "product_reference": "fetchmail-0:6.2.0-3.el3.2.src", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.2.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:fetchmail-0:6.2.0-3.el3.2.x86_64" }, "product_reference": "fetchmail-0:6.2.0-3.el3.2.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.2.i386" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.2.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.2.ia64" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.2.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.2.ppc" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.2.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.2.s390" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.2.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.2.s390x" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.2.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.2.x86_64" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.2.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.2.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:fetchmail-0:6.2.0-3.el3.2.i386" }, "product_reference": "fetchmail-0:6.2.0-3.el3.2.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.2.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:fetchmail-0:6.2.0-3.el3.2.ia64" }, "product_reference": "fetchmail-0:6.2.0-3.el3.2.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.2.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:fetchmail-0:6.2.0-3.el3.2.ppc" }, "product_reference": "fetchmail-0:6.2.0-3.el3.2.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.2.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:fetchmail-0:6.2.0-3.el3.2.s390" }, "product_reference": "fetchmail-0:6.2.0-3.el3.2.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.2.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:fetchmail-0:6.2.0-3.el3.2.s390x" }, "product_reference": "fetchmail-0:6.2.0-3.el3.2.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.2.src as a component of Red Hat Desktop version 3", "product_id": "3Desktop:fetchmail-0:6.2.0-3.el3.2.src" }, "product_reference": "fetchmail-0:6.2.0-3.el3.2.src", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.2.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:fetchmail-0:6.2.0-3.el3.2.x86_64" }, "product_reference": "fetchmail-0:6.2.0-3.el3.2.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.2.i386" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.2.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.2.ia64" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.2.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.2.ppc" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.2.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.2.s390" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.2.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.2.s390x" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.2.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.2.x86_64" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.2.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.2.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:fetchmail-0:6.2.0-3.el3.2.i386" }, "product_reference": "fetchmail-0:6.2.0-3.el3.2.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.2.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:fetchmail-0:6.2.0-3.el3.2.ia64" }, "product_reference": "fetchmail-0:6.2.0-3.el3.2.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.2.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:fetchmail-0:6.2.0-3.el3.2.ppc" }, "product_reference": "fetchmail-0:6.2.0-3.el3.2.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.2.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:fetchmail-0:6.2.0-3.el3.2.s390" }, "product_reference": "fetchmail-0:6.2.0-3.el3.2.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.2.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:fetchmail-0:6.2.0-3.el3.2.s390x" }, "product_reference": "fetchmail-0:6.2.0-3.el3.2.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.2.src as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:fetchmail-0:6.2.0-3.el3.2.src" }, "product_reference": "fetchmail-0:6.2.0-3.el3.2.src", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.2.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:fetchmail-0:6.2.0-3.el3.2.x86_64" }, "product_reference": "fetchmail-0:6.2.0-3.el3.2.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.2.i386" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.2.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.2.ia64" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.2.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.2.ppc" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.2.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.2.s390" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.2.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.2.s390x" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.2.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.2.x86_64" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.2.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.2.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:fetchmail-0:6.2.0-3.el3.2.i386" }, "product_reference": "fetchmail-0:6.2.0-3.el3.2.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.2.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:fetchmail-0:6.2.0-3.el3.2.ia64" }, "product_reference": "fetchmail-0:6.2.0-3.el3.2.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.2.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:fetchmail-0:6.2.0-3.el3.2.ppc" }, "product_reference": "fetchmail-0:6.2.0-3.el3.2.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.2.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:fetchmail-0:6.2.0-3.el3.2.s390" }, "product_reference": "fetchmail-0:6.2.0-3.el3.2.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.2.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:fetchmail-0:6.2.0-3.el3.2.s390x" }, "product_reference": "fetchmail-0:6.2.0-3.el3.2.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.2.src as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:fetchmail-0:6.2.0-3.el3.2.src" }, "product_reference": "fetchmail-0:6.2.0-3.el3.2.src", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.2.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:fetchmail-0:6.2.0-3.el3.2.x86_64" }, "product_reference": "fetchmail-0:6.2.0-3.el3.2.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.2.i386" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.2.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.2.ia64" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.2.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.2.ppc" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.2.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.2.s390" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.2.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.2.s390x" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.2.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.2.x86_64" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.2.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.2.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:fetchmail-0:6.2.5-6.el4.2.i386" }, "product_reference": "fetchmail-0:6.2.5-6.el4.2.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.2.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:fetchmail-0:6.2.5-6.el4.2.ia64" }, "product_reference": "fetchmail-0:6.2.5-6.el4.2.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.2.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:fetchmail-0:6.2.5-6.el4.2.ppc" }, "product_reference": "fetchmail-0:6.2.5-6.el4.2.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.2.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:fetchmail-0:6.2.5-6.el4.2.s390" }, "product_reference": "fetchmail-0:6.2.5-6.el4.2.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.2.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:fetchmail-0:6.2.5-6.el4.2.s390x" }, "product_reference": "fetchmail-0:6.2.5-6.el4.2.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.2.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:fetchmail-0:6.2.5-6.el4.2.src" }, "product_reference": "fetchmail-0:6.2.5-6.el4.2.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.2.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:fetchmail-0:6.2.5-6.el4.2.x86_64" }, "product_reference": "fetchmail-0:6.2.5-6.el4.2.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.2.i386" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.2.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.2.ia64" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.2.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.2.ppc" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.2.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.2.s390" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.2.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.2.s390x" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.2.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.2.x86_64" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.2.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.2.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:fetchmail-0:6.2.5-6.el4.2.i386" }, "product_reference": "fetchmail-0:6.2.5-6.el4.2.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.2.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:fetchmail-0:6.2.5-6.el4.2.ia64" }, "product_reference": "fetchmail-0:6.2.5-6.el4.2.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.2.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:fetchmail-0:6.2.5-6.el4.2.ppc" }, "product_reference": "fetchmail-0:6.2.5-6.el4.2.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.2.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:fetchmail-0:6.2.5-6.el4.2.s390" }, "product_reference": "fetchmail-0:6.2.5-6.el4.2.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.2.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:fetchmail-0:6.2.5-6.el4.2.s390x" }, "product_reference": "fetchmail-0:6.2.5-6.el4.2.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.2.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:fetchmail-0:6.2.5-6.el4.2.src" }, "product_reference": "fetchmail-0:6.2.5-6.el4.2.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.2.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:fetchmail-0:6.2.5-6.el4.2.x86_64" }, "product_reference": "fetchmail-0:6.2.5-6.el4.2.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.2.i386" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.2.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.2.ia64" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.2.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.2.ppc" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.2.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.2.s390" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.2.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.2.s390x" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.2.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.2.x86_64" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.2.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.2.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:fetchmail-0:6.2.5-6.el4.2.i386" }, "product_reference": "fetchmail-0:6.2.5-6.el4.2.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.2.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:fetchmail-0:6.2.5-6.el4.2.ia64" }, "product_reference": "fetchmail-0:6.2.5-6.el4.2.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.2.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:fetchmail-0:6.2.5-6.el4.2.ppc" }, "product_reference": "fetchmail-0:6.2.5-6.el4.2.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.2.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:fetchmail-0:6.2.5-6.el4.2.s390" }, "product_reference": "fetchmail-0:6.2.5-6.el4.2.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.2.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:fetchmail-0:6.2.5-6.el4.2.s390x" }, "product_reference": "fetchmail-0:6.2.5-6.el4.2.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.2.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:fetchmail-0:6.2.5-6.el4.2.src" }, "product_reference": "fetchmail-0:6.2.5-6.el4.2.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.2.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:fetchmail-0:6.2.5-6.el4.2.x86_64" }, "product_reference": "fetchmail-0:6.2.5-6.el4.2.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.2.i386" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.2.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.2.ia64" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.2.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.2.ppc" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.2.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.2.s390" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.2.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.2.s390x" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.2.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.2.x86_64" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.2.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.2.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:fetchmail-0:6.2.5-6.el4.2.i386" }, "product_reference": "fetchmail-0:6.2.5-6.el4.2.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.2.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:fetchmail-0:6.2.5-6.el4.2.ia64" }, "product_reference": "fetchmail-0:6.2.5-6.el4.2.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.2.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:fetchmail-0:6.2.5-6.el4.2.ppc" }, "product_reference": "fetchmail-0:6.2.5-6.el4.2.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.2.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:fetchmail-0:6.2.5-6.el4.2.s390" }, "product_reference": "fetchmail-0:6.2.5-6.el4.2.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.2.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:fetchmail-0:6.2.5-6.el4.2.s390x" }, "product_reference": "fetchmail-0:6.2.5-6.el4.2.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.2.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:fetchmail-0:6.2.5-6.el4.2.src" }, "product_reference": "fetchmail-0:6.2.5-6.el4.2.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.2.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:fetchmail-0:6.2.5-6.el4.2.x86_64" }, "product_reference": "fetchmail-0:6.2.5-6.el4.2.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.2.i386" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.2.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.2.ia64" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.2.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.2.ppc" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.2.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.2.s390" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.2.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.2.s390x" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.2.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.2.x86_64" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.2.x86_64", "relates_to_product_reference": "4WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2005-2335", "discovery_date": "2005-07-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617705" } ], "notes": [ { "category": "description", "text": "Buffer overflow in the POP3 client in Fetchmail before 6.2.5.2 allows remote POP3 servers to cause a denial of service and possibly execute arbitrary code via long UIDL responses. NOTE: a typo in an advisory accidentally used the wrong CVE identifier for the Fetchmail issue. This is the correct identifier.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:fetchmail-0:6.2.0-3.el3.2.i386", "3AS:fetchmail-0:6.2.0-3.el3.2.ia64", "3AS:fetchmail-0:6.2.0-3.el3.2.ppc", "3AS:fetchmail-0:6.2.0-3.el3.2.s390", "3AS:fetchmail-0:6.2.0-3.el3.2.s390x", "3AS:fetchmail-0:6.2.0-3.el3.2.src", "3AS:fetchmail-0:6.2.0-3.el3.2.x86_64", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.2.i386", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.2.ia64", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.2.ppc", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.2.s390", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.2.s390x", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.2.x86_64", "3Desktop:fetchmail-0:6.2.0-3.el3.2.i386", "3Desktop:fetchmail-0:6.2.0-3.el3.2.ia64", "3Desktop:fetchmail-0:6.2.0-3.el3.2.ppc", "3Desktop:fetchmail-0:6.2.0-3.el3.2.s390", "3Desktop:fetchmail-0:6.2.0-3.el3.2.s390x", "3Desktop:fetchmail-0:6.2.0-3.el3.2.src", "3Desktop:fetchmail-0:6.2.0-3.el3.2.x86_64", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.2.i386", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.2.ia64", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.2.ppc", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.2.s390", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.2.s390x", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.2.x86_64", "3ES:fetchmail-0:6.2.0-3.el3.2.i386", "3ES:fetchmail-0:6.2.0-3.el3.2.ia64", "3ES:fetchmail-0:6.2.0-3.el3.2.ppc", "3ES:fetchmail-0:6.2.0-3.el3.2.s390", "3ES:fetchmail-0:6.2.0-3.el3.2.s390x", "3ES:fetchmail-0:6.2.0-3.el3.2.src", "3ES:fetchmail-0:6.2.0-3.el3.2.x86_64", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.2.i386", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.2.ia64", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.2.ppc", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.2.s390", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.2.s390x", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.2.x86_64", "3WS:fetchmail-0:6.2.0-3.el3.2.i386", "3WS:fetchmail-0:6.2.0-3.el3.2.ia64", "3WS:fetchmail-0:6.2.0-3.el3.2.ppc", "3WS:fetchmail-0:6.2.0-3.el3.2.s390", "3WS:fetchmail-0:6.2.0-3.el3.2.s390x", "3WS:fetchmail-0:6.2.0-3.el3.2.src", "3WS:fetchmail-0:6.2.0-3.el3.2.x86_64", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.2.i386", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.2.ia64", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.2.ppc", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.2.s390", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.2.s390x", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.2.x86_64", "4AS:fetchmail-0:6.2.5-6.el4.2.i386", "4AS:fetchmail-0:6.2.5-6.el4.2.ia64", "4AS:fetchmail-0:6.2.5-6.el4.2.ppc", "4AS:fetchmail-0:6.2.5-6.el4.2.s390", "4AS:fetchmail-0:6.2.5-6.el4.2.s390x", "4AS:fetchmail-0:6.2.5-6.el4.2.src", "4AS:fetchmail-0:6.2.5-6.el4.2.x86_64", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.2.i386", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.2.ia64", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.2.ppc", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.2.s390", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.2.s390x", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.2.x86_64", "4Desktop:fetchmail-0:6.2.5-6.el4.2.i386", "4Desktop:fetchmail-0:6.2.5-6.el4.2.ia64", "4Desktop:fetchmail-0:6.2.5-6.el4.2.ppc", "4Desktop:fetchmail-0:6.2.5-6.el4.2.s390", "4Desktop:fetchmail-0:6.2.5-6.el4.2.s390x", "4Desktop:fetchmail-0:6.2.5-6.el4.2.src", "4Desktop:fetchmail-0:6.2.5-6.el4.2.x86_64", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.2.i386", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.2.ia64", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.2.ppc", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.2.s390", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.2.s390x", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.2.x86_64", "4ES:fetchmail-0:6.2.5-6.el4.2.i386", "4ES:fetchmail-0:6.2.5-6.el4.2.ia64", "4ES:fetchmail-0:6.2.5-6.el4.2.ppc", "4ES:fetchmail-0:6.2.5-6.el4.2.s390", "4ES:fetchmail-0:6.2.5-6.el4.2.s390x", "4ES:fetchmail-0:6.2.5-6.el4.2.src", "4ES:fetchmail-0:6.2.5-6.el4.2.x86_64", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.2.i386", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.2.ia64", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.2.ppc", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.2.s390", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.2.s390x", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.2.x86_64", "4WS:fetchmail-0:6.2.5-6.el4.2.i386", "4WS:fetchmail-0:6.2.5-6.el4.2.ia64", "4WS:fetchmail-0:6.2.5-6.el4.2.ppc", "4WS:fetchmail-0:6.2.5-6.el4.2.s390", "4WS:fetchmail-0:6.2.5-6.el4.2.s390x", "4WS:fetchmail-0:6.2.5-6.el4.2.src", "4WS:fetchmail-0:6.2.5-6.el4.2.x86_64", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.2.i386", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.2.ia64", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.2.ppc", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.2.s390", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.2.s390x", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-2335" }, { "category": "external", "summary": "RHBZ#1617705", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617705" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-2335", "url": "https://www.cve.org/CVERecord?id=CVE-2005-2335" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2335", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2335" } ], "release_date": "2005-07-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-07-25T07:50:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS:fetchmail-0:6.2.0-3.el3.2.i386", "3AS:fetchmail-0:6.2.0-3.el3.2.ia64", "3AS:fetchmail-0:6.2.0-3.el3.2.ppc", "3AS:fetchmail-0:6.2.0-3.el3.2.s390", "3AS:fetchmail-0:6.2.0-3.el3.2.s390x", "3AS:fetchmail-0:6.2.0-3.el3.2.src", "3AS:fetchmail-0:6.2.0-3.el3.2.x86_64", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.2.i386", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.2.ia64", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.2.ppc", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.2.s390", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.2.s390x", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.2.x86_64", "3Desktop:fetchmail-0:6.2.0-3.el3.2.i386", "3Desktop:fetchmail-0:6.2.0-3.el3.2.ia64", "3Desktop:fetchmail-0:6.2.0-3.el3.2.ppc", "3Desktop:fetchmail-0:6.2.0-3.el3.2.s390", "3Desktop:fetchmail-0:6.2.0-3.el3.2.s390x", "3Desktop:fetchmail-0:6.2.0-3.el3.2.src", "3Desktop:fetchmail-0:6.2.0-3.el3.2.x86_64", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.2.i386", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.2.ia64", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.2.ppc", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.2.s390", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.2.s390x", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.2.x86_64", "3ES:fetchmail-0:6.2.0-3.el3.2.i386", "3ES:fetchmail-0:6.2.0-3.el3.2.ia64", "3ES:fetchmail-0:6.2.0-3.el3.2.ppc", "3ES:fetchmail-0:6.2.0-3.el3.2.s390", "3ES:fetchmail-0:6.2.0-3.el3.2.s390x", "3ES:fetchmail-0:6.2.0-3.el3.2.src", "3ES:fetchmail-0:6.2.0-3.el3.2.x86_64", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.2.i386", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.2.ia64", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.2.ppc", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.2.s390", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.2.s390x", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.2.x86_64", "3WS:fetchmail-0:6.2.0-3.el3.2.i386", "3WS:fetchmail-0:6.2.0-3.el3.2.ia64", "3WS:fetchmail-0:6.2.0-3.el3.2.ppc", "3WS:fetchmail-0:6.2.0-3.el3.2.s390", "3WS:fetchmail-0:6.2.0-3.el3.2.s390x", "3WS:fetchmail-0:6.2.0-3.el3.2.src", "3WS:fetchmail-0:6.2.0-3.el3.2.x86_64", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.2.i386", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.2.ia64", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.2.ppc", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.2.s390", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.2.s390x", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.2.x86_64", "4AS:fetchmail-0:6.2.5-6.el4.2.i386", "4AS:fetchmail-0:6.2.5-6.el4.2.ia64", "4AS:fetchmail-0:6.2.5-6.el4.2.ppc", "4AS:fetchmail-0:6.2.5-6.el4.2.s390", "4AS:fetchmail-0:6.2.5-6.el4.2.s390x", "4AS:fetchmail-0:6.2.5-6.el4.2.src", "4AS:fetchmail-0:6.2.5-6.el4.2.x86_64", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.2.i386", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.2.ia64", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.2.ppc", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.2.s390", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.2.s390x", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.2.x86_64", "4Desktop:fetchmail-0:6.2.5-6.el4.2.i386", "4Desktop:fetchmail-0:6.2.5-6.el4.2.ia64", "4Desktop:fetchmail-0:6.2.5-6.el4.2.ppc", "4Desktop:fetchmail-0:6.2.5-6.el4.2.s390", "4Desktop:fetchmail-0:6.2.5-6.el4.2.s390x", "4Desktop:fetchmail-0:6.2.5-6.el4.2.src", "4Desktop:fetchmail-0:6.2.5-6.el4.2.x86_64", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.2.i386", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.2.ia64", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.2.ppc", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.2.s390", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.2.s390x", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.2.x86_64", "4ES:fetchmail-0:6.2.5-6.el4.2.i386", "4ES:fetchmail-0:6.2.5-6.el4.2.ia64", "4ES:fetchmail-0:6.2.5-6.el4.2.ppc", "4ES:fetchmail-0:6.2.5-6.el4.2.s390", "4ES:fetchmail-0:6.2.5-6.el4.2.s390x", "4ES:fetchmail-0:6.2.5-6.el4.2.src", "4ES:fetchmail-0:6.2.5-6.el4.2.x86_64", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.2.i386", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.2.ia64", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.2.ppc", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.2.s390", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.2.s390x", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.2.x86_64", "4WS:fetchmail-0:6.2.5-6.el4.2.i386", "4WS:fetchmail-0:6.2.5-6.el4.2.ia64", "4WS:fetchmail-0:6.2.5-6.el4.2.ppc", "4WS:fetchmail-0:6.2.5-6.el4.2.s390", "4WS:fetchmail-0:6.2.5-6.el4.2.s390x", "4WS:fetchmail-0:6.2.5-6.el4.2.src", "4WS:fetchmail-0:6.2.5-6.el4.2.x86_64", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.2.i386", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.2.ia64", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.2.ppc", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.2.s390", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.2.s390x", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:640" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" } ] }
rhsa-2005_640
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated fetchmail packages that fix a security flaw are now available.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "Fetchmail is a remote mail retrieval and forwarding utility.\n\nA buffer overflow was discovered in fetchmail\u0027s POP3 client. A malicious\nserver could cause send a carefully crafted message UID and cause fetchmail\nto crash or potentially execute arbitrary code as the user running\nfetchmail. The Common Vulnerabilities and Exposures project assigned the\nname CAN-2005-2335 to this issue.\n\nUsers of fetchmail should update to this erratum package which contains a\nbackported patch to correct this issue.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2005:640", "url": "https://access.redhat.com/errata/RHSA-2005:640" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "163816", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=163816" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2005/rhsa-2005_640.json" } ], "title": "Red Hat Security Advisory: fetchmail security update", "tracking": { "current_release_date": "2024-11-21T23:55:59+00:00", "generator": { "date": "2024-11-21T23:55:59+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2005:640", "initial_release_date": "2005-07-25T07:50:00+00:00", "revision_history": [ { "date": "2005-07-25T07:50:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2005-07-25T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-21T23:55:59+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 3", "product": { "name": "Red Hat Enterprise Linux AS version 3", "product_id": "3AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::as" } } }, { "category": "product_name", "name": "Red Hat Desktop version 3", "product": { "name": "Red Hat Desktop version 3", "product_id": "3Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 3", "product": { "name": "Red Hat Enterprise Linux ES version 3", "product_id": "3ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 3", "product": { "name": "Red Hat Enterprise Linux WS version 3", "product_id": "3WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::ws" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.ia64", "product": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.ia64", "product_id": "fetchmail-debuginfo-0:6.2.0-3.el3.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.0-3.el3.2?arch=ia64" } } }, { "category": "product_version", "name": "fetchmail-0:6.2.0-3.el3.2.ia64", "product": { "name": "fetchmail-0:6.2.0-3.el3.2.ia64", "product_id": "fetchmail-0:6.2.0-3.el3.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@6.2.0-3.el3.2?arch=ia64" } } }, { "category": "product_version", "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.ia64", "product": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.ia64", "product_id": "fetchmail-debuginfo-0:6.2.5-6.el4.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.5-6.el4.2?arch=ia64" } } }, { "category": "product_version", "name": "fetchmail-0:6.2.5-6.el4.2.ia64", "product": { "name": "fetchmail-0:6.2.5-6.el4.2.ia64", "product_id": "fetchmail-0:6.2.5-6.el4.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@6.2.5-6.el4.2?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.x86_64", "product": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.x86_64", "product_id": "fetchmail-debuginfo-0:6.2.0-3.el3.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.0-3.el3.2?arch=x86_64" } } }, { "category": "product_version", "name": "fetchmail-0:6.2.0-3.el3.2.x86_64", "product": { "name": "fetchmail-0:6.2.0-3.el3.2.x86_64", "product_id": "fetchmail-0:6.2.0-3.el3.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@6.2.0-3.el3.2?arch=x86_64" } } }, { "category": "product_version", "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.x86_64", "product": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.x86_64", "product_id": "fetchmail-debuginfo-0:6.2.5-6.el4.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.5-6.el4.2?arch=x86_64" } } }, { "category": "product_version", "name": "fetchmail-0:6.2.5-6.el4.2.x86_64", "product": { "name": "fetchmail-0:6.2.5-6.el4.2.x86_64", "product_id": "fetchmail-0:6.2.5-6.el4.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@6.2.5-6.el4.2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.i386", "product": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.i386", "product_id": "fetchmail-debuginfo-0:6.2.0-3.el3.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.0-3.el3.2?arch=i386" } } }, { "category": "product_version", "name": "fetchmail-0:6.2.0-3.el3.2.i386", "product": { "name": "fetchmail-0:6.2.0-3.el3.2.i386", "product_id": "fetchmail-0:6.2.0-3.el3.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@6.2.0-3.el3.2?arch=i386" } } }, { "category": "product_version", "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.i386", "product": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.i386", "product_id": "fetchmail-debuginfo-0:6.2.5-6.el4.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.5-6.el4.2?arch=i386" } } }, { "category": "product_version", "name": "fetchmail-0:6.2.5-6.el4.2.i386", "product": { "name": "fetchmail-0:6.2.5-6.el4.2.i386", "product_id": "fetchmail-0:6.2.5-6.el4.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@6.2.5-6.el4.2?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "fetchmail-0:6.2.0-3.el3.2.src", "product": { "name": "fetchmail-0:6.2.0-3.el3.2.src", "product_id": "fetchmail-0:6.2.0-3.el3.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@6.2.0-3.el3.2?arch=src" } } }, { "category": "product_version", "name": "fetchmail-0:6.2.5-6.el4.2.src", "product": { "name": "fetchmail-0:6.2.5-6.el4.2.src", "product_id": "fetchmail-0:6.2.5-6.el4.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@6.2.5-6.el4.2?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.ppc", "product": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.ppc", "product_id": "fetchmail-debuginfo-0:6.2.0-3.el3.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.0-3.el3.2?arch=ppc" } } }, { "category": "product_version", "name": "fetchmail-0:6.2.0-3.el3.2.ppc", "product": { "name": "fetchmail-0:6.2.0-3.el3.2.ppc", "product_id": "fetchmail-0:6.2.0-3.el3.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@6.2.0-3.el3.2?arch=ppc" } } }, { "category": "product_version", "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.ppc", "product": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.ppc", "product_id": "fetchmail-debuginfo-0:6.2.5-6.el4.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.5-6.el4.2?arch=ppc" } } }, { "category": "product_version", "name": "fetchmail-0:6.2.5-6.el4.2.ppc", "product": { "name": "fetchmail-0:6.2.5-6.el4.2.ppc", "product_id": "fetchmail-0:6.2.5-6.el4.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@6.2.5-6.el4.2?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.s390x", "product": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.s390x", "product_id": "fetchmail-debuginfo-0:6.2.0-3.el3.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.0-3.el3.2?arch=s390x" } } }, { "category": "product_version", "name": "fetchmail-0:6.2.0-3.el3.2.s390x", "product": { "name": "fetchmail-0:6.2.0-3.el3.2.s390x", "product_id": "fetchmail-0:6.2.0-3.el3.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@6.2.0-3.el3.2?arch=s390x" } } }, { "category": "product_version", "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.s390x", "product": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.s390x", "product_id": "fetchmail-debuginfo-0:6.2.5-6.el4.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.5-6.el4.2?arch=s390x" } } }, { "category": "product_version", "name": "fetchmail-0:6.2.5-6.el4.2.s390x", "product": { "name": "fetchmail-0:6.2.5-6.el4.2.s390x", "product_id": "fetchmail-0:6.2.5-6.el4.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@6.2.5-6.el4.2?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.s390", "product": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.s390", "product_id": "fetchmail-debuginfo-0:6.2.0-3.el3.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.0-3.el3.2?arch=s390" } } }, { "category": "product_version", "name": "fetchmail-0:6.2.0-3.el3.2.s390", "product": { "name": "fetchmail-0:6.2.0-3.el3.2.s390", "product_id": "fetchmail-0:6.2.0-3.el3.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@6.2.0-3.el3.2?arch=s390" } } }, { "category": "product_version", "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.s390", "product": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.s390", "product_id": "fetchmail-debuginfo-0:6.2.5-6.el4.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.5-6.el4.2?arch=s390" } } }, { "category": "product_version", "name": "fetchmail-0:6.2.5-6.el4.2.s390", "product": { "name": "fetchmail-0:6.2.5-6.el4.2.s390", "product_id": "fetchmail-0:6.2.5-6.el4.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@6.2.5-6.el4.2?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.2.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:fetchmail-0:6.2.0-3.el3.2.i386" }, "product_reference": "fetchmail-0:6.2.0-3.el3.2.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.2.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:fetchmail-0:6.2.0-3.el3.2.ia64" }, "product_reference": "fetchmail-0:6.2.0-3.el3.2.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.2.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:fetchmail-0:6.2.0-3.el3.2.ppc" }, "product_reference": "fetchmail-0:6.2.0-3.el3.2.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.2.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:fetchmail-0:6.2.0-3.el3.2.s390" }, "product_reference": "fetchmail-0:6.2.0-3.el3.2.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.2.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:fetchmail-0:6.2.0-3.el3.2.s390x" }, "product_reference": "fetchmail-0:6.2.0-3.el3.2.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.2.src as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:fetchmail-0:6.2.0-3.el3.2.src" }, "product_reference": "fetchmail-0:6.2.0-3.el3.2.src", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.2.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:fetchmail-0:6.2.0-3.el3.2.x86_64" }, "product_reference": "fetchmail-0:6.2.0-3.el3.2.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.2.i386" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.2.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.2.ia64" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.2.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.2.ppc" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.2.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.2.s390" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.2.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.2.s390x" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.2.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.2.x86_64" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.2.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.2.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:fetchmail-0:6.2.0-3.el3.2.i386" }, "product_reference": "fetchmail-0:6.2.0-3.el3.2.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.2.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:fetchmail-0:6.2.0-3.el3.2.ia64" }, "product_reference": "fetchmail-0:6.2.0-3.el3.2.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.2.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:fetchmail-0:6.2.0-3.el3.2.ppc" }, "product_reference": "fetchmail-0:6.2.0-3.el3.2.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.2.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:fetchmail-0:6.2.0-3.el3.2.s390" }, "product_reference": "fetchmail-0:6.2.0-3.el3.2.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.2.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:fetchmail-0:6.2.0-3.el3.2.s390x" }, "product_reference": "fetchmail-0:6.2.0-3.el3.2.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.2.src as a component of Red Hat Desktop version 3", "product_id": "3Desktop:fetchmail-0:6.2.0-3.el3.2.src" }, "product_reference": "fetchmail-0:6.2.0-3.el3.2.src", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.2.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:fetchmail-0:6.2.0-3.el3.2.x86_64" }, "product_reference": "fetchmail-0:6.2.0-3.el3.2.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.2.i386" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.2.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.2.ia64" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.2.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.2.ppc" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.2.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.2.s390" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.2.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.2.s390x" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.2.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.2.x86_64" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.2.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.2.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:fetchmail-0:6.2.0-3.el3.2.i386" }, "product_reference": "fetchmail-0:6.2.0-3.el3.2.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.2.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:fetchmail-0:6.2.0-3.el3.2.ia64" }, "product_reference": "fetchmail-0:6.2.0-3.el3.2.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.2.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:fetchmail-0:6.2.0-3.el3.2.ppc" }, "product_reference": "fetchmail-0:6.2.0-3.el3.2.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.2.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:fetchmail-0:6.2.0-3.el3.2.s390" }, "product_reference": "fetchmail-0:6.2.0-3.el3.2.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.2.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:fetchmail-0:6.2.0-3.el3.2.s390x" }, "product_reference": "fetchmail-0:6.2.0-3.el3.2.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.2.src as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:fetchmail-0:6.2.0-3.el3.2.src" }, "product_reference": "fetchmail-0:6.2.0-3.el3.2.src", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.2.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:fetchmail-0:6.2.0-3.el3.2.x86_64" }, "product_reference": "fetchmail-0:6.2.0-3.el3.2.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.2.i386" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.2.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.2.ia64" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.2.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.2.ppc" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.2.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.2.s390" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.2.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.2.s390x" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.2.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.2.x86_64" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.2.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.2.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:fetchmail-0:6.2.0-3.el3.2.i386" }, "product_reference": "fetchmail-0:6.2.0-3.el3.2.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.2.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:fetchmail-0:6.2.0-3.el3.2.ia64" }, "product_reference": "fetchmail-0:6.2.0-3.el3.2.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.2.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:fetchmail-0:6.2.0-3.el3.2.ppc" }, "product_reference": "fetchmail-0:6.2.0-3.el3.2.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.2.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:fetchmail-0:6.2.0-3.el3.2.s390" }, "product_reference": "fetchmail-0:6.2.0-3.el3.2.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.2.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:fetchmail-0:6.2.0-3.el3.2.s390x" }, "product_reference": "fetchmail-0:6.2.0-3.el3.2.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.2.src as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:fetchmail-0:6.2.0-3.el3.2.src" }, "product_reference": "fetchmail-0:6.2.0-3.el3.2.src", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.2.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:fetchmail-0:6.2.0-3.el3.2.x86_64" }, "product_reference": "fetchmail-0:6.2.0-3.el3.2.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.2.i386" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.2.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.2.ia64" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.2.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.2.ppc" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.2.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.2.s390" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.2.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.2.s390x" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.2.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.2.x86_64" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.2.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.2.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:fetchmail-0:6.2.5-6.el4.2.i386" }, "product_reference": "fetchmail-0:6.2.5-6.el4.2.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.2.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:fetchmail-0:6.2.5-6.el4.2.ia64" }, "product_reference": "fetchmail-0:6.2.5-6.el4.2.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.2.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:fetchmail-0:6.2.5-6.el4.2.ppc" }, "product_reference": "fetchmail-0:6.2.5-6.el4.2.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.2.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:fetchmail-0:6.2.5-6.el4.2.s390" }, "product_reference": "fetchmail-0:6.2.5-6.el4.2.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.2.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:fetchmail-0:6.2.5-6.el4.2.s390x" }, "product_reference": "fetchmail-0:6.2.5-6.el4.2.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.2.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:fetchmail-0:6.2.5-6.el4.2.src" }, "product_reference": "fetchmail-0:6.2.5-6.el4.2.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.2.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:fetchmail-0:6.2.5-6.el4.2.x86_64" }, "product_reference": "fetchmail-0:6.2.5-6.el4.2.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.2.i386" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.2.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.2.ia64" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.2.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.2.ppc" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.2.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.2.s390" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.2.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.2.s390x" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.2.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.2.x86_64" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.2.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.2.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:fetchmail-0:6.2.5-6.el4.2.i386" }, "product_reference": "fetchmail-0:6.2.5-6.el4.2.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.2.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:fetchmail-0:6.2.5-6.el4.2.ia64" }, "product_reference": "fetchmail-0:6.2.5-6.el4.2.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.2.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:fetchmail-0:6.2.5-6.el4.2.ppc" }, "product_reference": "fetchmail-0:6.2.5-6.el4.2.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.2.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:fetchmail-0:6.2.5-6.el4.2.s390" }, "product_reference": "fetchmail-0:6.2.5-6.el4.2.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.2.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:fetchmail-0:6.2.5-6.el4.2.s390x" }, "product_reference": "fetchmail-0:6.2.5-6.el4.2.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.2.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:fetchmail-0:6.2.5-6.el4.2.src" }, "product_reference": "fetchmail-0:6.2.5-6.el4.2.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.2.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:fetchmail-0:6.2.5-6.el4.2.x86_64" }, "product_reference": "fetchmail-0:6.2.5-6.el4.2.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.2.i386" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.2.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.2.ia64" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.2.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.2.ppc" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.2.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.2.s390" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.2.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.2.s390x" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.2.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.2.x86_64" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.2.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.2.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:fetchmail-0:6.2.5-6.el4.2.i386" }, "product_reference": "fetchmail-0:6.2.5-6.el4.2.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.2.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:fetchmail-0:6.2.5-6.el4.2.ia64" }, "product_reference": "fetchmail-0:6.2.5-6.el4.2.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.2.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:fetchmail-0:6.2.5-6.el4.2.ppc" }, "product_reference": "fetchmail-0:6.2.5-6.el4.2.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.2.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:fetchmail-0:6.2.5-6.el4.2.s390" }, "product_reference": "fetchmail-0:6.2.5-6.el4.2.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.2.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:fetchmail-0:6.2.5-6.el4.2.s390x" }, "product_reference": "fetchmail-0:6.2.5-6.el4.2.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.2.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:fetchmail-0:6.2.5-6.el4.2.src" }, "product_reference": "fetchmail-0:6.2.5-6.el4.2.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.2.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:fetchmail-0:6.2.5-6.el4.2.x86_64" }, "product_reference": "fetchmail-0:6.2.5-6.el4.2.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.2.i386" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.2.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.2.ia64" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.2.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.2.ppc" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.2.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.2.s390" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.2.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.2.s390x" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.2.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.2.x86_64" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.2.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.2.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:fetchmail-0:6.2.5-6.el4.2.i386" }, "product_reference": "fetchmail-0:6.2.5-6.el4.2.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.2.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:fetchmail-0:6.2.5-6.el4.2.ia64" }, "product_reference": "fetchmail-0:6.2.5-6.el4.2.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.2.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:fetchmail-0:6.2.5-6.el4.2.ppc" }, "product_reference": "fetchmail-0:6.2.5-6.el4.2.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.2.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:fetchmail-0:6.2.5-6.el4.2.s390" }, "product_reference": "fetchmail-0:6.2.5-6.el4.2.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.2.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:fetchmail-0:6.2.5-6.el4.2.s390x" }, "product_reference": "fetchmail-0:6.2.5-6.el4.2.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.2.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:fetchmail-0:6.2.5-6.el4.2.src" }, "product_reference": "fetchmail-0:6.2.5-6.el4.2.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.2.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:fetchmail-0:6.2.5-6.el4.2.x86_64" }, "product_reference": "fetchmail-0:6.2.5-6.el4.2.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.2.i386" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.2.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.2.ia64" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.2.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.2.ppc" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.2.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.2.s390" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.2.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.2.s390x" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.2.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.2.x86_64" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.2.x86_64", "relates_to_product_reference": "4WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2005-2335", "discovery_date": "2005-07-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617705" } ], "notes": [ { "category": "description", "text": "Buffer overflow in the POP3 client in Fetchmail before 6.2.5.2 allows remote POP3 servers to cause a denial of service and possibly execute arbitrary code via long UIDL responses. NOTE: a typo in an advisory accidentally used the wrong CVE identifier for the Fetchmail issue. This is the correct identifier.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:fetchmail-0:6.2.0-3.el3.2.i386", "3AS:fetchmail-0:6.2.0-3.el3.2.ia64", "3AS:fetchmail-0:6.2.0-3.el3.2.ppc", "3AS:fetchmail-0:6.2.0-3.el3.2.s390", "3AS:fetchmail-0:6.2.0-3.el3.2.s390x", "3AS:fetchmail-0:6.2.0-3.el3.2.src", "3AS:fetchmail-0:6.2.0-3.el3.2.x86_64", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.2.i386", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.2.ia64", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.2.ppc", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.2.s390", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.2.s390x", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.2.x86_64", "3Desktop:fetchmail-0:6.2.0-3.el3.2.i386", "3Desktop:fetchmail-0:6.2.0-3.el3.2.ia64", "3Desktop:fetchmail-0:6.2.0-3.el3.2.ppc", "3Desktop:fetchmail-0:6.2.0-3.el3.2.s390", "3Desktop:fetchmail-0:6.2.0-3.el3.2.s390x", "3Desktop:fetchmail-0:6.2.0-3.el3.2.src", "3Desktop:fetchmail-0:6.2.0-3.el3.2.x86_64", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.2.i386", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.2.ia64", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.2.ppc", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.2.s390", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.2.s390x", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.2.x86_64", "3ES:fetchmail-0:6.2.0-3.el3.2.i386", "3ES:fetchmail-0:6.2.0-3.el3.2.ia64", "3ES:fetchmail-0:6.2.0-3.el3.2.ppc", "3ES:fetchmail-0:6.2.0-3.el3.2.s390", "3ES:fetchmail-0:6.2.0-3.el3.2.s390x", "3ES:fetchmail-0:6.2.0-3.el3.2.src", "3ES:fetchmail-0:6.2.0-3.el3.2.x86_64", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.2.i386", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.2.ia64", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.2.ppc", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.2.s390", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.2.s390x", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.2.x86_64", "3WS:fetchmail-0:6.2.0-3.el3.2.i386", "3WS:fetchmail-0:6.2.0-3.el3.2.ia64", "3WS:fetchmail-0:6.2.0-3.el3.2.ppc", "3WS:fetchmail-0:6.2.0-3.el3.2.s390", "3WS:fetchmail-0:6.2.0-3.el3.2.s390x", "3WS:fetchmail-0:6.2.0-3.el3.2.src", "3WS:fetchmail-0:6.2.0-3.el3.2.x86_64", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.2.i386", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.2.ia64", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.2.ppc", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.2.s390", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.2.s390x", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.2.x86_64", "4AS:fetchmail-0:6.2.5-6.el4.2.i386", "4AS:fetchmail-0:6.2.5-6.el4.2.ia64", "4AS:fetchmail-0:6.2.5-6.el4.2.ppc", "4AS:fetchmail-0:6.2.5-6.el4.2.s390", "4AS:fetchmail-0:6.2.5-6.el4.2.s390x", "4AS:fetchmail-0:6.2.5-6.el4.2.src", "4AS:fetchmail-0:6.2.5-6.el4.2.x86_64", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.2.i386", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.2.ia64", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.2.ppc", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.2.s390", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.2.s390x", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.2.x86_64", "4Desktop:fetchmail-0:6.2.5-6.el4.2.i386", "4Desktop:fetchmail-0:6.2.5-6.el4.2.ia64", "4Desktop:fetchmail-0:6.2.5-6.el4.2.ppc", "4Desktop:fetchmail-0:6.2.5-6.el4.2.s390", "4Desktop:fetchmail-0:6.2.5-6.el4.2.s390x", "4Desktop:fetchmail-0:6.2.5-6.el4.2.src", "4Desktop:fetchmail-0:6.2.5-6.el4.2.x86_64", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.2.i386", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.2.ia64", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.2.ppc", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.2.s390", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.2.s390x", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.2.x86_64", "4ES:fetchmail-0:6.2.5-6.el4.2.i386", "4ES:fetchmail-0:6.2.5-6.el4.2.ia64", "4ES:fetchmail-0:6.2.5-6.el4.2.ppc", "4ES:fetchmail-0:6.2.5-6.el4.2.s390", "4ES:fetchmail-0:6.2.5-6.el4.2.s390x", "4ES:fetchmail-0:6.2.5-6.el4.2.src", "4ES:fetchmail-0:6.2.5-6.el4.2.x86_64", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.2.i386", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.2.ia64", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.2.ppc", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.2.s390", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.2.s390x", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.2.x86_64", "4WS:fetchmail-0:6.2.5-6.el4.2.i386", "4WS:fetchmail-0:6.2.5-6.el4.2.ia64", "4WS:fetchmail-0:6.2.5-6.el4.2.ppc", "4WS:fetchmail-0:6.2.5-6.el4.2.s390", "4WS:fetchmail-0:6.2.5-6.el4.2.s390x", "4WS:fetchmail-0:6.2.5-6.el4.2.src", "4WS:fetchmail-0:6.2.5-6.el4.2.x86_64", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.2.i386", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.2.ia64", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.2.ppc", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.2.s390", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.2.s390x", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-2335" }, { "category": "external", "summary": "RHBZ#1617705", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617705" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-2335", "url": "https://www.cve.org/CVERecord?id=CVE-2005-2335" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2335", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2335" } ], "release_date": "2005-07-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-07-25T07:50:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS:fetchmail-0:6.2.0-3.el3.2.i386", "3AS:fetchmail-0:6.2.0-3.el3.2.ia64", "3AS:fetchmail-0:6.2.0-3.el3.2.ppc", "3AS:fetchmail-0:6.2.0-3.el3.2.s390", "3AS:fetchmail-0:6.2.0-3.el3.2.s390x", "3AS:fetchmail-0:6.2.0-3.el3.2.src", "3AS:fetchmail-0:6.2.0-3.el3.2.x86_64", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.2.i386", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.2.ia64", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.2.ppc", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.2.s390", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.2.s390x", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.2.x86_64", "3Desktop:fetchmail-0:6.2.0-3.el3.2.i386", "3Desktop:fetchmail-0:6.2.0-3.el3.2.ia64", "3Desktop:fetchmail-0:6.2.0-3.el3.2.ppc", "3Desktop:fetchmail-0:6.2.0-3.el3.2.s390", "3Desktop:fetchmail-0:6.2.0-3.el3.2.s390x", "3Desktop:fetchmail-0:6.2.0-3.el3.2.src", "3Desktop:fetchmail-0:6.2.0-3.el3.2.x86_64", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.2.i386", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.2.ia64", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.2.ppc", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.2.s390", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.2.s390x", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.2.x86_64", "3ES:fetchmail-0:6.2.0-3.el3.2.i386", "3ES:fetchmail-0:6.2.0-3.el3.2.ia64", "3ES:fetchmail-0:6.2.0-3.el3.2.ppc", "3ES:fetchmail-0:6.2.0-3.el3.2.s390", "3ES:fetchmail-0:6.2.0-3.el3.2.s390x", "3ES:fetchmail-0:6.2.0-3.el3.2.src", "3ES:fetchmail-0:6.2.0-3.el3.2.x86_64", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.2.i386", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.2.ia64", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.2.ppc", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.2.s390", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.2.s390x", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.2.x86_64", "3WS:fetchmail-0:6.2.0-3.el3.2.i386", "3WS:fetchmail-0:6.2.0-3.el3.2.ia64", "3WS:fetchmail-0:6.2.0-3.el3.2.ppc", "3WS:fetchmail-0:6.2.0-3.el3.2.s390", "3WS:fetchmail-0:6.2.0-3.el3.2.s390x", "3WS:fetchmail-0:6.2.0-3.el3.2.src", "3WS:fetchmail-0:6.2.0-3.el3.2.x86_64", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.2.i386", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.2.ia64", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.2.ppc", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.2.s390", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.2.s390x", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.2.x86_64", "4AS:fetchmail-0:6.2.5-6.el4.2.i386", "4AS:fetchmail-0:6.2.5-6.el4.2.ia64", "4AS:fetchmail-0:6.2.5-6.el4.2.ppc", "4AS:fetchmail-0:6.2.5-6.el4.2.s390", "4AS:fetchmail-0:6.2.5-6.el4.2.s390x", "4AS:fetchmail-0:6.2.5-6.el4.2.src", "4AS:fetchmail-0:6.2.5-6.el4.2.x86_64", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.2.i386", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.2.ia64", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.2.ppc", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.2.s390", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.2.s390x", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.2.x86_64", "4Desktop:fetchmail-0:6.2.5-6.el4.2.i386", "4Desktop:fetchmail-0:6.2.5-6.el4.2.ia64", "4Desktop:fetchmail-0:6.2.5-6.el4.2.ppc", "4Desktop:fetchmail-0:6.2.5-6.el4.2.s390", "4Desktop:fetchmail-0:6.2.5-6.el4.2.s390x", "4Desktop:fetchmail-0:6.2.5-6.el4.2.src", "4Desktop:fetchmail-0:6.2.5-6.el4.2.x86_64", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.2.i386", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.2.ia64", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.2.ppc", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.2.s390", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.2.s390x", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.2.x86_64", "4ES:fetchmail-0:6.2.5-6.el4.2.i386", "4ES:fetchmail-0:6.2.5-6.el4.2.ia64", "4ES:fetchmail-0:6.2.5-6.el4.2.ppc", "4ES:fetchmail-0:6.2.5-6.el4.2.s390", "4ES:fetchmail-0:6.2.5-6.el4.2.s390x", "4ES:fetchmail-0:6.2.5-6.el4.2.src", "4ES:fetchmail-0:6.2.5-6.el4.2.x86_64", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.2.i386", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.2.ia64", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.2.ppc", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.2.s390", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.2.s390x", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.2.x86_64", "4WS:fetchmail-0:6.2.5-6.el4.2.i386", "4WS:fetchmail-0:6.2.5-6.el4.2.ia64", "4WS:fetchmail-0:6.2.5-6.el4.2.ppc", "4WS:fetchmail-0:6.2.5-6.el4.2.s390", "4WS:fetchmail-0:6.2.5-6.el4.2.s390x", "4WS:fetchmail-0:6.2.5-6.el4.2.src", "4WS:fetchmail-0:6.2.5-6.el4.2.x86_64", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.2.i386", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.2.ia64", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.2.ppc", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.2.s390", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.2.s390x", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:640" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" } ] }
RHSA-2005:640
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated fetchmail packages that fix a security flaw are now available.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "Fetchmail is a remote mail retrieval and forwarding utility.\n\nA buffer overflow was discovered in fetchmail\u0027s POP3 client. A malicious\nserver could cause send a carefully crafted message UID and cause fetchmail\nto crash or potentially execute arbitrary code as the user running\nfetchmail. The Common Vulnerabilities and Exposures project assigned the\nname CAN-2005-2335 to this issue.\n\nUsers of fetchmail should update to this erratum package which contains a\nbackported patch to correct this issue.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2005:640", "url": "https://access.redhat.com/errata/RHSA-2005:640" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "163816", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=163816" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2005/rhsa-2005_640.json" } ], "title": "Red Hat Security Advisory: fetchmail security update", "tracking": { "current_release_date": "2025-10-09T12:43:10+00:00", "generator": { "date": "2025-10-09T12:43:10+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.9" } }, "id": "RHSA-2005:640", "initial_release_date": "2005-07-25T07:50:00+00:00", "revision_history": [ { "date": "2005-07-25T07:50:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2005-07-25T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-10-09T12:43:10+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 3", "product": { "name": "Red Hat Enterprise Linux AS version 3", "product_id": "3AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::as" } } }, { "category": "product_name", "name": "Red Hat Desktop version 3", "product": { "name": "Red Hat Desktop version 3", "product_id": "3Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 3", "product": { "name": "Red Hat Enterprise Linux ES version 3", "product_id": "3ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 3", "product": { "name": "Red Hat Enterprise Linux WS version 3", "product_id": "3WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::ws" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.ia64", "product": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.ia64", "product_id": "fetchmail-debuginfo-0:6.2.0-3.el3.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.0-3.el3.2?arch=ia64" } } }, { "category": "product_version", "name": "fetchmail-0:6.2.0-3.el3.2.ia64", "product": { "name": "fetchmail-0:6.2.0-3.el3.2.ia64", "product_id": "fetchmail-0:6.2.0-3.el3.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@6.2.0-3.el3.2?arch=ia64" } } }, { "category": "product_version", "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.ia64", "product": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.ia64", "product_id": "fetchmail-debuginfo-0:6.2.5-6.el4.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.5-6.el4.2?arch=ia64" } } }, { "category": "product_version", "name": "fetchmail-0:6.2.5-6.el4.2.ia64", "product": { "name": "fetchmail-0:6.2.5-6.el4.2.ia64", "product_id": "fetchmail-0:6.2.5-6.el4.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@6.2.5-6.el4.2?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.x86_64", "product": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.x86_64", "product_id": "fetchmail-debuginfo-0:6.2.0-3.el3.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.0-3.el3.2?arch=x86_64" } } }, { "category": "product_version", "name": "fetchmail-0:6.2.0-3.el3.2.x86_64", "product": { "name": "fetchmail-0:6.2.0-3.el3.2.x86_64", "product_id": "fetchmail-0:6.2.0-3.el3.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@6.2.0-3.el3.2?arch=x86_64" } } }, { "category": "product_version", "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.x86_64", "product": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.x86_64", "product_id": "fetchmail-debuginfo-0:6.2.5-6.el4.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.5-6.el4.2?arch=x86_64" } } }, { "category": "product_version", "name": "fetchmail-0:6.2.5-6.el4.2.x86_64", "product": { "name": "fetchmail-0:6.2.5-6.el4.2.x86_64", "product_id": "fetchmail-0:6.2.5-6.el4.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@6.2.5-6.el4.2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.i386", "product": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.i386", "product_id": "fetchmail-debuginfo-0:6.2.0-3.el3.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.0-3.el3.2?arch=i386" } } }, { "category": "product_version", "name": "fetchmail-0:6.2.0-3.el3.2.i386", "product": { "name": "fetchmail-0:6.2.0-3.el3.2.i386", "product_id": "fetchmail-0:6.2.0-3.el3.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@6.2.0-3.el3.2?arch=i386" } } }, { "category": "product_version", "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.i386", "product": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.i386", "product_id": "fetchmail-debuginfo-0:6.2.5-6.el4.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.5-6.el4.2?arch=i386" } } }, { "category": "product_version", "name": "fetchmail-0:6.2.5-6.el4.2.i386", "product": { "name": "fetchmail-0:6.2.5-6.el4.2.i386", "product_id": "fetchmail-0:6.2.5-6.el4.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@6.2.5-6.el4.2?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "fetchmail-0:6.2.0-3.el3.2.src", "product": { "name": "fetchmail-0:6.2.0-3.el3.2.src", "product_id": "fetchmail-0:6.2.0-3.el3.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@6.2.0-3.el3.2?arch=src" } } }, { "category": "product_version", "name": "fetchmail-0:6.2.5-6.el4.2.src", "product": { "name": "fetchmail-0:6.2.5-6.el4.2.src", "product_id": "fetchmail-0:6.2.5-6.el4.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@6.2.5-6.el4.2?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.ppc", "product": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.ppc", "product_id": "fetchmail-debuginfo-0:6.2.0-3.el3.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.0-3.el3.2?arch=ppc" } } }, { "category": "product_version", "name": "fetchmail-0:6.2.0-3.el3.2.ppc", "product": { "name": "fetchmail-0:6.2.0-3.el3.2.ppc", "product_id": "fetchmail-0:6.2.0-3.el3.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@6.2.0-3.el3.2?arch=ppc" } } }, { "category": "product_version", "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.ppc", "product": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.ppc", "product_id": "fetchmail-debuginfo-0:6.2.5-6.el4.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.5-6.el4.2?arch=ppc" } } }, { "category": "product_version", "name": "fetchmail-0:6.2.5-6.el4.2.ppc", "product": { "name": "fetchmail-0:6.2.5-6.el4.2.ppc", "product_id": "fetchmail-0:6.2.5-6.el4.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@6.2.5-6.el4.2?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.s390x", "product": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.s390x", "product_id": "fetchmail-debuginfo-0:6.2.0-3.el3.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.0-3.el3.2?arch=s390x" } } }, { "category": "product_version", "name": "fetchmail-0:6.2.0-3.el3.2.s390x", "product": { "name": "fetchmail-0:6.2.0-3.el3.2.s390x", "product_id": "fetchmail-0:6.2.0-3.el3.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@6.2.0-3.el3.2?arch=s390x" } } }, { "category": "product_version", "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.s390x", "product": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.s390x", "product_id": "fetchmail-debuginfo-0:6.2.5-6.el4.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.5-6.el4.2?arch=s390x" } } }, { "category": "product_version", "name": "fetchmail-0:6.2.5-6.el4.2.s390x", "product": { "name": "fetchmail-0:6.2.5-6.el4.2.s390x", "product_id": "fetchmail-0:6.2.5-6.el4.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@6.2.5-6.el4.2?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.s390", "product": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.s390", "product_id": "fetchmail-debuginfo-0:6.2.0-3.el3.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.0-3.el3.2?arch=s390" } } }, { "category": "product_version", "name": "fetchmail-0:6.2.0-3.el3.2.s390", "product": { "name": "fetchmail-0:6.2.0-3.el3.2.s390", "product_id": "fetchmail-0:6.2.0-3.el3.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@6.2.0-3.el3.2?arch=s390" } } }, { "category": "product_version", "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.s390", "product": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.s390", "product_id": "fetchmail-debuginfo-0:6.2.5-6.el4.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.5-6.el4.2?arch=s390" } } }, { "category": "product_version", "name": "fetchmail-0:6.2.5-6.el4.2.s390", "product": { "name": "fetchmail-0:6.2.5-6.el4.2.s390", "product_id": "fetchmail-0:6.2.5-6.el4.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@6.2.5-6.el4.2?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.2.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:fetchmail-0:6.2.0-3.el3.2.i386" }, "product_reference": "fetchmail-0:6.2.0-3.el3.2.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.2.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:fetchmail-0:6.2.0-3.el3.2.ia64" }, "product_reference": "fetchmail-0:6.2.0-3.el3.2.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.2.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:fetchmail-0:6.2.0-3.el3.2.ppc" }, "product_reference": "fetchmail-0:6.2.0-3.el3.2.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.2.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:fetchmail-0:6.2.0-3.el3.2.s390" }, "product_reference": "fetchmail-0:6.2.0-3.el3.2.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.2.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:fetchmail-0:6.2.0-3.el3.2.s390x" }, "product_reference": "fetchmail-0:6.2.0-3.el3.2.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.2.src as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:fetchmail-0:6.2.0-3.el3.2.src" }, "product_reference": "fetchmail-0:6.2.0-3.el3.2.src", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.2.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:fetchmail-0:6.2.0-3.el3.2.x86_64" }, "product_reference": "fetchmail-0:6.2.0-3.el3.2.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.2.i386" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.2.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.2.ia64" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.2.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.2.ppc" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.2.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.2.s390" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.2.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.2.s390x" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.2.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.2.x86_64" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.2.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.2.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:fetchmail-0:6.2.0-3.el3.2.i386" }, "product_reference": "fetchmail-0:6.2.0-3.el3.2.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.2.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:fetchmail-0:6.2.0-3.el3.2.ia64" }, "product_reference": "fetchmail-0:6.2.0-3.el3.2.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.2.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:fetchmail-0:6.2.0-3.el3.2.ppc" }, "product_reference": "fetchmail-0:6.2.0-3.el3.2.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.2.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:fetchmail-0:6.2.0-3.el3.2.s390" }, "product_reference": "fetchmail-0:6.2.0-3.el3.2.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.2.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:fetchmail-0:6.2.0-3.el3.2.s390x" }, "product_reference": "fetchmail-0:6.2.0-3.el3.2.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.2.src as a component of Red Hat Desktop version 3", "product_id": "3Desktop:fetchmail-0:6.2.0-3.el3.2.src" }, "product_reference": "fetchmail-0:6.2.0-3.el3.2.src", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.2.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:fetchmail-0:6.2.0-3.el3.2.x86_64" }, "product_reference": "fetchmail-0:6.2.0-3.el3.2.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.2.i386" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.2.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.2.ia64" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.2.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.2.ppc" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.2.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.2.s390" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.2.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.2.s390x" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.2.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.2.x86_64" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.2.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.2.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:fetchmail-0:6.2.0-3.el3.2.i386" }, "product_reference": "fetchmail-0:6.2.0-3.el3.2.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.2.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:fetchmail-0:6.2.0-3.el3.2.ia64" }, "product_reference": "fetchmail-0:6.2.0-3.el3.2.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.2.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:fetchmail-0:6.2.0-3.el3.2.ppc" }, "product_reference": "fetchmail-0:6.2.0-3.el3.2.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.2.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:fetchmail-0:6.2.0-3.el3.2.s390" }, "product_reference": "fetchmail-0:6.2.0-3.el3.2.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.2.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:fetchmail-0:6.2.0-3.el3.2.s390x" }, "product_reference": "fetchmail-0:6.2.0-3.el3.2.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.2.src as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:fetchmail-0:6.2.0-3.el3.2.src" }, "product_reference": "fetchmail-0:6.2.0-3.el3.2.src", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.2.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:fetchmail-0:6.2.0-3.el3.2.x86_64" }, "product_reference": "fetchmail-0:6.2.0-3.el3.2.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.2.i386" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.2.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.2.ia64" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.2.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.2.ppc" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.2.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.2.s390" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.2.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.2.s390x" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.2.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.2.x86_64" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.2.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.2.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:fetchmail-0:6.2.0-3.el3.2.i386" }, "product_reference": "fetchmail-0:6.2.0-3.el3.2.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.2.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:fetchmail-0:6.2.0-3.el3.2.ia64" }, "product_reference": "fetchmail-0:6.2.0-3.el3.2.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.2.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:fetchmail-0:6.2.0-3.el3.2.ppc" }, "product_reference": "fetchmail-0:6.2.0-3.el3.2.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.2.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:fetchmail-0:6.2.0-3.el3.2.s390" }, "product_reference": "fetchmail-0:6.2.0-3.el3.2.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.2.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:fetchmail-0:6.2.0-3.el3.2.s390x" }, "product_reference": "fetchmail-0:6.2.0-3.el3.2.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.2.src as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:fetchmail-0:6.2.0-3.el3.2.src" }, "product_reference": "fetchmail-0:6.2.0-3.el3.2.src", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.2.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:fetchmail-0:6.2.0-3.el3.2.x86_64" }, "product_reference": "fetchmail-0:6.2.0-3.el3.2.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.2.i386" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.2.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.2.ia64" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.2.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.2.ppc" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.2.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.2.s390" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.2.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.2.s390x" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.2.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.2.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.2.x86_64" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.2.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.2.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:fetchmail-0:6.2.5-6.el4.2.i386" }, "product_reference": "fetchmail-0:6.2.5-6.el4.2.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.2.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:fetchmail-0:6.2.5-6.el4.2.ia64" }, "product_reference": "fetchmail-0:6.2.5-6.el4.2.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.2.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:fetchmail-0:6.2.5-6.el4.2.ppc" }, "product_reference": "fetchmail-0:6.2.5-6.el4.2.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.2.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:fetchmail-0:6.2.5-6.el4.2.s390" }, "product_reference": "fetchmail-0:6.2.5-6.el4.2.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.2.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:fetchmail-0:6.2.5-6.el4.2.s390x" }, "product_reference": "fetchmail-0:6.2.5-6.el4.2.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.2.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:fetchmail-0:6.2.5-6.el4.2.src" }, "product_reference": "fetchmail-0:6.2.5-6.el4.2.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.2.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:fetchmail-0:6.2.5-6.el4.2.x86_64" }, "product_reference": "fetchmail-0:6.2.5-6.el4.2.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.2.i386" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.2.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.2.ia64" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.2.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.2.ppc" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.2.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.2.s390" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.2.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.2.s390x" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.2.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.2.x86_64" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.2.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.2.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:fetchmail-0:6.2.5-6.el4.2.i386" }, "product_reference": "fetchmail-0:6.2.5-6.el4.2.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.2.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:fetchmail-0:6.2.5-6.el4.2.ia64" }, "product_reference": "fetchmail-0:6.2.5-6.el4.2.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.2.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:fetchmail-0:6.2.5-6.el4.2.ppc" }, "product_reference": "fetchmail-0:6.2.5-6.el4.2.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.2.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:fetchmail-0:6.2.5-6.el4.2.s390" }, "product_reference": "fetchmail-0:6.2.5-6.el4.2.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.2.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:fetchmail-0:6.2.5-6.el4.2.s390x" }, "product_reference": "fetchmail-0:6.2.5-6.el4.2.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.2.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:fetchmail-0:6.2.5-6.el4.2.src" }, "product_reference": "fetchmail-0:6.2.5-6.el4.2.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.2.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:fetchmail-0:6.2.5-6.el4.2.x86_64" }, "product_reference": "fetchmail-0:6.2.5-6.el4.2.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.2.i386" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.2.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.2.ia64" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.2.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.2.ppc" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.2.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.2.s390" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.2.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.2.s390x" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.2.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.2.x86_64" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.2.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.2.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:fetchmail-0:6.2.5-6.el4.2.i386" }, "product_reference": "fetchmail-0:6.2.5-6.el4.2.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.2.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:fetchmail-0:6.2.5-6.el4.2.ia64" }, "product_reference": "fetchmail-0:6.2.5-6.el4.2.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.2.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:fetchmail-0:6.2.5-6.el4.2.ppc" }, "product_reference": "fetchmail-0:6.2.5-6.el4.2.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.2.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:fetchmail-0:6.2.5-6.el4.2.s390" }, "product_reference": "fetchmail-0:6.2.5-6.el4.2.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.2.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:fetchmail-0:6.2.5-6.el4.2.s390x" }, "product_reference": "fetchmail-0:6.2.5-6.el4.2.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.2.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:fetchmail-0:6.2.5-6.el4.2.src" }, "product_reference": "fetchmail-0:6.2.5-6.el4.2.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.2.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:fetchmail-0:6.2.5-6.el4.2.x86_64" }, "product_reference": "fetchmail-0:6.2.5-6.el4.2.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.2.i386" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.2.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.2.ia64" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.2.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.2.ppc" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.2.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.2.s390" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.2.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.2.s390x" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.2.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.2.x86_64" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.2.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.2.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:fetchmail-0:6.2.5-6.el4.2.i386" }, "product_reference": "fetchmail-0:6.2.5-6.el4.2.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.2.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:fetchmail-0:6.2.5-6.el4.2.ia64" }, "product_reference": "fetchmail-0:6.2.5-6.el4.2.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.2.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:fetchmail-0:6.2.5-6.el4.2.ppc" }, "product_reference": "fetchmail-0:6.2.5-6.el4.2.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.2.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:fetchmail-0:6.2.5-6.el4.2.s390" }, "product_reference": "fetchmail-0:6.2.5-6.el4.2.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.2.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:fetchmail-0:6.2.5-6.el4.2.s390x" }, "product_reference": "fetchmail-0:6.2.5-6.el4.2.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.2.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:fetchmail-0:6.2.5-6.el4.2.src" }, "product_reference": "fetchmail-0:6.2.5-6.el4.2.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.2.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:fetchmail-0:6.2.5-6.el4.2.x86_64" }, "product_reference": "fetchmail-0:6.2.5-6.el4.2.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.2.i386" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.2.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.2.ia64" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.2.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.2.ppc" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.2.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.2.s390" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.2.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.2.s390x" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.2.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.2.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.2.x86_64" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.2.x86_64", "relates_to_product_reference": "4WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2005-2335", "discovery_date": "2005-07-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617705" } ], "notes": [ { "category": "description", "text": "Buffer overflow in the POP3 client in Fetchmail before 6.2.5.2 allows remote POP3 servers to cause a denial of service and possibly execute arbitrary code via long UIDL responses. NOTE: a typo in an advisory accidentally used the wrong CVE identifier for the Fetchmail issue. This is the correct identifier.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:fetchmail-0:6.2.0-3.el3.2.i386", "3AS:fetchmail-0:6.2.0-3.el3.2.ia64", "3AS:fetchmail-0:6.2.0-3.el3.2.ppc", "3AS:fetchmail-0:6.2.0-3.el3.2.s390", "3AS:fetchmail-0:6.2.0-3.el3.2.s390x", "3AS:fetchmail-0:6.2.0-3.el3.2.src", "3AS:fetchmail-0:6.2.0-3.el3.2.x86_64", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.2.i386", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.2.ia64", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.2.ppc", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.2.s390", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.2.s390x", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.2.x86_64", "3Desktop:fetchmail-0:6.2.0-3.el3.2.i386", "3Desktop:fetchmail-0:6.2.0-3.el3.2.ia64", "3Desktop:fetchmail-0:6.2.0-3.el3.2.ppc", "3Desktop:fetchmail-0:6.2.0-3.el3.2.s390", "3Desktop:fetchmail-0:6.2.0-3.el3.2.s390x", "3Desktop:fetchmail-0:6.2.0-3.el3.2.src", "3Desktop:fetchmail-0:6.2.0-3.el3.2.x86_64", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.2.i386", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.2.ia64", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.2.ppc", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.2.s390", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.2.s390x", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.2.x86_64", "3ES:fetchmail-0:6.2.0-3.el3.2.i386", "3ES:fetchmail-0:6.2.0-3.el3.2.ia64", "3ES:fetchmail-0:6.2.0-3.el3.2.ppc", "3ES:fetchmail-0:6.2.0-3.el3.2.s390", "3ES:fetchmail-0:6.2.0-3.el3.2.s390x", "3ES:fetchmail-0:6.2.0-3.el3.2.src", "3ES:fetchmail-0:6.2.0-3.el3.2.x86_64", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.2.i386", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.2.ia64", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.2.ppc", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.2.s390", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.2.s390x", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.2.x86_64", "3WS:fetchmail-0:6.2.0-3.el3.2.i386", "3WS:fetchmail-0:6.2.0-3.el3.2.ia64", "3WS:fetchmail-0:6.2.0-3.el3.2.ppc", "3WS:fetchmail-0:6.2.0-3.el3.2.s390", "3WS:fetchmail-0:6.2.0-3.el3.2.s390x", "3WS:fetchmail-0:6.2.0-3.el3.2.src", "3WS:fetchmail-0:6.2.0-3.el3.2.x86_64", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.2.i386", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.2.ia64", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.2.ppc", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.2.s390", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.2.s390x", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.2.x86_64", "4AS:fetchmail-0:6.2.5-6.el4.2.i386", "4AS:fetchmail-0:6.2.5-6.el4.2.ia64", "4AS:fetchmail-0:6.2.5-6.el4.2.ppc", "4AS:fetchmail-0:6.2.5-6.el4.2.s390", "4AS:fetchmail-0:6.2.5-6.el4.2.s390x", "4AS:fetchmail-0:6.2.5-6.el4.2.src", "4AS:fetchmail-0:6.2.5-6.el4.2.x86_64", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.2.i386", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.2.ia64", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.2.ppc", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.2.s390", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.2.s390x", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.2.x86_64", "4Desktop:fetchmail-0:6.2.5-6.el4.2.i386", "4Desktop:fetchmail-0:6.2.5-6.el4.2.ia64", "4Desktop:fetchmail-0:6.2.5-6.el4.2.ppc", "4Desktop:fetchmail-0:6.2.5-6.el4.2.s390", "4Desktop:fetchmail-0:6.2.5-6.el4.2.s390x", "4Desktop:fetchmail-0:6.2.5-6.el4.2.src", "4Desktop:fetchmail-0:6.2.5-6.el4.2.x86_64", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.2.i386", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.2.ia64", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.2.ppc", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.2.s390", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.2.s390x", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.2.x86_64", "4ES:fetchmail-0:6.2.5-6.el4.2.i386", "4ES:fetchmail-0:6.2.5-6.el4.2.ia64", "4ES:fetchmail-0:6.2.5-6.el4.2.ppc", "4ES:fetchmail-0:6.2.5-6.el4.2.s390", "4ES:fetchmail-0:6.2.5-6.el4.2.s390x", "4ES:fetchmail-0:6.2.5-6.el4.2.src", "4ES:fetchmail-0:6.2.5-6.el4.2.x86_64", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.2.i386", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.2.ia64", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.2.ppc", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.2.s390", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.2.s390x", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.2.x86_64", "4WS:fetchmail-0:6.2.5-6.el4.2.i386", "4WS:fetchmail-0:6.2.5-6.el4.2.ia64", "4WS:fetchmail-0:6.2.5-6.el4.2.ppc", "4WS:fetchmail-0:6.2.5-6.el4.2.s390", "4WS:fetchmail-0:6.2.5-6.el4.2.s390x", "4WS:fetchmail-0:6.2.5-6.el4.2.src", "4WS:fetchmail-0:6.2.5-6.el4.2.x86_64", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.2.i386", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.2.ia64", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.2.ppc", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.2.s390", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.2.s390x", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-2335" }, { "category": "external", "summary": "RHBZ#1617705", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617705" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-2335", "url": "https://www.cve.org/CVERecord?id=CVE-2005-2335" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2335", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2335" } ], "release_date": "2005-07-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-07-25T07:50:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS:fetchmail-0:6.2.0-3.el3.2.i386", "3AS:fetchmail-0:6.2.0-3.el3.2.ia64", "3AS:fetchmail-0:6.2.0-3.el3.2.ppc", "3AS:fetchmail-0:6.2.0-3.el3.2.s390", "3AS:fetchmail-0:6.2.0-3.el3.2.s390x", "3AS:fetchmail-0:6.2.0-3.el3.2.src", "3AS:fetchmail-0:6.2.0-3.el3.2.x86_64", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.2.i386", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.2.ia64", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.2.ppc", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.2.s390", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.2.s390x", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.2.x86_64", "3Desktop:fetchmail-0:6.2.0-3.el3.2.i386", "3Desktop:fetchmail-0:6.2.0-3.el3.2.ia64", "3Desktop:fetchmail-0:6.2.0-3.el3.2.ppc", "3Desktop:fetchmail-0:6.2.0-3.el3.2.s390", "3Desktop:fetchmail-0:6.2.0-3.el3.2.s390x", "3Desktop:fetchmail-0:6.2.0-3.el3.2.src", "3Desktop:fetchmail-0:6.2.0-3.el3.2.x86_64", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.2.i386", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.2.ia64", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.2.ppc", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.2.s390", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.2.s390x", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.2.x86_64", "3ES:fetchmail-0:6.2.0-3.el3.2.i386", "3ES:fetchmail-0:6.2.0-3.el3.2.ia64", "3ES:fetchmail-0:6.2.0-3.el3.2.ppc", "3ES:fetchmail-0:6.2.0-3.el3.2.s390", "3ES:fetchmail-0:6.2.0-3.el3.2.s390x", "3ES:fetchmail-0:6.2.0-3.el3.2.src", "3ES:fetchmail-0:6.2.0-3.el3.2.x86_64", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.2.i386", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.2.ia64", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.2.ppc", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.2.s390", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.2.s390x", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.2.x86_64", "3WS:fetchmail-0:6.2.0-3.el3.2.i386", "3WS:fetchmail-0:6.2.0-3.el3.2.ia64", "3WS:fetchmail-0:6.2.0-3.el3.2.ppc", "3WS:fetchmail-0:6.2.0-3.el3.2.s390", "3WS:fetchmail-0:6.2.0-3.el3.2.s390x", "3WS:fetchmail-0:6.2.0-3.el3.2.src", "3WS:fetchmail-0:6.2.0-3.el3.2.x86_64", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.2.i386", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.2.ia64", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.2.ppc", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.2.s390", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.2.s390x", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.2.x86_64", "4AS:fetchmail-0:6.2.5-6.el4.2.i386", "4AS:fetchmail-0:6.2.5-6.el4.2.ia64", "4AS:fetchmail-0:6.2.5-6.el4.2.ppc", "4AS:fetchmail-0:6.2.5-6.el4.2.s390", "4AS:fetchmail-0:6.2.5-6.el4.2.s390x", "4AS:fetchmail-0:6.2.5-6.el4.2.src", "4AS:fetchmail-0:6.2.5-6.el4.2.x86_64", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.2.i386", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.2.ia64", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.2.ppc", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.2.s390", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.2.s390x", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.2.x86_64", "4Desktop:fetchmail-0:6.2.5-6.el4.2.i386", "4Desktop:fetchmail-0:6.2.5-6.el4.2.ia64", "4Desktop:fetchmail-0:6.2.5-6.el4.2.ppc", "4Desktop:fetchmail-0:6.2.5-6.el4.2.s390", "4Desktop:fetchmail-0:6.2.5-6.el4.2.s390x", "4Desktop:fetchmail-0:6.2.5-6.el4.2.src", "4Desktop:fetchmail-0:6.2.5-6.el4.2.x86_64", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.2.i386", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.2.ia64", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.2.ppc", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.2.s390", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.2.s390x", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.2.x86_64", "4ES:fetchmail-0:6.2.5-6.el4.2.i386", "4ES:fetchmail-0:6.2.5-6.el4.2.ia64", "4ES:fetchmail-0:6.2.5-6.el4.2.ppc", "4ES:fetchmail-0:6.2.5-6.el4.2.s390", "4ES:fetchmail-0:6.2.5-6.el4.2.s390x", "4ES:fetchmail-0:6.2.5-6.el4.2.src", "4ES:fetchmail-0:6.2.5-6.el4.2.x86_64", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.2.i386", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.2.ia64", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.2.ppc", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.2.s390", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.2.s390x", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.2.x86_64", "4WS:fetchmail-0:6.2.5-6.el4.2.i386", "4WS:fetchmail-0:6.2.5-6.el4.2.ia64", "4WS:fetchmail-0:6.2.5-6.el4.2.ppc", "4WS:fetchmail-0:6.2.5-6.el4.2.s390", "4WS:fetchmail-0:6.2.5-6.el4.2.s390x", "4WS:fetchmail-0:6.2.5-6.el4.2.src", "4WS:fetchmail-0:6.2.5-6.el4.2.x86_64", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.2.i386", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.2.ia64", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.2.ppc", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.2.s390", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.2.s390x", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:640" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" } ] }
CERTA-2006-AVI-317
Vulnerability from certfr_avis
De nombreuses vulnérabilités ont été identifiées dans le systèmes d'exploitation Mac OS X. Elles concernent plusieurs applications et services, notamment DHCP, bluetooth, fetchmail, gunzip, ImageIO, telnet, OpenSSH ou LaunchServices. Les risques sont variés, certains peuvant conduire à l'exécution de code arbitraire à distance.
Description
De nombreuses vulnérabilités ont été identifiées dans le systèmes d'exploitation Mac OS X. Elles concernent plusieurs applications et services. Parmi celles-ci :
- DHCP : le service bootpd ne gère pas correctement certaines requêtes, pouvant provoquer un débordement de tampon. Une personne malveillante peut profiter de cette vulnérabilité pour exécuter du code arbitraire à distance, par le biais d'une requête spécialement conçue. Le service bootpd n'est cependant pas activé par défaut sur Mac OS X.
- bluetooth : la clé secrète générée automatiquement pour la phase d'association avec d'autres appareils bluetooth n'est pas suffisamment longue. Elle facilite les attaques par recherche exhaustive.
- gunzip : il serait possible, localement, de modifier les permissions de fichiers appartenant à d'autres utilisateurs exécutant gunzip.
- ImageIO : cette application ne gère pas correctement certaines images de type Radiance ou GIF. L'ouverture d'images malveillantes exploitant ces vulnérabilités peut provoquer un déni de service, ou l'exécution de code arbitraire.
- OpenSSH : un utilisateur malveillant peut chercher à se connecter à distance (remote login) sur une machine vulnérable en testant plusieurs identifiants. La répétition de cette opération peut conduire à la découverte de comptes valides sur le serveur et à son mauvais fonctionnement (déni de service).
- telnet : au cours de la connexion à un serveur Telnet distant, un utilisateur malveillant peut accéder à plusieurs variables d'environnement confidentielles à l'insu de l'utilisateur qui s'y connecte.
D'autres vulnérabilités touchent dyld (gestion des liens dynamiques pour les bibliothèques), AFP Server (non activé par défaut), Bom (système de fichiers pour l'installation), Image RAW, WebKit et AppKit. Les risques sont variés, certains pouvant conduire à l'exécution de code arbitraire à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Intel | N/A | la version Mac 0S X 10.4.7 (PPC et Intel) ainsi que celles antérieures ; | ||
Intel | N/A | La version Mac 0S X 10.3.9 ainsi que celles antérieures ; | ||
Intel | N/A | la version Mac 0S X 10.4.7 Server (PPC et Intel) ainsi que celles antérieures. | ||
Intel | N/A | la version Mac 0S X 10.3.9 Server ainsi que celles antérieures ; |
Title | Publication Time | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "la version Mac 0S X 10.4.7 (PPC et Intel) ainsi que celles ant\u00e9rieures ;", "product": { "name": "N/A", "vendor": { "name": "Intel", "scada": false } } }, { "description": "La version Mac 0S X 10.3.9 ainsi que celles ant\u00e9rieures ;", "product": { "name": "N/A", "vendor": { "name": "Intel", "scada": false } } }, { "description": "la version Mac 0S X 10.4.7 Server (PPC et Intel) ainsi que celles ant\u00e9rieures.", "product": { "name": "N/A", "vendor": { "name": "Intel", "scada": false } } }, { "description": "la version Mac 0S X 10.3.9 Server ainsi que celles ant\u00e9rieures ;", "product": { "name": "N/A", "vendor": { "name": "Intel", "scada": false } } } ], "affected_systems_content": null, "content": "## Description\n\nDe nombreuses vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 identifi\u00e9es dans le syst\u00e8mes\nd\u0027exploitation Mac OS X. Elles concernent plusieurs applications et\nservices. Parmi celles-ci :\n\n- DHCP : le service bootpd ne g\u00e8re pas correctement certaines\n requ\u00eates, pouvant provoquer un d\u00e9bordement de tampon. Une personne\n malveillante peut profiter de cette vuln\u00e9rabilit\u00e9 pour ex\u00e9cuter du\n code arbitraire \u00e0 distance, par le biais d\u0027une requ\u00eate sp\u00e9cialement\n con\u00e7ue. Le service bootpd n\u0027est cependant pas activ\u00e9 par d\u00e9faut sur\n Mac OS X.\n- bluetooth : la cl\u00e9 secr\u00e8te g\u00e9n\u00e9r\u00e9e automatiquement pour la phase\n d\u0027association avec d\u0027autres appareils bluetooth n\u0027est pas\n suffisamment longue. Elle facilite les attaques par recherche\n exhaustive.\n- gunzip : il serait possible, localement, de modifier les permissions\n de fichiers appartenant \u00e0 d\u0027autres utilisateurs ex\u00e9cutant gunzip.\n- ImageIO : cette application ne g\u00e8re pas correctement certaines\n images de type Radiance ou GIF. L\u0027ouverture d\u0027images malveillantes\n exploitant ces vuln\u00e9rabilit\u00e9s peut provoquer un d\u00e9ni de service, ou\n l\u0027ex\u00e9cution de code arbitraire.\n- OpenSSH : un utilisateur malveillant peut chercher \u00e0 se connecter \u00e0\n distance (remote login) sur une machine vuln\u00e9rable en testant\n plusieurs identifiants. La r\u00e9p\u00e9tition de cette op\u00e9ration peut\n conduire \u00e0 la d\u00e9couverte de comptes valides sur le serveur et \u00e0 son\n mauvais fonctionnement (d\u00e9ni de service).\n- telnet : au cours de la connexion \u00e0 un serveur Telnet distant, un\n utilisateur malveillant peut acc\u00e9der \u00e0 plusieurs variables\n d\u0027environnement confidentielles \u00e0 l\u0027insu de l\u0027utilisateur qui s\u0027y\n connecte.\n\nD\u0027autres vuln\u00e9rabilit\u00e9s touchent dyld (gestion des liens dynamiques pour\nles biblioth\u00e8ques), AFP Server (non activ\u00e9 par d\u00e9faut), Bom (syst\u00e8me de\nfichiers pour l\u0027installation), Image RAW, WebKit et AppKit. Les risques\nsont vari\u00e9s, certains pouvant conduire \u00e0 l\u0027ex\u00e9cution de code arbitraire\n\u00e0 distance.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2005-4348", "url": "https://www.cve.org/CVERecord?id=CVE-2005-4348" }, { "name": "CVE-2005-3088", "url": "https://www.cve.org/CVERecord?id=CVE-2005-3088" }, { "name": "CVE-2006-3465", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3465" }, { "name": "CVE-2006-1473", "url": "https://www.cve.org/CVERecord?id=CVE-2006-1473" }, { "name": "CVE-2006-3497", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3497" }, { "name": "CVE-2006-3501", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3501" }, { "name": "CVE-2006-3504", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3504" }, { "name": "CVE-2005-0488", "url": "https://www.cve.org/CVERecord?id=CVE-2005-0488" }, { "name": "CVE-2006-0321", "url": "https://www.cve.org/CVERecord?id=CVE-2006-0321" }, { "name": "CVE-2005-1228", "url": "https://www.cve.org/CVERecord?id=CVE-2005-1228" }, { "name": "CVE-2006-0392", "url": "https://www.cve.org/CVERecord?id=CVE-2006-0392" }, { "name": "CVE-2005-0393", "url": "https://www.cve.org/CVERecord?id=CVE-2005-0393" }, { "name": "CVE-2006-3496", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3496" }, { "name": "CVE-2006-3503", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3503" }, { "name": "CVE-2006-0393", "url": "https://www.cve.org/CVERecord?id=CVE-2006-0393" }, { "name": "CVE-2006-3459", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3459" }, { "name": "CVE-2005-0988", "url": "https://www.cve.org/CVERecord?id=CVE-2005-0988" }, { "name": "CVE-2005-2335", "url": "https://www.cve.org/CVERecord?id=CVE-2005-2335" }, { "name": "CVE-2006-3505", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3505" }, { "name": "CVE-2006-3502", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3502" }, { "name": "CVE-2006-3498", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3498" }, { "name": "CVE-2006-3462", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3462" }, { "name": "CVE-2006-3499", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3499" }, { "name": "CVE-2006-3495", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3495" }, { "name": "CVE-2006-3461", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3461" }, { "name": "CVE-2006-3500", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3500" }, { "name": "CVE-2006-1472", "url": "https://www.cve.org/CVERecord?id=CVE-2006-1472" } ], "initial_release_date": "2006-08-02T00:00:00", "last_revision_date": "2006-08-02T00:00:00", "links": [ { "title": "Bulletin de s\u00e9curit\u00e9 2006-004 Apple du 01 ao\u00fbt 2006 :", "url": "http://docs.info.apple.com/article.html?artnum=304063" } ], "reference": "CERTA-2006-AVI-317", "revisions": [ { "description": "version initiale.", "revision_date": "2006-08-02T00:00:00.000000" } ], "risks": [ { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" } ], "summary": "De nombreuses vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 identifi\u00e9es dans le syst\u00e8mes\nd\u0027exploitation Mac OS X. Elles concernent plusieurs applications et\nservices, notamment DHCP, bluetooth, fetchmail, gunzip, ImageIO, telnet,\nOpenSSH ou LaunchServices. Les risques sont vari\u00e9s, certains peuvant\nconduire \u00e0 l\u0027ex\u00e9cution de code arbitraire \u00e0 distance.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans Mac OS X", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Apple du 01/08/2006", "url": null } ] }
fkie_cve-2005-2335
Vulnerability from fkie_nvd
URL | Tags | ||
---|---|---|---|
cve@mitre.org | http://developer.berlios.de/project/shownotes.php?release_id=6617 | Patch | |
cve@mitre.org | http://fetchmail.berlios.de/fetchmail-SA-2005-01.txt | Patch, Vendor Advisory | |
cve@mitre.org | http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html | ||
cve@mitre.org | http://secunia.com/advisories/16176 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/21253 | Vendor Advisory | |
cve@mitre.org | http://www.debian.org/security/2005/dsa-774 | ||
cve@mitre.org | http://www.novell.com/linux/security/advisories/2005_18_sr.html | ||
cve@mitre.org | http://www.osvdb.org/18174 | ||
cve@mitre.org | http://www.redhat.com/archives/fedora-announce-list/2005-July/msg00088.html | ||
cve@mitre.org | http://www.redhat.com/archives/fedora-announce-list/2005-July/msg00089.html | Patch | |
cve@mitre.org | http://www.redhat.com/archives/fedora-announce-list/2005-July/msg00104.html | ||
cve@mitre.org | http://www.redhat.com/support/errata/RHSA-2005-640.html | ||
cve@mitre.org | http://www.securityfocus.com/archive/1/435197/100/0/threaded | ||
cve@mitre.org | http://www.securityfocus.com/archive/1/441856/100/200/threaded | ||
cve@mitre.org | http://www.securityfocus.com/bid/14349 | Patch | |
cve@mitre.org | http://www.securityfocus.com/bid/19289 | ||
cve@mitre.org | http://www.us-cert.gov/cas/techalerts/TA06-214A.html | US Government Resource | |
cve@mitre.org | http://www.vupen.com/english/advisories/2005/1171 | ||
cve@mitre.org | http://www.vupen.com/english/advisories/2006/3101 | ||
cve@mitre.org | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1038 | ||
cve@mitre.org | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1124 | ||
cve@mitre.org | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8833 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://developer.berlios.de/project/shownotes.php?release_id=6617 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://fetchmail.berlios.de/fetchmail-SA-2005-01.txt | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/16176 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/21253 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2005/dsa-774 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.novell.com/linux/security/advisories/2005_18_sr.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.osvdb.org/18174 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/archives/fedora-announce-list/2005-July/msg00088.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/archives/fedora-announce-list/2005-July/msg00089.html | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/archives/fedora-announce-list/2005-July/msg00104.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2005-640.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/435197/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/441856/100/200/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/14349 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/19289 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA06-214A.html | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2005/1171 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2006/3101 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1038 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1124 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8833 |
Vendor | Product | Version | |
---|---|---|---|
fetchmail | fetchmail | * | |
fetchmail | fetchmail | 4.5.1 | |
fetchmail | fetchmail | 4.5.2 | |
fetchmail | fetchmail | 4.5.3 | |
fetchmail | fetchmail | 4.5.4 | |
fetchmail | fetchmail | 4.5.5 | |
fetchmail | fetchmail | 4.5.6 | |
fetchmail | fetchmail | 4.5.7 | |
fetchmail | fetchmail | 4.5.8 | |
fetchmail | fetchmail | 4.6.0 | |
fetchmail | fetchmail | 4.6.1 | |
fetchmail | fetchmail | 4.6.2 | |
fetchmail | fetchmail | 4.6.3 | |
fetchmail | fetchmail | 4.6.4 | |
fetchmail | fetchmail | 4.6.5 | |
fetchmail | fetchmail | 4.6.6 | |
fetchmail | fetchmail | 4.6.7 | |
fetchmail | fetchmail | 4.6.8 | |
fetchmail | fetchmail | 4.6.9 | |
fetchmail | fetchmail | 4.7.0 | |
fetchmail | fetchmail | 4.7.1 | |
fetchmail | fetchmail | 4.7.2 | |
fetchmail | fetchmail | 4.7.3 | |
fetchmail | fetchmail | 4.7.4 | |
fetchmail | fetchmail | 4.7.5 | |
fetchmail | fetchmail | 4.7.6 | |
fetchmail | fetchmail | 4.7.7 | |
fetchmail | fetchmail | 5.0.0 | |
fetchmail | fetchmail | 5.0.1 | |
fetchmail | fetchmail | 5.0.2 | |
fetchmail | fetchmail | 5.0.3 | |
fetchmail | fetchmail | 5.0.4 | |
fetchmail | fetchmail | 5.0.5 | |
fetchmail | fetchmail | 5.0.6 | |
fetchmail | fetchmail | 5.0.7 | |
fetchmail | fetchmail | 5.0.8 | |
fetchmail | fetchmail | 5.1.0 | |
fetchmail | fetchmail | 5.1.4 | |
fetchmail | fetchmail | 5.2.0 | |
fetchmail | fetchmail | 5.2.1 | |
fetchmail | fetchmail | 5.2.3 | |
fetchmail | fetchmail | 5.2.4 | |
fetchmail | fetchmail | 5.2.7 | |
fetchmail | fetchmail | 5.2.8 | |
fetchmail | fetchmail | 5.3.0 | |
fetchmail | fetchmail | 5.3.1 | |
fetchmail | fetchmail | 5.3.3 | |
fetchmail | fetchmail | 5.3.8 | |
fetchmail | fetchmail | 5.4.0 | |
fetchmail | fetchmail | 5.4.3 | |
fetchmail | fetchmail | 5.4.4 | |
fetchmail | fetchmail | 5.4.5 | |
fetchmail | fetchmail | 5.5.0 | |
fetchmail | fetchmail | 5.5.2 | |
fetchmail | fetchmail | 5.5.3 | |
fetchmail | fetchmail | 5.5.5 | |
fetchmail | fetchmail | 5.5.6 | |
fetchmail | fetchmail | 5.6.0 | |
fetchmail | fetchmail | 5.7.0 | |
fetchmail | fetchmail | 5.7.2 | |
fetchmail | fetchmail | 5.7.4 | |
fetchmail | fetchmail | 5.8 | |
fetchmail | fetchmail | 5.8.1 | |
fetchmail | fetchmail | 5.8.2 | |
fetchmail | fetchmail | 5.8.3 | |
fetchmail | fetchmail | 5.8.4 | |
fetchmail | fetchmail | 5.8.5 | |
fetchmail | fetchmail | 5.8.6 | |
fetchmail | fetchmail | 5.8.11 | |
fetchmail | fetchmail | 5.8.13 | |
fetchmail | fetchmail | 5.8.14 | |
fetchmail | fetchmail | 5.8.17 | |
fetchmail | fetchmail | 5.9.0 | |
fetchmail | fetchmail | 5.9.4 | |
fetchmail | fetchmail | 5.9.5 | |
fetchmail | fetchmail | 5.9.8 | |
fetchmail | fetchmail | 5.9.10 | |
fetchmail | fetchmail | 5.9.11 | |
fetchmail | fetchmail | 5.9.13 | |
fetchmail | fetchmail | 6.0.0 | |
fetchmail | fetchmail | 6.1.0 | |
fetchmail | fetchmail | 6.1.3 | |
fetchmail | fetchmail | 6.2.0 | |
fetchmail | fetchmail | 6.2.1 | |
fetchmail | fetchmail | 6.2.2 | |
fetchmail | fetchmail | 6.2.3 | |
fetchmail | fetchmail | 6.2.4 | |
fetchmail | fetchmail | 6.2.5 | |
fetchmail | fetchmail | 6.3.4 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fetchmail:fetchmail:*:*:*:*:*:*:*:*", "matchCriteriaId": "B61F7795-769B-45F4-A178-5D307C23B5DE", "versionEndIncluding": "6.2.5.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "BF519D04-7596-42C6-A1D8-FC1018D1A414", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "9AFEC739-BDFA-4D14-9A04-96FFB71AE330", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "E1923712-7B88-483E-B38A-0EA6FB38EB38", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "C9608A96-D131-401B-B041-09ADEEB59354", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "F4555DBB-B63B-4637-86A9-399B34B27D14", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "D8AB8504-8CD1-4013-9413-1378F3BAE0AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "3DC47DA9-D110-4E6B-9F5B-D17ECB942B40", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.8:*:*:*:*:*:*:*", "matchCriteriaId": "345D0848-958F-4B44-8F31-0793C36A5ADD", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "7E179061-FB6A-44AA-8EAC-4916719D9A28", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "58A6B5F4-C799-45C4-9EAD-A55023767033", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "54FDB8B9-5537-4E08-8FA0-931D4BED43E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "E7EB9B1D-C6B0-494B-8A8C-752E5659EA1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "CC13DE1B-1428-4842-9567-BBE5EEF7042F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "215ED879-1E26-4FF4-8857-18499C5DE3A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "72604F3D-2DE8-4BFF-97D5-4AFA64399201", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "8792F7FF-9E56-4201-89FD-F0146D4F0DF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "B12812E8-1C5B-46CF-A266-EE19C5CD3B12", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.9:*:*:*:*:*:*:*", "matchCriteriaId": "4DEAA0E8-746D-446D-AAEA-0ED287766332", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "7D3E14C3-82AE-4D4A-8963-438BECBA5678", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "4DCFB7BB-2879-4EB7-BE1D-163238E313C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "6ED223B6-1864-415C-96D6-64E1EDE4C840", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "14CBC8ED-CC10-40B6-8AA7-9F1342432ECB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "D3417C2E-1117-4FE7-B2FA-74CAB57235B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.5:*:*:*:*:*:*:*", "matchCriteriaId": "07C61DC4-50D5-44B2-92F8-A59C65144108", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.6:*:*:*:*:*:*:*", "matchCriteriaId": "31A37E19-1E07-4FD0-AC6D-6AC3ED954787", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.7:*:*:*:*:*:*:*", "matchCriteriaId": "570C9443-81CE-42AC-B4A6-3B2ABAD97EC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "853DD3E0-668F-4FAC-BA0B-D4E9C416D646", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "CEF70FCA-5DA4-4C0B-B876-0345FA077D44", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "BF0C4F7C-0003-4C77-AE22-A9C2FCBFAF3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "78D12F53-07DE-447D-8403-40EB75B91955", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "19ECB844-F378-4A94-B9FC-A731B8186013", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "3169AA63-79F6-4B89-9405-8F6A2FB6FD64", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "88D1D54C-81A4-44CE-BE12-798CF7DD2CC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "D6615C7D-09B5-4943-A124-2FF9A0F4B927", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "EF18219F-0406-4D46-90DE-EA2A17C8EFF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "87B56DFD-BDA9-4D8B-BE54-BF59B762D574", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "33EA0CA8-468F-4A94-8DA3-5D820AB65973", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA21C847-57ED-4E7D-9366-6038467D9080", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "0450BD04-15D2-4122-A210-6225B89BDA7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "18428805-AEB2-4BA4-9762-906B59CE74D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "AFCCBB15-DFFE-4A57-A029-E57707D15E04", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "0427B5C8-265C-47C3-9BAB-B2A0EAA1DEE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "89A4B962-BE5B-471C-83EF-674525C5AE83", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "7166ECCB-54FB-44EA-BA80-4D2AAF494AF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "6B309C89-99E2-4F0B-976C-95E44A45ADC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "A3DE7EE7-F627-4955-8D95-1F00F1F85C7D", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "D549098D-FE16-4BCB-91C4-D71A8C8D2E9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "57BFA165-6E2E-49AF-9E2D-3D8923CF36C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "F5C67DFF-A1BE-4486-A11F-CD3729927220", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "1D365E6E-8777-4084-BEC8-7CBF4997D976", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "20C4FF28-0DBA-4995-8252-2D62FF896BC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "F80C6B9B-AFCE-46A1-8DEF-51C1B526EB18", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "BF667DB5-F41E-4E73-A01F-4EC3F60BAD0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "D2B144FA-A901-4CDF-AC3D-7F5E820B7A4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "96774635-9A12-4DAB-BCF6-2D678F244CE9", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "EFD2EE7A-36CB-4A26-8EEB-DACA2864D921", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "C3898EBC-75A9-4DDD-A0AF-2CDEC72DAE4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "4267DCE8-985C-416D-A6B7-536585E5A573", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "50E63EDF-FF0A-447C-A3FC-7BA2414C15CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "61DDD4A1-6185-41B6-A715-4C70F0AA2631", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8:*:*:*:*:*:*:*", "matchCriteriaId": "B10A7E3C-07CD-48A6-9075-5314B4E1EEAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "319955A4-27A8-46FF-ACE7-97E6DF27B2DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "925CF3DD-682B-40E6-900C-23F784CD9239", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "16366780-611E-4217-A614-EBA01421D148", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "43AEA36F-E730-4305-9CB6-738A7152F02E", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.5:*:*:*:*:*:*:*", "matchCriteriaId": "2B9536BA-6334-4957-9632-6D64365B88AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.6:*:*:*:*:*:*:*", "matchCriteriaId": "F52FA32B-8048-4FD7-9D20-20DC5E52098B", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.11:*:*:*:*:*:*:*", "matchCriteriaId": "9FA92DF1-3AAD-46AC-A9E4-E9386C977818", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.13:*:*:*:*:*:*:*", "matchCriteriaId": "837D66DB-F9CB-41F1-A091-BCFBAC2F45B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.14:*:*:*:*:*:*:*", "matchCriteriaId": "74D12B67-6E66-419A-A28F-6306402931EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.17:*:*:*:*:*:*:*", "matchCriteriaId": "A71FCBED-B25D-48E3-916C-FBA9E0DE8D12", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "1A17995E-DCAF-465A-8ABD-F1EA0D538784", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "93D03D78-C56E-4189-97FC-916C918EDFEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "19A66C77-041F-4A12-8A36-233A6B50641C", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C945059C-EF39-486D-A804-FBB8704AB927", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "1258CA65-FBC1-4848-A9E5-A8F5E5D6FBD5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.11:*:*:*:*:*:*:*", "matchCriteriaId": "A91C6418-41F0-46EB-ACFC-FCE907F5AA87", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.13:*:*:*:*:*:*:*", "matchCriteriaId": "0C020534-7596-496C-B9B0-739F58F6F4EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "0A77D40C-6FF5-42BD-9EFB-B532824D7606", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "F04C6A76-2718-4DBA-8972-A3EECDDB1A17", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "38ACD96E-5582-4ED0-BBB1-C891094D8217", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "264386DA-747F-492C-B660-D49BE9DB7139", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "DC4066AC-BE10-4189-86F6-BF94443738DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "1C25A146-50D5-4BA2-ABA2-20BF8784D7DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "72E76256-997F-4229-9B03-7BC3074F359D", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "7A717C50-2C5A-4CD1-B2E6-8CDF450940CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "61F908FF-9986-4F71-B0B6-D6A86555EF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "816E9640-A932-4E2F-9793-689F80D2AA89", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in the POP3 client in Fetchmail before 6.2.5.2 allows remote POP3 servers to cause a denial of service and possibly execute arbitrary code via long UIDL responses. NOTE: a typo in an advisory accidentally used the wrong CVE identifier for the Fetchmail issue. This is the correct identifier." } ], "id": "CVE-2005-2335", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-07-27T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://developer.berlios.de/project/shownotes.php?release_id=6617" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://fetchmail.berlios.de/fetchmail-SA-2005-01.txt" }, { "source": "cve@mitre.org", "url": "http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/16176" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21253" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2005/dsa-774" }, { "source": "cve@mitre.org", "url": "http://www.novell.com/linux/security/advisories/2005_18_sr.html" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/18174" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/archives/fedora-announce-list/2005-July/msg00088.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.redhat.com/archives/fedora-announce-list/2005-July/msg00089.html" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/archives/fedora-announce-list/2005-July/msg00104.html" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2005-640.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/435197/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/441856/100/200/threaded" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/14349" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/19289" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA06-214A.html" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2005/1171" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2006/3101" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1038" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1124" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8833" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://developer.berlios.de/project/shownotes.php?release_id=6617" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://fetchmail.berlios.de/fetchmail-SA-2005-01.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/16176" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21253" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2005/dsa-774" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.novell.com/linux/security/advisories/2005_18_sr.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/18174" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/archives/fedora-announce-list/2005-July/msg00088.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.redhat.com/archives/fedora-announce-list/2005-July/msg00089.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/archives/fedora-announce-list/2005-July/msg00104.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2005-640.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/435197/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/441856/100/200/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/14349" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/19289" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA06-214A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2005/1171" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/3101" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1038" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1124" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8833" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.