Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2006-5867 (GCVE-0-2006-5867)
Vulnerability from cvelistv5
- n/a
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T20:04:55.652Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SSA:2007-024-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.517995" }, { "name": "USN-405-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-405-1" }, { "name": "24966", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24966" }, { "name": "31580", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/31580" }, { "name": "23781", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/23781" }, { "name": "24174", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24174" }, { "name": "DSA-1259", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2007/dsa-1259" }, { "name": "23838", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/23838" }, { "name": "24151", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24151" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://docs.info.apple.com/article.html?artnum=305391" }, { "name": "23714", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/23714" }, { "name": "21903", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/21903" }, { "name": "24284", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24284" }, { "name": "23631", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/23631" }, { "name": "24007", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24007" }, { "name": "23804", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/23804" }, { "name": "20070105 fetchmail security announcement 2006-02 (CVE-2006-5867)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/456115/100/0/threaded" }, { "name": "ADV-2007-0088", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/0088" }, { "name": "SUSE-SR:2007:004", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2007_4_sr.html" }, { "name": "TA07-109A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-109A.html" }, { "name": "23695", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/23695" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://fetchmail.berlios.de/fetchmail-SA-2006-02.txt" }, { "name": "MDKSA-2007:016", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:016" }, { "name": "FEDORA-2007-041", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://fedoranews.org/cms/node/2429" }, { "name": "23923", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/23923" }, { "name": "OpenPKG-SA-2007.004", "tags": [ "vendor-advisory", "x_refsource_OPENPKG", "x_transferred" ], "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.004.html" }, { "name": "2007-0007", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX", "x_transferred" ], "url": "http://www.trustix.org/errata/2007/0007" }, { "name": "20070218 Re: [SECURITY] [DSA 1259-1] New fetchmail packages fix information disclosure", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/460528/100/0/threaded" }, { "name": "GLSA-200701-13", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200701-13.xml" }, { "name": "1017478", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1017478" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://issues.rpath.com/browse/RPL-919" }, { "name": "20070201-01-P", "tags": [ "vendor-advisory", "x_refsource_SGI", "x_transferred" ], "url": "ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc" }, { "name": "APPLE-SA-2007-04-19", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html" }, { "name": "ADV-2007-1470", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/1470" }, { "name": "ADV-2007-0087", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/0087" }, { "name": "RHSA-2007:0018", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0018.html" }, { "name": "oval:org.mitre.oval:def:10566", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10566" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-01-04T00:00:00", "descriptions": [ { "lang": "en", "value": "fetchmail before 6.3.6-rc4 does not properly enforce TLS and may transmit cleartext passwords over unsecured links if certain circumstances occur, which allows remote attackers to obtain sensitive information via man-in-the-middle (MITM) attacks." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-17T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "SSA:2007-024-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.517995" }, { "name": "USN-405-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-405-1" }, { "name": "24966", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24966" }, { "name": "31580", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/31580" }, { "name": "23781", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/23781" }, { "name": "24174", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24174" }, { "name": "DSA-1259", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2007/dsa-1259" }, { "name": "23838", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/23838" }, { "name": "24151", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24151" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://docs.info.apple.com/article.html?artnum=305391" }, { "name": "23714", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/23714" }, { "name": "21903", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/21903" }, { "name": "24284", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24284" }, { "name": "23631", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/23631" }, { "name": "24007", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24007" }, { "name": "23804", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/23804" }, { "name": "20070105 fetchmail security announcement 2006-02 (CVE-2006-5867)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/456115/100/0/threaded" }, { "name": "ADV-2007-0088", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/0088" }, { "name": "SUSE-SR:2007:004", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2007_4_sr.html" }, { "name": "TA07-109A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-109A.html" }, { "name": "23695", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/23695" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://fetchmail.berlios.de/fetchmail-SA-2006-02.txt" }, { "name": "MDKSA-2007:016", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:016" }, { "name": "FEDORA-2007-041", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://fedoranews.org/cms/node/2429" }, { "name": "23923", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/23923" }, { "name": "OpenPKG-SA-2007.004", "tags": [ "vendor-advisory", "x_refsource_OPENPKG" ], "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.004.html" }, { "name": "2007-0007", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX" ], "url": "http://www.trustix.org/errata/2007/0007" }, { "name": "20070218 Re: [SECURITY] [DSA 1259-1] New fetchmail packages fix information disclosure", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/460528/100/0/threaded" }, { "name": "GLSA-200701-13", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200701-13.xml" }, { "name": "1017478", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1017478" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://issues.rpath.com/browse/RPL-919" }, { "name": "20070201-01-P", "tags": [ "vendor-advisory", "x_refsource_SGI" ], "url": "ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc" }, { "name": "APPLE-SA-2007-04-19", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html" }, { "name": "ADV-2007-1470", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/1470" }, { "name": "ADV-2007-0087", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/0087" }, { "name": "RHSA-2007:0018", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0018.html" }, { "name": "oval:org.mitre.oval:def:10566", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10566" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-5867", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "fetchmail before 6.3.6-rc4 does not properly enforce TLS and may transmit cleartext passwords over unsecured links if certain circumstances occur, which allows remote attackers to obtain sensitive information via man-in-the-middle (MITM) attacks." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "SSA:2007-024-01", "refsource": "SLACKWARE", "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.517995" }, { "name": "USN-405-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/usn-405-1" }, { "name": "24966", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24966" }, { "name": "31580", "refsource": "OSVDB", "url": "http://osvdb.org/31580" }, { "name": "23781", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/23781" }, { "name": "24174", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24174" }, { "name": "DSA-1259", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2007/dsa-1259" }, { "name": "23838", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/23838" }, { "name": "24151", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24151" }, { "name": "http://docs.info.apple.com/article.html?artnum=305391", "refsource": "CONFIRM", "url": "http://docs.info.apple.com/article.html?artnum=305391" }, { "name": "23714", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/23714" }, { "name": "21903", "refsource": "BID", "url": "http://www.securityfocus.com/bid/21903" }, { "name": "24284", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24284" }, { "name": "23631", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/23631" }, { "name": "24007", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24007" }, { "name": "23804", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/23804" }, { "name": "20070105 fetchmail security announcement 2006-02 (CVE-2006-5867)", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/456115/100/0/threaded" }, { "name": "ADV-2007-0088", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/0088" }, { "name": "SUSE-SR:2007:004", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2007_4_sr.html" }, { "name": "TA07-109A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA07-109A.html" }, { "name": "23695", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/23695" }, { "name": "http://fetchmail.berlios.de/fetchmail-SA-2006-02.txt", "refsource": "CONFIRM", "url": "http://fetchmail.berlios.de/fetchmail-SA-2006-02.txt" }, { "name": "MDKSA-2007:016", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:016" }, { "name": "FEDORA-2007-041", "refsource": "FEDORA", "url": "http://fedoranews.org/cms/node/2429" }, { "name": "23923", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/23923" }, { "name": "OpenPKG-SA-2007.004", "refsource": "OPENPKG", "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.004.html" }, { "name": "2007-0007", "refsource": "TRUSTIX", "url": "http://www.trustix.org/errata/2007/0007" }, { "name": "20070218 Re: [SECURITY] [DSA 1259-1] New fetchmail packages fix information disclosure", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/460528/100/0/threaded" }, { "name": "GLSA-200701-13", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200701-13.xml" }, { "name": "1017478", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1017478" }, { "name": "https://issues.rpath.com/browse/RPL-919", "refsource": "CONFIRM", "url": "https://issues.rpath.com/browse/RPL-919" }, { "name": "20070201-01-P", "refsource": "SGI", "url": "ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc" }, { "name": "APPLE-SA-2007-04-19", "refsource": "APPLE", "url": "http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html" }, { "name": "ADV-2007-1470", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/1470" }, { "name": "ADV-2007-0087", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/0087" }, { "name": "RHSA-2007:0018", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2007-0018.html" }, { "name": "oval:org.mitre.oval:def:10566", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10566" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-5867", "datePublished": "2007-01-09T00:00:00", "dateReserved": "2006-11-14T00:00:00", "dateUpdated": "2024-08-07T20:04:55.652Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2006-5867\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2006-12-31T05:00:00.000\",\"lastModified\":\"2025-04-09T00:30:58.490\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"fetchmail before 6.3.6-rc4 does not properly enforce TLS and may transmit cleartext passwords over unsecured links if certain circumstances occur, which allows remote attackers to obtain sensitive information via man-in-the-middle (MITM) attacks.\"},{\"lang\":\"es\",\"value\":\"fetchmail anetrior a 6.3.6-rc4 no fuerza TLS adecuadamente y puede transmitir contrase\u00f1as en texto en claro sobre enlaces inseguros si se producen determinadas circunstancias, lo cual permite a atacantes remotos obtener informaci\u00f3n sensible mediante ataques de hombre-en-medio (man-in-the-middle o MITM).\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:C/I:N/A:N\",\"baseScore\":7.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:*:rc3:*:*:*:*:*:*\",\"versionEndIncluding\":\"6.3.6\",\"matchCriteriaId\":\"66F9758A-147C-4CB3-B54F-43EC86B9D344\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:4.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF519D04-7596-42C6-A1D8-FC1018D1A414\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:4.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9AFEC739-BDFA-4D14-9A04-96FFB71AE330\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:4.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1923712-7B88-483E-B38A-0EA6FB38EB38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:4.5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9608A96-D131-401B-B041-09ADEEB59354\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:4.5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4555DBB-B63B-4637-86A9-399B34B27D14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:4.5.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8AB8504-8CD1-4013-9413-1378F3BAE0AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:4.5.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DC47DA9-D110-4E6B-9F5B-D17ECB942B40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:4.5.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"345D0848-958F-4B44-8F31-0793C36A5ADD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:4.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E179061-FB6A-44AA-8EAC-4916719D9A28\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:4.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58A6B5F4-C799-45C4-9EAD-A55023767033\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:4.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54FDB8B9-5537-4E08-8FA0-931D4BED43E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:4.6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7EB9B1D-C6B0-494B-8A8C-752E5659EA1D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:4.6.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC13DE1B-1428-4842-9567-BBE5EEF7042F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:4.6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"215ED879-1E26-4FF4-8857-18499C5DE3A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:4.6.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72604F3D-2DE8-4BFF-97D5-4AFA64399201\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:4.6.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8792F7FF-9E56-4201-89FD-F0146D4F0DF9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:4.6.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B12812E8-1C5B-46CF-A266-EE19C5CD3B12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:4.6.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DEAA0E8-746D-446D-AAEA-0ED287766332\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:4.7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D3E14C3-82AE-4D4A-8963-438BECBA5678\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:4.7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DCFB7BB-2879-4EB7-BE1D-163238E313C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:4.7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6ED223B6-1864-415C-96D6-64E1EDE4C840\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:4.7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"14CBC8ED-CC10-40B6-8AA7-9F1342432ECB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:4.7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3417C2E-1117-4FE7-B2FA-74CAB57235B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:4.7.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07C61DC4-50D5-44B2-92F8-A59C65144108\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:4.7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31A37E19-1E07-4FD0-AC6D-6AC3ED954787\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:4.7.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"570C9443-81CE-42AC-B4A6-3B2ABAD97EC5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"853DD3E0-668F-4FAC-BA0B-D4E9C416D646\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEF70FCA-5DA4-4C0B-B876-0345FA077D44\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF0C4F7C-0003-4C77-AE22-A9C2FCBFAF3B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78D12F53-07DE-447D-8403-40EB75B91955\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19ECB844-F378-4A94-B9FC-A731B8186013\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3169AA63-79F6-4B89-9405-8F6A2FB6FD64\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88D1D54C-81A4-44CE-BE12-798CF7DD2CC4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6615C7D-09B5-4943-A124-2FF9A0F4B927\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF18219F-0406-4D46-90DE-EA2A17C8EFF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87B56DFD-BDA9-4D8B-BE54-BF59B762D574\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33EA0CA8-468F-4A94-8DA3-5D820AB65973\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA21C847-57ED-4E7D-9366-6038467D9080\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0450BD04-15D2-4122-A210-6225B89BDA7F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18428805-AEB2-4BA4-9762-906B59CE74D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFCCBB15-DFFE-4A57-A029-E57707D15E04\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.2.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0427B5C8-265C-47C3-9BAB-B2A0EAA1DEE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.2.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89A4B962-BE5B-471C-83EF-674525C5AE83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7166ECCB-54FB-44EA-BA80-4D2AAF494AF2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B309C89-99E2-4F0B-976C-95E44A45ADC5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3DE7EE7-F627-4955-8D95-1F00F1F85C7D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.3.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D549098D-FE16-4BCB-91C4-D71A8C8D2E9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57BFA165-6E2E-49AF-9E2D-3D8923CF36C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5C67DFF-A1BE-4486-A11F-CD3729927220\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D365E6E-8777-4084-BEC8-7CBF4997D976\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20C4FF28-0DBA-4995-8252-2D62FF896BC4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F80C6B9B-AFCE-46A1-8DEF-51C1B526EB18\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF667DB5-F41E-4E73-A01F-4EC3F60BAD0C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2B144FA-A901-4CDF-AC3D-7F5E820B7A4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96774635-9A12-4DAB-BCF6-2D678F244CE9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.5.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFD2EE7A-36CB-4A26-8EEB-DACA2864D921\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3898EBC-75A9-4DDD-A0AF-2CDEC72DAE4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4267DCE8-985C-416D-A6B7-536585E5A573\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50E63EDF-FF0A-447C-A3FC-7BA2414C15CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61DDD4A1-6185-41B6-A715-4C70F0AA2631\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B10A7E3C-07CD-48A6-9075-5314B4E1EEAB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"319955A4-27A8-46FF-ACE7-97E6DF27B2DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"925CF3DD-682B-40E6-900C-23F784CD9239\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.8.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16366780-611E-4217-A614-EBA01421D148\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.8.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43AEA36F-E730-4305-9CB6-738A7152F02E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.8.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B9536BA-6334-4957-9632-6D64365B88AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.8.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F52FA32B-8048-4FD7-9D20-20DC5E52098B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.8.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FA92DF1-3AAD-46AC-A9E4-E9386C977818\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.8.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"837D66DB-F9CB-41F1-A091-BCFBAC2F45B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.8.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74D12B67-6E66-419A-A28F-6306402931EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.8.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A71FCBED-B25D-48E3-916C-FBA9E0DE8D12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A17995E-DCAF-465A-8ABD-F1EA0D538784\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.9.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93D03D78-C56E-4189-97FC-916C918EDFEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.9.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19A66C77-041F-4A12-8A36-233A6B50641C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.9.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C945059C-EF39-486D-A804-FBB8704AB927\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.9.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1258CA65-FBC1-4848-A9E5-A8F5E5D6FBD5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.9.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A91C6418-41F0-46EB-ACFC-FCE907F5AA87\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:5.9.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C020534-7596-496C-B9B0-739F58F6F4EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:6.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A77D40C-6FF5-42BD-9EFB-B532824D7606\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:6.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F04C6A76-2718-4DBA-8972-A3EECDDB1A17\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:6.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38ACD96E-5582-4ED0-BBB1-C891094D8217\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:6.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"264386DA-747F-492C-B660-D49BE9DB7139\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:6.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC4066AC-BE10-4189-86F6-BF94443738DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:6.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C25A146-50D5-4BA2-ABA2-20BF8784D7DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:6.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72E76256-997F-4229-9B03-7BC3074F359D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:6.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A717C50-2C5A-4CD1-B2E6-8CDF450940CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:6.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61F908FF-9986-4F71-B0B6-D6A86555EF56\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:6.2.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0C1F99C-A246-40D3-B84A-5D11FF24AC1B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:6.2.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"028F7F83-AF15-443B-A7DB-4E695E62EAFB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:6.2.5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B418C3CE-E6E6-401D-AD83-5BB181009A7F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:6.2.6:pre4:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BF06FD2-0A4C-4557-B8EF-F0F021179498\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:6.2.6:pre8:*:*:*:*:*:*\",\"matchCriteriaId\":\"38C949C2-07A0-4FE4-8FBF-86215CB999CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:6.2.6:pre9:*:*:*:*:*:*\",\"matchCriteriaId\":\"88B23630-79DD-4B69-BB01-286193BA562E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc10:*:*:*:*:*:*\",\"matchCriteriaId\":\"5FE21564-68C0-4765-BA40-9D3046C4CB14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"208102ED-6F22-44C5-BAF1-FD85EACF208F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1CF7767-EB24-44E2-8E59-B4DBC99AFD23\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF3D6D4C-5FD8-4EE1-A34A-99D397F09E85\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"D63D88C1-B201-4D48-9659-5802DC4FD3EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc8:*:*:*:*:*:*\",\"matchCriteriaId\":\"16463B23-E884-467E-9F63-6B57EED39856\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc9:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F2C03AF-666D-4AF6-BC69-F8B081EB41AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:6.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84F90AFA-4B13-46A0-89D7-4065300C94C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:6.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5DAD0F05-8B55-43ED-89D5-61A19F41EDFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:6.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99053698-7F8B-4E71-8647-1A8B0DF7CEB1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:6.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9314F22D-22A8-4374-A2BF-3C64CF1F69BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:6.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"816E9640-A932-4E2F-9793-689F80D2AA89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:6.3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D09BB43-6CBA-499B-91D1-BA256A65E40D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"B98AFEDF-2BAB-4588-94E0-35AEA5F1B514\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E8BAB5B-4DBC-4D05-B5E2-591573BC05FF\"}]}]}],\"references\":[{\"url\":\"ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://docs.info.apple.com/article.html?artnum=305391\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://fedoranews.org/cms/node/2429\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://fetchmail.berlios.de/fetchmail-SA-2006-02.txt\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://osvdb.org/31580\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/23631\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/23695\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/23714\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/23781\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/23804\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/23838\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/23923\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/24007\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/24151\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/24174\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/24284\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/24966\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://security.gentoo.org/glsa/glsa-200701-13.xml\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://securitytracker.com/id?1017478\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.517995\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2007/dsa-1259\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2007:016\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2007_4_sr.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.004.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-0018.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/456115/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/460528/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/21903\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.trustix.org/errata/2007/0007\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ubuntu.com/usn/usn-405-1\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA07-109A.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.vupen.com/english/advisories/2007/0087\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/0088\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/1470\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://issues.rpath.com/browse/RPL-919\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10566\",\"source\":\"cve@mitre.org\"},{\"url\":\"ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://docs.info.apple.com/article.html?artnum=305391\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://fedoranews.org/cms/node/2429\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://fetchmail.berlios.de/fetchmail-SA-2006-02.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://osvdb.org/31580\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/23631\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/23695\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/23714\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/23781\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/23804\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/23838\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/23923\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/24007\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/24151\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/24174\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/24284\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/24966\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://security.gentoo.org/glsa/glsa-200701-13.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securitytracker.com/id?1017478\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.517995\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2007/dsa-1259\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2007:016\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2007_4_sr.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.004.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-0018.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/456115/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/460528/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/21903\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.trustix.org/errata/2007/0007\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/usn-405-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA07-109A.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.vupen.com/english/advisories/2007/0087\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/0088\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/1470\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://issues.rpath.com/browse/RPL-919\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10566\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
rhsa-2007:0018
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated fetchmail packages that fix two security issues are now available.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "Fetchmail is a remote mail retrieval and forwarding utility.\n\nA denial of service flaw was found when Fetchmail was run in multidrop\nmode. A malicious mail server could send a message without headers which\nwould cause Fetchmail to crash (CVE-2005-4348). This issue did not affect\nthe version of Fetchmail shipped with Red Hat Enterprise Linux 2.1 or 3.\n\nA flaw was found in the way Fetchmail used TLS encryption to connect to\nremote hosts. Fetchmail provided no way to enforce the use of TLS\nencryption and would not authenticate POP3 protocol connections properly\n(CVE-2006-5867). This update corrects this issue by enforcing TLS\nencryption when the \"sslproto\" configuration directive is set to \"tls1\". \n\nUsers of Fetchmail should update to these packages, which contain \nbackported patches to correct these issues.\n\nNote: This update may break configurations which assumed that Fetchmail\nwould use plain-text authentication if TLS encryption is not supported by\nthe POP3 server even if the \"sslproto\" directive is set to \"tls1\". If you\nare using a custom configuration that depended on this behavior you will\nneed to modify your configuration appropriately after installing this update.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2007:0018", "url": "https://access.redhat.com/errata/RHSA-2007:0018" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "http://fetchmail.berlios.de/fetchmail-SA-2005-03.txt", "url": "http://fetchmail.berlios.de/fetchmail-SA-2005-03.txt" }, { "category": "external", "summary": "http://fetchmail.berlios.de/fetchmail-SA-2006-03.txt", "url": "http://fetchmail.berlios.de/fetchmail-SA-2006-03.txt" }, { "category": "external", "summary": "176266", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=176266" }, { "category": "external", "summary": "221981", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=221981" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2007/rhsa-2007_0018.json" } ], "title": "Red Hat Security Advisory: fetchmail security update", "tracking": { "current_release_date": "2025-10-09T12:43:33+00:00", "generator": { "date": "2025-10-09T12:43:33+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.9" } }, "id": "RHSA-2007:0018", "initial_release_date": "2007-01-31T17:20:00+00:00", "revision_history": [ { "date": "2007-01-31T17:20:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2007-01-31T12:20:07+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-10-09T12:43:33+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 3", "product": { "name": "Red Hat Enterprise Linux AS version 3", "product_id": "3AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::as" } } }, { "category": "product_name", "name": "Red Hat Desktop version 3", "product": { "name": "Red Hat Desktop version 3", "product_id": "3Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 3", "product": { "name": "Red Hat Enterprise Linux ES version 3", "product_id": "3ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 3", "product": { "name": "Red Hat Enterprise Linux WS version 3", "product_id": "3WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::ws" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product": { "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::as" } } }, { "category": "product_name", "name": "Red Hat Linux Advanced Workstation 2.1", "product": { "name": "Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::aw" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 2.1", "product": { "name": "Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 2.1", "product": { "name": "Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::ws" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64", "product": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64", "product_id": "fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.0-3.el3.3?arch=ia64" } } }, { "category": "product_version", "name": "fetchmail-0:6.2.0-3.el3.3.ia64", "product": { "name": "fetchmail-0:6.2.0-3.el3.3.ia64", "product_id": "fetchmail-0:6.2.0-3.el3.3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@6.2.0-3.el3.3?arch=ia64" } } }, { "category": "product_version", "name": "fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64", "product": { "name": "fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64", "product_id": "fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@5.9.0-21.7.3.el2.1.4?arch=ia64" } } }, { "category": "product_version", "name": "fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64", "product": { "name": "fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64", "product_id": "fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmailconf@5.9.0-21.7.3.el2.1.4?arch=ia64" } } }, { "category": "product_version", "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64", "product": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64", "product_id": "fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.5-6.el4.5?arch=ia64" } } }, { "category": "product_version", "name": "fetchmail-0:6.2.5-6.el4.5.ia64", "product": { "name": "fetchmail-0:6.2.5-6.el4.5.ia64", "product_id": "fetchmail-0:6.2.5-6.el4.5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@6.2.5-6.el4.5?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64", "product": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64", "product_id": "fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.0-3.el3.3?arch=x86_64" } } }, { "category": "product_version", "name": "fetchmail-0:6.2.0-3.el3.3.x86_64", "product": { "name": "fetchmail-0:6.2.0-3.el3.3.x86_64", "product_id": "fetchmail-0:6.2.0-3.el3.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@6.2.0-3.el3.3?arch=x86_64" } } }, { "category": "product_version", "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64", "product": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64", "product_id": "fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.5-6.el4.5?arch=x86_64" } } }, { "category": "product_version", "name": "fetchmail-0:6.2.5-6.el4.5.x86_64", "product": { "name": "fetchmail-0:6.2.5-6.el4.5.x86_64", "product_id": "fetchmail-0:6.2.5-6.el4.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@6.2.5-6.el4.5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.i386", "product": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.i386", "product_id": "fetchmail-debuginfo-0:6.2.0-3.el3.3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.0-3.el3.3?arch=i386" } } }, { "category": "product_version", "name": "fetchmail-0:6.2.0-3.el3.3.i386", "product": { "name": "fetchmail-0:6.2.0-3.el3.3.i386", "product_id": "fetchmail-0:6.2.0-3.el3.3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@6.2.0-3.el3.3?arch=i386" } } }, { "category": "product_version", "name": "fetchmail-0:5.9.0-21.7.3.el2.1.4.i386", "product": { "name": "fetchmail-0:5.9.0-21.7.3.el2.1.4.i386", "product_id": "fetchmail-0:5.9.0-21.7.3.el2.1.4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@5.9.0-21.7.3.el2.1.4?arch=i386" } } }, { "category": "product_version", "name": "fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386", "product": { "name": "fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386", "product_id": "fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmailconf@5.9.0-21.7.3.el2.1.4?arch=i386" } } }, { "category": "product_version", "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.i386", "product": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.i386", "product_id": "fetchmail-debuginfo-0:6.2.5-6.el4.5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.5-6.el4.5?arch=i386" } } }, { "category": "product_version", "name": "fetchmail-0:6.2.5-6.el4.5.i386", "product": { "name": "fetchmail-0:6.2.5-6.el4.5.i386", "product_id": "fetchmail-0:6.2.5-6.el4.5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@6.2.5-6.el4.5?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "fetchmail-0:6.2.0-3.el3.3.src", "product": { "name": "fetchmail-0:6.2.0-3.el3.3.src", "product_id": "fetchmail-0:6.2.0-3.el3.3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@6.2.0-3.el3.3?arch=src" } } }, { "category": "product_version", "name": "fetchmail-0:5.9.0-21.7.3.el2.1.4.src", "product": { "name": "fetchmail-0:5.9.0-21.7.3.el2.1.4.src", "product_id": "fetchmail-0:5.9.0-21.7.3.el2.1.4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@5.9.0-21.7.3.el2.1.4?arch=src" } } }, { "category": "product_version", "name": "fetchmail-0:6.2.5-6.el4.5.src", "product": { "name": "fetchmail-0:6.2.5-6.el4.5.src", "product_id": "fetchmail-0:6.2.5-6.el4.5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@6.2.5-6.el4.5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc", "product": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc", "product_id": "fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.0-3.el3.3?arch=ppc" } } }, { "category": "product_version", "name": "fetchmail-0:6.2.0-3.el3.3.ppc", "product": { "name": "fetchmail-0:6.2.0-3.el3.3.ppc", "product_id": "fetchmail-0:6.2.0-3.el3.3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@6.2.0-3.el3.3?arch=ppc" } } }, { "category": "product_version", "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc", "product": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc", "product_id": "fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.5-6.el4.5?arch=ppc" } } }, { "category": "product_version", "name": "fetchmail-0:6.2.5-6.el4.5.ppc", "product": { "name": "fetchmail-0:6.2.5-6.el4.5.ppc", "product_id": "fetchmail-0:6.2.5-6.el4.5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@6.2.5-6.el4.5?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x", "product": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x", "product_id": "fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.0-3.el3.3?arch=s390x" } } }, { "category": "product_version", "name": "fetchmail-0:6.2.0-3.el3.3.s390x", "product": { "name": "fetchmail-0:6.2.0-3.el3.3.s390x", "product_id": "fetchmail-0:6.2.0-3.el3.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@6.2.0-3.el3.3?arch=s390x" } } }, { "category": "product_version", "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x", "product": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x", "product_id": "fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.5-6.el4.5?arch=s390x" } } }, { "category": "product_version", "name": "fetchmail-0:6.2.5-6.el4.5.s390x", "product": { "name": "fetchmail-0:6.2.5-6.el4.5.s390x", "product_id": "fetchmail-0:6.2.5-6.el4.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@6.2.5-6.el4.5?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.s390", "product": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.s390", "product_id": "fetchmail-debuginfo-0:6.2.0-3.el3.3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.0-3.el3.3?arch=s390" } } }, { "category": "product_version", "name": "fetchmail-0:6.2.0-3.el3.3.s390", "product": { "name": "fetchmail-0:6.2.0-3.el3.3.s390", "product_id": "fetchmail-0:6.2.0-3.el3.3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@6.2.0-3.el3.3?arch=s390" } } }, { "category": "product_version", "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.s390", "product": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.s390", "product_id": "fetchmail-debuginfo-0:6.2.5-6.el4.5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.5-6.el4.5?arch=s390" } } }, { "category": "product_version", "name": "fetchmail-0:6.2.5-6.el4.5.s390", "product": { "name": "fetchmail-0:6.2.5-6.el4.5.s390", "product_id": "fetchmail-0:6.2.5-6.el4.5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@6.2.5-6.el4.5?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:5.9.0-21.7.3.el2.1.4.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:fetchmail-0:5.9.0-21.7.3.el2.1.4.i386" }, "product_reference": "fetchmail-0:5.9.0-21.7.3.el2.1.4.i386", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64" }, "product_reference": "fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:5.9.0-21.7.3.el2.1.4.src as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:fetchmail-0:5.9.0-21.7.3.el2.1.4.src" }, "product_reference": "fetchmail-0:5.9.0-21.7.3.el2.1.4.src", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386" }, "product_reference": "fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64" }, "product_reference": "fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:5.9.0-21.7.3.el2.1.4.i386 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:fetchmail-0:5.9.0-21.7.3.el2.1.4.i386" }, "product_reference": "fetchmail-0:5.9.0-21.7.3.el2.1.4.i386", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64" }, "product_reference": "fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:5.9.0-21.7.3.el2.1.4.src as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:fetchmail-0:5.9.0-21.7.3.el2.1.4.src" }, "product_reference": "fetchmail-0:5.9.0-21.7.3.el2.1.4.src", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386" }, "product_reference": "fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64" }, "product_reference": "fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:5.9.0-21.7.3.el2.1.4.i386 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:fetchmail-0:5.9.0-21.7.3.el2.1.4.i386" }, "product_reference": "fetchmail-0:5.9.0-21.7.3.el2.1.4.i386", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64" }, "product_reference": "fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:5.9.0-21.7.3.el2.1.4.src as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:fetchmail-0:5.9.0-21.7.3.el2.1.4.src" }, "product_reference": "fetchmail-0:5.9.0-21.7.3.el2.1.4.src", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386" }, "product_reference": "fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64" }, "product_reference": "fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:5.9.0-21.7.3.el2.1.4.i386 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:fetchmail-0:5.9.0-21.7.3.el2.1.4.i386" }, "product_reference": "fetchmail-0:5.9.0-21.7.3.el2.1.4.i386", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64" }, "product_reference": "fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:5.9.0-21.7.3.el2.1.4.src as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:fetchmail-0:5.9.0-21.7.3.el2.1.4.src" }, "product_reference": "fetchmail-0:5.9.0-21.7.3.el2.1.4.src", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386" }, "product_reference": "fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64" }, "product_reference": "fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.3.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:fetchmail-0:6.2.0-3.el3.3.i386" }, "product_reference": "fetchmail-0:6.2.0-3.el3.3.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.3.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:fetchmail-0:6.2.0-3.el3.3.ia64" }, "product_reference": "fetchmail-0:6.2.0-3.el3.3.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.3.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:fetchmail-0:6.2.0-3.el3.3.ppc" }, "product_reference": "fetchmail-0:6.2.0-3.el3.3.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.3.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:fetchmail-0:6.2.0-3.el3.3.s390" }, "product_reference": "fetchmail-0:6.2.0-3.el3.3.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.3.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:fetchmail-0:6.2.0-3.el3.3.s390x" }, "product_reference": "fetchmail-0:6.2.0-3.el3.3.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.3.src as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:fetchmail-0:6.2.0-3.el3.3.src" }, "product_reference": "fetchmail-0:6.2.0-3.el3.3.src", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.3.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:fetchmail-0:6.2.0-3.el3.3.x86_64" }, "product_reference": "fetchmail-0:6.2.0-3.el3.3.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.i386" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.3.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.3.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.3.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:fetchmail-0:6.2.0-3.el3.3.i386" }, "product_reference": "fetchmail-0:6.2.0-3.el3.3.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.3.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:fetchmail-0:6.2.0-3.el3.3.ia64" }, "product_reference": "fetchmail-0:6.2.0-3.el3.3.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.3.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:fetchmail-0:6.2.0-3.el3.3.ppc" }, "product_reference": "fetchmail-0:6.2.0-3.el3.3.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.3.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:fetchmail-0:6.2.0-3.el3.3.s390" }, "product_reference": "fetchmail-0:6.2.0-3.el3.3.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.3.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:fetchmail-0:6.2.0-3.el3.3.s390x" }, "product_reference": "fetchmail-0:6.2.0-3.el3.3.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.3.src as a component of Red Hat Desktop version 3", "product_id": "3Desktop:fetchmail-0:6.2.0-3.el3.3.src" }, "product_reference": "fetchmail-0:6.2.0-3.el3.3.src", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.3.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:fetchmail-0:6.2.0-3.el3.3.x86_64" }, "product_reference": "fetchmail-0:6.2.0-3.el3.3.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.i386" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.3.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.3.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.3.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:fetchmail-0:6.2.0-3.el3.3.i386" }, "product_reference": "fetchmail-0:6.2.0-3.el3.3.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.3.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:fetchmail-0:6.2.0-3.el3.3.ia64" }, "product_reference": "fetchmail-0:6.2.0-3.el3.3.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.3.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:fetchmail-0:6.2.0-3.el3.3.ppc" }, "product_reference": "fetchmail-0:6.2.0-3.el3.3.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.3.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:fetchmail-0:6.2.0-3.el3.3.s390" }, "product_reference": "fetchmail-0:6.2.0-3.el3.3.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.3.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:fetchmail-0:6.2.0-3.el3.3.s390x" }, "product_reference": "fetchmail-0:6.2.0-3.el3.3.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.3.src as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:fetchmail-0:6.2.0-3.el3.3.src" }, "product_reference": "fetchmail-0:6.2.0-3.el3.3.src", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.3.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:fetchmail-0:6.2.0-3.el3.3.x86_64" }, "product_reference": "fetchmail-0:6.2.0-3.el3.3.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.i386" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.3.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.3.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.3.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:fetchmail-0:6.2.0-3.el3.3.i386" }, "product_reference": "fetchmail-0:6.2.0-3.el3.3.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.3.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:fetchmail-0:6.2.0-3.el3.3.ia64" }, "product_reference": "fetchmail-0:6.2.0-3.el3.3.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.3.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:fetchmail-0:6.2.0-3.el3.3.ppc" }, "product_reference": "fetchmail-0:6.2.0-3.el3.3.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.3.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:fetchmail-0:6.2.0-3.el3.3.s390" }, "product_reference": "fetchmail-0:6.2.0-3.el3.3.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.3.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:fetchmail-0:6.2.0-3.el3.3.s390x" }, "product_reference": "fetchmail-0:6.2.0-3.el3.3.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.3.src as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:fetchmail-0:6.2.0-3.el3.3.src" }, "product_reference": "fetchmail-0:6.2.0-3.el3.3.src", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.3.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:fetchmail-0:6.2.0-3.el3.3.x86_64" }, "product_reference": "fetchmail-0:6.2.0-3.el3.3.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.i386" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.3.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.3.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.5.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:fetchmail-0:6.2.5-6.el4.5.i386" }, "product_reference": "fetchmail-0:6.2.5-6.el4.5.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.5.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:fetchmail-0:6.2.5-6.el4.5.ia64" }, "product_reference": "fetchmail-0:6.2.5-6.el4.5.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.5.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:fetchmail-0:6.2.5-6.el4.5.ppc" }, "product_reference": "fetchmail-0:6.2.5-6.el4.5.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.5.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:fetchmail-0:6.2.5-6.el4.5.s390" }, "product_reference": "fetchmail-0:6.2.5-6.el4.5.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.5.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:fetchmail-0:6.2.5-6.el4.5.s390x" }, "product_reference": "fetchmail-0:6.2.5-6.el4.5.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.5.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:fetchmail-0:6.2.5-6.el4.5.src" }, "product_reference": "fetchmail-0:6.2.5-6.el4.5.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.5.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:fetchmail-0:6.2.5-6.el4.5.x86_64" }, "product_reference": "fetchmail-0:6.2.5-6.el4.5.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.i386" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.5.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.5.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.5.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:fetchmail-0:6.2.5-6.el4.5.i386" }, "product_reference": "fetchmail-0:6.2.5-6.el4.5.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.5.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:fetchmail-0:6.2.5-6.el4.5.ia64" }, "product_reference": "fetchmail-0:6.2.5-6.el4.5.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.5.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:fetchmail-0:6.2.5-6.el4.5.ppc" }, "product_reference": "fetchmail-0:6.2.5-6.el4.5.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.5.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:fetchmail-0:6.2.5-6.el4.5.s390" }, "product_reference": "fetchmail-0:6.2.5-6.el4.5.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.5.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:fetchmail-0:6.2.5-6.el4.5.s390x" }, "product_reference": "fetchmail-0:6.2.5-6.el4.5.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.5.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:fetchmail-0:6.2.5-6.el4.5.src" }, "product_reference": "fetchmail-0:6.2.5-6.el4.5.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.5.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:fetchmail-0:6.2.5-6.el4.5.x86_64" }, "product_reference": "fetchmail-0:6.2.5-6.el4.5.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.i386" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.5.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.5.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.5.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:fetchmail-0:6.2.5-6.el4.5.i386" }, "product_reference": "fetchmail-0:6.2.5-6.el4.5.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.5.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:fetchmail-0:6.2.5-6.el4.5.ia64" }, "product_reference": "fetchmail-0:6.2.5-6.el4.5.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.5.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:fetchmail-0:6.2.5-6.el4.5.ppc" }, "product_reference": "fetchmail-0:6.2.5-6.el4.5.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.5.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:fetchmail-0:6.2.5-6.el4.5.s390" }, "product_reference": "fetchmail-0:6.2.5-6.el4.5.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.5.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:fetchmail-0:6.2.5-6.el4.5.s390x" }, "product_reference": "fetchmail-0:6.2.5-6.el4.5.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.5.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:fetchmail-0:6.2.5-6.el4.5.src" }, "product_reference": "fetchmail-0:6.2.5-6.el4.5.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.5.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:fetchmail-0:6.2.5-6.el4.5.x86_64" }, "product_reference": "fetchmail-0:6.2.5-6.el4.5.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.i386" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.5.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.5.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.5.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:fetchmail-0:6.2.5-6.el4.5.i386" }, "product_reference": "fetchmail-0:6.2.5-6.el4.5.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.5.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:fetchmail-0:6.2.5-6.el4.5.ia64" }, "product_reference": "fetchmail-0:6.2.5-6.el4.5.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.5.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:fetchmail-0:6.2.5-6.el4.5.ppc" }, "product_reference": "fetchmail-0:6.2.5-6.el4.5.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.5.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:fetchmail-0:6.2.5-6.el4.5.s390" }, "product_reference": "fetchmail-0:6.2.5-6.el4.5.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.5.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:fetchmail-0:6.2.5-6.el4.5.s390x" }, "product_reference": "fetchmail-0:6.2.5-6.el4.5.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.5.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:fetchmail-0:6.2.5-6.el4.5.src" }, "product_reference": "fetchmail-0:6.2.5-6.el4.5.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.5.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:fetchmail-0:6.2.5-6.el4.5.x86_64" }, "product_reference": "fetchmail-0:6.2.5-6.el4.5.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.i386" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.5.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.5.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64", "relates_to_product_reference": "4WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2005-4348", "discovery_date": "2005-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617856" } ], "notes": [ { "category": "description", "text": "fetchmail before 6.3.1 and before 6.2.5.5, when configured for multidrop mode, allows remote attackers to cause a denial of service (application crash) by sending messages without headers from upstream mail servers.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" }, { "category": "other", "text": "The Red Hat Security Response Team has rated this issue as having low security impact. An update is available for Red Hat Enterprise Linux 4 to correct this issue:\nhttp://rhn.redhat.com/errata/RHSA-2007-0018.html\n\nThis issue did not affect Red Hat Enterprise Linux 2.1 and 3.", "title": "Statement" } ], "product_status": { "fixed": [ "2.1AS:fetchmail-0:5.9.0-21.7.3.el2.1.4.i386", "2.1AS:fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64", "2.1AS:fetchmail-0:5.9.0-21.7.3.el2.1.4.src", "2.1AS:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386", "2.1AS:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64", "2.1AW:fetchmail-0:5.9.0-21.7.3.el2.1.4.i386", "2.1AW:fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64", "2.1AW:fetchmail-0:5.9.0-21.7.3.el2.1.4.src", "2.1AW:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386", "2.1AW:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64", "2.1ES:fetchmail-0:5.9.0-21.7.3.el2.1.4.i386", "2.1ES:fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64", "2.1ES:fetchmail-0:5.9.0-21.7.3.el2.1.4.src", "2.1ES:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386", "2.1ES:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64", "2.1WS:fetchmail-0:5.9.0-21.7.3.el2.1.4.i386", "2.1WS:fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64", "2.1WS:fetchmail-0:5.9.0-21.7.3.el2.1.4.src", "2.1WS:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386", "2.1WS:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64", "3AS:fetchmail-0:6.2.0-3.el3.3.i386", "3AS:fetchmail-0:6.2.0-3.el3.3.ia64", "3AS:fetchmail-0:6.2.0-3.el3.3.ppc", "3AS:fetchmail-0:6.2.0-3.el3.3.s390", "3AS:fetchmail-0:6.2.0-3.el3.3.s390x", "3AS:fetchmail-0:6.2.0-3.el3.3.src", "3AS:fetchmail-0:6.2.0-3.el3.3.x86_64", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.i386", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64", "3Desktop:fetchmail-0:6.2.0-3.el3.3.i386", "3Desktop:fetchmail-0:6.2.0-3.el3.3.ia64", "3Desktop:fetchmail-0:6.2.0-3.el3.3.ppc", "3Desktop:fetchmail-0:6.2.0-3.el3.3.s390", "3Desktop:fetchmail-0:6.2.0-3.el3.3.s390x", "3Desktop:fetchmail-0:6.2.0-3.el3.3.src", "3Desktop:fetchmail-0:6.2.0-3.el3.3.x86_64", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.i386", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64", "3ES:fetchmail-0:6.2.0-3.el3.3.i386", "3ES:fetchmail-0:6.2.0-3.el3.3.ia64", "3ES:fetchmail-0:6.2.0-3.el3.3.ppc", "3ES:fetchmail-0:6.2.0-3.el3.3.s390", "3ES:fetchmail-0:6.2.0-3.el3.3.s390x", "3ES:fetchmail-0:6.2.0-3.el3.3.src", "3ES:fetchmail-0:6.2.0-3.el3.3.x86_64", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.i386", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64", "3WS:fetchmail-0:6.2.0-3.el3.3.i386", "3WS:fetchmail-0:6.2.0-3.el3.3.ia64", "3WS:fetchmail-0:6.2.0-3.el3.3.ppc", "3WS:fetchmail-0:6.2.0-3.el3.3.s390", "3WS:fetchmail-0:6.2.0-3.el3.3.s390x", "3WS:fetchmail-0:6.2.0-3.el3.3.src", "3WS:fetchmail-0:6.2.0-3.el3.3.x86_64", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.i386", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64", "4AS:fetchmail-0:6.2.5-6.el4.5.i386", "4AS:fetchmail-0:6.2.5-6.el4.5.ia64", "4AS:fetchmail-0:6.2.5-6.el4.5.ppc", "4AS:fetchmail-0:6.2.5-6.el4.5.s390", "4AS:fetchmail-0:6.2.5-6.el4.5.s390x", "4AS:fetchmail-0:6.2.5-6.el4.5.src", "4AS:fetchmail-0:6.2.5-6.el4.5.x86_64", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.i386", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64", "4Desktop:fetchmail-0:6.2.5-6.el4.5.i386", "4Desktop:fetchmail-0:6.2.5-6.el4.5.ia64", "4Desktop:fetchmail-0:6.2.5-6.el4.5.ppc", "4Desktop:fetchmail-0:6.2.5-6.el4.5.s390", "4Desktop:fetchmail-0:6.2.5-6.el4.5.s390x", "4Desktop:fetchmail-0:6.2.5-6.el4.5.src", "4Desktop:fetchmail-0:6.2.5-6.el4.5.x86_64", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.i386", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64", "4ES:fetchmail-0:6.2.5-6.el4.5.i386", "4ES:fetchmail-0:6.2.5-6.el4.5.ia64", "4ES:fetchmail-0:6.2.5-6.el4.5.ppc", "4ES:fetchmail-0:6.2.5-6.el4.5.s390", "4ES:fetchmail-0:6.2.5-6.el4.5.s390x", "4ES:fetchmail-0:6.2.5-6.el4.5.src", "4ES:fetchmail-0:6.2.5-6.el4.5.x86_64", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.i386", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64", "4WS:fetchmail-0:6.2.5-6.el4.5.i386", "4WS:fetchmail-0:6.2.5-6.el4.5.ia64", "4WS:fetchmail-0:6.2.5-6.el4.5.ppc", "4WS:fetchmail-0:6.2.5-6.el4.5.s390", "4WS:fetchmail-0:6.2.5-6.el4.5.s390x", "4WS:fetchmail-0:6.2.5-6.el4.5.src", "4WS:fetchmail-0:6.2.5-6.el4.5.x86_64", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.i386", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-4348" }, { "category": "external", "summary": "RHBZ#1617856", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617856" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-4348", "url": "https://www.cve.org/CVERecord?id=CVE-2005-4348" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-4348", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-4348" } ], "release_date": "2005-12-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-01-31T17:20:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "2.1AS:fetchmail-0:5.9.0-21.7.3.el2.1.4.i386", "2.1AS:fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64", "2.1AS:fetchmail-0:5.9.0-21.7.3.el2.1.4.src", "2.1AS:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386", "2.1AS:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64", "2.1AW:fetchmail-0:5.9.0-21.7.3.el2.1.4.i386", "2.1AW:fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64", "2.1AW:fetchmail-0:5.9.0-21.7.3.el2.1.4.src", "2.1AW:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386", "2.1AW:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64", "2.1ES:fetchmail-0:5.9.0-21.7.3.el2.1.4.i386", "2.1ES:fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64", "2.1ES:fetchmail-0:5.9.0-21.7.3.el2.1.4.src", "2.1ES:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386", "2.1ES:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64", "2.1WS:fetchmail-0:5.9.0-21.7.3.el2.1.4.i386", "2.1WS:fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64", "2.1WS:fetchmail-0:5.9.0-21.7.3.el2.1.4.src", "2.1WS:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386", "2.1WS:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64", "3AS:fetchmail-0:6.2.0-3.el3.3.i386", "3AS:fetchmail-0:6.2.0-3.el3.3.ia64", "3AS:fetchmail-0:6.2.0-3.el3.3.ppc", "3AS:fetchmail-0:6.2.0-3.el3.3.s390", "3AS:fetchmail-0:6.2.0-3.el3.3.s390x", "3AS:fetchmail-0:6.2.0-3.el3.3.src", "3AS:fetchmail-0:6.2.0-3.el3.3.x86_64", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.i386", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64", "3Desktop:fetchmail-0:6.2.0-3.el3.3.i386", "3Desktop:fetchmail-0:6.2.0-3.el3.3.ia64", "3Desktop:fetchmail-0:6.2.0-3.el3.3.ppc", "3Desktop:fetchmail-0:6.2.0-3.el3.3.s390", "3Desktop:fetchmail-0:6.2.0-3.el3.3.s390x", "3Desktop:fetchmail-0:6.2.0-3.el3.3.src", "3Desktop:fetchmail-0:6.2.0-3.el3.3.x86_64", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.i386", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64", "3ES:fetchmail-0:6.2.0-3.el3.3.i386", "3ES:fetchmail-0:6.2.0-3.el3.3.ia64", "3ES:fetchmail-0:6.2.0-3.el3.3.ppc", "3ES:fetchmail-0:6.2.0-3.el3.3.s390", "3ES:fetchmail-0:6.2.0-3.el3.3.s390x", "3ES:fetchmail-0:6.2.0-3.el3.3.src", "3ES:fetchmail-0:6.2.0-3.el3.3.x86_64", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.i386", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64", "3WS:fetchmail-0:6.2.0-3.el3.3.i386", "3WS:fetchmail-0:6.2.0-3.el3.3.ia64", "3WS:fetchmail-0:6.2.0-3.el3.3.ppc", "3WS:fetchmail-0:6.2.0-3.el3.3.s390", "3WS:fetchmail-0:6.2.0-3.el3.3.s390x", "3WS:fetchmail-0:6.2.0-3.el3.3.src", "3WS:fetchmail-0:6.2.0-3.el3.3.x86_64", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.i386", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64", "4AS:fetchmail-0:6.2.5-6.el4.5.i386", "4AS:fetchmail-0:6.2.5-6.el4.5.ia64", "4AS:fetchmail-0:6.2.5-6.el4.5.ppc", "4AS:fetchmail-0:6.2.5-6.el4.5.s390", "4AS:fetchmail-0:6.2.5-6.el4.5.s390x", "4AS:fetchmail-0:6.2.5-6.el4.5.src", "4AS:fetchmail-0:6.2.5-6.el4.5.x86_64", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.i386", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64", "4Desktop:fetchmail-0:6.2.5-6.el4.5.i386", "4Desktop:fetchmail-0:6.2.5-6.el4.5.ia64", "4Desktop:fetchmail-0:6.2.5-6.el4.5.ppc", "4Desktop:fetchmail-0:6.2.5-6.el4.5.s390", "4Desktop:fetchmail-0:6.2.5-6.el4.5.s390x", "4Desktop:fetchmail-0:6.2.5-6.el4.5.src", "4Desktop:fetchmail-0:6.2.5-6.el4.5.x86_64", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.i386", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64", "4ES:fetchmail-0:6.2.5-6.el4.5.i386", "4ES:fetchmail-0:6.2.5-6.el4.5.ia64", "4ES:fetchmail-0:6.2.5-6.el4.5.ppc", "4ES:fetchmail-0:6.2.5-6.el4.5.s390", "4ES:fetchmail-0:6.2.5-6.el4.5.s390x", "4ES:fetchmail-0:6.2.5-6.el4.5.src", "4ES:fetchmail-0:6.2.5-6.el4.5.x86_64", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.i386", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64", "4WS:fetchmail-0:6.2.5-6.el4.5.i386", "4WS:fetchmail-0:6.2.5-6.el4.5.ia64", "4WS:fetchmail-0:6.2.5-6.el4.5.ppc", "4WS:fetchmail-0:6.2.5-6.el4.5.s390", "4WS:fetchmail-0:6.2.5-6.el4.5.s390x", "4WS:fetchmail-0:6.2.5-6.el4.5.src", "4WS:fetchmail-0:6.2.5-6.el4.5.x86_64", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.i386", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:0018" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2006-5867", "discovery_date": "2007-01-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "221984" } ], "notes": [ { "category": "description", "text": "fetchmail before 6.3.6-rc4 does not properly enforce TLS and may transmit cleartext passwords over unsecured links if certain circumstances occur, which allows remote attackers to obtain sensitive information via man-in-the-middle (MITM) attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "fetchmail not enforcing TLS for POP3 properly", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "2.1AS:fetchmail-0:5.9.0-21.7.3.el2.1.4.i386", "2.1AS:fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64", "2.1AS:fetchmail-0:5.9.0-21.7.3.el2.1.4.src", "2.1AS:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386", "2.1AS:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64", "2.1AW:fetchmail-0:5.9.0-21.7.3.el2.1.4.i386", "2.1AW:fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64", "2.1AW:fetchmail-0:5.9.0-21.7.3.el2.1.4.src", "2.1AW:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386", "2.1AW:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64", "2.1ES:fetchmail-0:5.9.0-21.7.3.el2.1.4.i386", "2.1ES:fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64", "2.1ES:fetchmail-0:5.9.0-21.7.3.el2.1.4.src", "2.1ES:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386", "2.1ES:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64", "2.1WS:fetchmail-0:5.9.0-21.7.3.el2.1.4.i386", "2.1WS:fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64", "2.1WS:fetchmail-0:5.9.0-21.7.3.el2.1.4.src", "2.1WS:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386", "2.1WS:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64", "3AS:fetchmail-0:6.2.0-3.el3.3.i386", "3AS:fetchmail-0:6.2.0-3.el3.3.ia64", "3AS:fetchmail-0:6.2.0-3.el3.3.ppc", "3AS:fetchmail-0:6.2.0-3.el3.3.s390", "3AS:fetchmail-0:6.2.0-3.el3.3.s390x", "3AS:fetchmail-0:6.2.0-3.el3.3.src", "3AS:fetchmail-0:6.2.0-3.el3.3.x86_64", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.i386", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64", "3Desktop:fetchmail-0:6.2.0-3.el3.3.i386", "3Desktop:fetchmail-0:6.2.0-3.el3.3.ia64", "3Desktop:fetchmail-0:6.2.0-3.el3.3.ppc", "3Desktop:fetchmail-0:6.2.0-3.el3.3.s390", "3Desktop:fetchmail-0:6.2.0-3.el3.3.s390x", "3Desktop:fetchmail-0:6.2.0-3.el3.3.src", "3Desktop:fetchmail-0:6.2.0-3.el3.3.x86_64", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.i386", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64", "3ES:fetchmail-0:6.2.0-3.el3.3.i386", "3ES:fetchmail-0:6.2.0-3.el3.3.ia64", "3ES:fetchmail-0:6.2.0-3.el3.3.ppc", "3ES:fetchmail-0:6.2.0-3.el3.3.s390", "3ES:fetchmail-0:6.2.0-3.el3.3.s390x", "3ES:fetchmail-0:6.2.0-3.el3.3.src", "3ES:fetchmail-0:6.2.0-3.el3.3.x86_64", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.i386", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64", "3WS:fetchmail-0:6.2.0-3.el3.3.i386", "3WS:fetchmail-0:6.2.0-3.el3.3.ia64", "3WS:fetchmail-0:6.2.0-3.el3.3.ppc", "3WS:fetchmail-0:6.2.0-3.el3.3.s390", "3WS:fetchmail-0:6.2.0-3.el3.3.s390x", "3WS:fetchmail-0:6.2.0-3.el3.3.src", "3WS:fetchmail-0:6.2.0-3.el3.3.x86_64", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.i386", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64", "4AS:fetchmail-0:6.2.5-6.el4.5.i386", "4AS:fetchmail-0:6.2.5-6.el4.5.ia64", "4AS:fetchmail-0:6.2.5-6.el4.5.ppc", "4AS:fetchmail-0:6.2.5-6.el4.5.s390", "4AS:fetchmail-0:6.2.5-6.el4.5.s390x", "4AS:fetchmail-0:6.2.5-6.el4.5.src", "4AS:fetchmail-0:6.2.5-6.el4.5.x86_64", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.i386", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64", "4Desktop:fetchmail-0:6.2.5-6.el4.5.i386", "4Desktop:fetchmail-0:6.2.5-6.el4.5.ia64", "4Desktop:fetchmail-0:6.2.5-6.el4.5.ppc", "4Desktop:fetchmail-0:6.2.5-6.el4.5.s390", "4Desktop:fetchmail-0:6.2.5-6.el4.5.s390x", "4Desktop:fetchmail-0:6.2.5-6.el4.5.src", "4Desktop:fetchmail-0:6.2.5-6.el4.5.x86_64", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.i386", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64", "4ES:fetchmail-0:6.2.5-6.el4.5.i386", "4ES:fetchmail-0:6.2.5-6.el4.5.ia64", "4ES:fetchmail-0:6.2.5-6.el4.5.ppc", "4ES:fetchmail-0:6.2.5-6.el4.5.s390", "4ES:fetchmail-0:6.2.5-6.el4.5.s390x", "4ES:fetchmail-0:6.2.5-6.el4.5.src", "4ES:fetchmail-0:6.2.5-6.el4.5.x86_64", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.i386", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64", "4WS:fetchmail-0:6.2.5-6.el4.5.i386", "4WS:fetchmail-0:6.2.5-6.el4.5.ia64", "4WS:fetchmail-0:6.2.5-6.el4.5.ppc", "4WS:fetchmail-0:6.2.5-6.el4.5.s390", "4WS:fetchmail-0:6.2.5-6.el4.5.s390x", "4WS:fetchmail-0:6.2.5-6.el4.5.src", "4WS:fetchmail-0:6.2.5-6.el4.5.x86_64", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.i386", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-5867" }, { "category": "external", "summary": "RHBZ#221984", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=221984" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-5867", "url": "https://www.cve.org/CVERecord?id=CVE-2006-5867" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-5867", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-5867" } ], "release_date": "2007-01-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-01-31T17:20:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "2.1AS:fetchmail-0:5.9.0-21.7.3.el2.1.4.i386", "2.1AS:fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64", "2.1AS:fetchmail-0:5.9.0-21.7.3.el2.1.4.src", "2.1AS:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386", "2.1AS:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64", "2.1AW:fetchmail-0:5.9.0-21.7.3.el2.1.4.i386", "2.1AW:fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64", "2.1AW:fetchmail-0:5.9.0-21.7.3.el2.1.4.src", "2.1AW:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386", "2.1AW:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64", "2.1ES:fetchmail-0:5.9.0-21.7.3.el2.1.4.i386", "2.1ES:fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64", "2.1ES:fetchmail-0:5.9.0-21.7.3.el2.1.4.src", "2.1ES:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386", "2.1ES:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64", "2.1WS:fetchmail-0:5.9.0-21.7.3.el2.1.4.i386", "2.1WS:fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64", "2.1WS:fetchmail-0:5.9.0-21.7.3.el2.1.4.src", "2.1WS:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386", "2.1WS:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64", "3AS:fetchmail-0:6.2.0-3.el3.3.i386", "3AS:fetchmail-0:6.2.0-3.el3.3.ia64", "3AS:fetchmail-0:6.2.0-3.el3.3.ppc", "3AS:fetchmail-0:6.2.0-3.el3.3.s390", "3AS:fetchmail-0:6.2.0-3.el3.3.s390x", "3AS:fetchmail-0:6.2.0-3.el3.3.src", "3AS:fetchmail-0:6.2.0-3.el3.3.x86_64", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.i386", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64", "3Desktop:fetchmail-0:6.2.0-3.el3.3.i386", "3Desktop:fetchmail-0:6.2.0-3.el3.3.ia64", "3Desktop:fetchmail-0:6.2.0-3.el3.3.ppc", "3Desktop:fetchmail-0:6.2.0-3.el3.3.s390", "3Desktop:fetchmail-0:6.2.0-3.el3.3.s390x", "3Desktop:fetchmail-0:6.2.0-3.el3.3.src", "3Desktop:fetchmail-0:6.2.0-3.el3.3.x86_64", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.i386", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64", "3ES:fetchmail-0:6.2.0-3.el3.3.i386", "3ES:fetchmail-0:6.2.0-3.el3.3.ia64", "3ES:fetchmail-0:6.2.0-3.el3.3.ppc", "3ES:fetchmail-0:6.2.0-3.el3.3.s390", "3ES:fetchmail-0:6.2.0-3.el3.3.s390x", "3ES:fetchmail-0:6.2.0-3.el3.3.src", "3ES:fetchmail-0:6.2.0-3.el3.3.x86_64", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.i386", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64", "3WS:fetchmail-0:6.2.0-3.el3.3.i386", "3WS:fetchmail-0:6.2.0-3.el3.3.ia64", "3WS:fetchmail-0:6.2.0-3.el3.3.ppc", "3WS:fetchmail-0:6.2.0-3.el3.3.s390", "3WS:fetchmail-0:6.2.0-3.el3.3.s390x", "3WS:fetchmail-0:6.2.0-3.el3.3.src", "3WS:fetchmail-0:6.2.0-3.el3.3.x86_64", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.i386", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64", "4AS:fetchmail-0:6.2.5-6.el4.5.i386", "4AS:fetchmail-0:6.2.5-6.el4.5.ia64", "4AS:fetchmail-0:6.2.5-6.el4.5.ppc", "4AS:fetchmail-0:6.2.5-6.el4.5.s390", "4AS:fetchmail-0:6.2.5-6.el4.5.s390x", "4AS:fetchmail-0:6.2.5-6.el4.5.src", "4AS:fetchmail-0:6.2.5-6.el4.5.x86_64", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.i386", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64", "4Desktop:fetchmail-0:6.2.5-6.el4.5.i386", "4Desktop:fetchmail-0:6.2.5-6.el4.5.ia64", "4Desktop:fetchmail-0:6.2.5-6.el4.5.ppc", "4Desktop:fetchmail-0:6.2.5-6.el4.5.s390", "4Desktop:fetchmail-0:6.2.5-6.el4.5.s390x", "4Desktop:fetchmail-0:6.2.5-6.el4.5.src", "4Desktop:fetchmail-0:6.2.5-6.el4.5.x86_64", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.i386", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64", "4ES:fetchmail-0:6.2.5-6.el4.5.i386", "4ES:fetchmail-0:6.2.5-6.el4.5.ia64", "4ES:fetchmail-0:6.2.5-6.el4.5.ppc", "4ES:fetchmail-0:6.2.5-6.el4.5.s390", "4ES:fetchmail-0:6.2.5-6.el4.5.s390x", "4ES:fetchmail-0:6.2.5-6.el4.5.src", "4ES:fetchmail-0:6.2.5-6.el4.5.x86_64", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.i386", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64", "4WS:fetchmail-0:6.2.5-6.el4.5.i386", "4WS:fetchmail-0:6.2.5-6.el4.5.ia64", "4WS:fetchmail-0:6.2.5-6.el4.5.ppc", "4WS:fetchmail-0:6.2.5-6.el4.5.s390", "4WS:fetchmail-0:6.2.5-6.el4.5.s390x", "4WS:fetchmail-0:6.2.5-6.el4.5.src", "4WS:fetchmail-0:6.2.5-6.el4.5.x86_64", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.i386", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:0018" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "fetchmail not enforcing TLS for POP3 properly" } ] }
RHSA-2007:0018
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated fetchmail packages that fix two security issues are now available.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "Fetchmail is a remote mail retrieval and forwarding utility.\n\nA denial of service flaw was found when Fetchmail was run in multidrop\nmode. A malicious mail server could send a message without headers which\nwould cause Fetchmail to crash (CVE-2005-4348). This issue did not affect\nthe version of Fetchmail shipped with Red Hat Enterprise Linux 2.1 or 3.\n\nA flaw was found in the way Fetchmail used TLS encryption to connect to\nremote hosts. Fetchmail provided no way to enforce the use of TLS\nencryption and would not authenticate POP3 protocol connections properly\n(CVE-2006-5867). This update corrects this issue by enforcing TLS\nencryption when the \"sslproto\" configuration directive is set to \"tls1\". \n\nUsers of Fetchmail should update to these packages, which contain \nbackported patches to correct these issues.\n\nNote: This update may break configurations which assumed that Fetchmail\nwould use plain-text authentication if TLS encryption is not supported by\nthe POP3 server even if the \"sslproto\" directive is set to \"tls1\". If you\nare using a custom configuration that depended on this behavior you will\nneed to modify your configuration appropriately after installing this update.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2007:0018", "url": "https://access.redhat.com/errata/RHSA-2007:0018" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "http://fetchmail.berlios.de/fetchmail-SA-2005-03.txt", "url": "http://fetchmail.berlios.de/fetchmail-SA-2005-03.txt" }, { "category": "external", "summary": "http://fetchmail.berlios.de/fetchmail-SA-2006-03.txt", "url": "http://fetchmail.berlios.de/fetchmail-SA-2006-03.txt" }, { "category": "external", "summary": "176266", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=176266" }, { "category": "external", "summary": "221981", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=221981" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2007/rhsa-2007_0018.json" } ], "title": "Red Hat Security Advisory: fetchmail security update", "tracking": { "current_release_date": "2025-10-09T12:43:33+00:00", "generator": { "date": "2025-10-09T12:43:33+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.9" } }, "id": "RHSA-2007:0018", "initial_release_date": "2007-01-31T17:20:00+00:00", "revision_history": [ { "date": "2007-01-31T17:20:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2007-01-31T12:20:07+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-10-09T12:43:33+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 3", "product": { "name": "Red Hat Enterprise Linux AS version 3", "product_id": "3AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::as" } } }, { "category": "product_name", "name": "Red Hat Desktop version 3", "product": { "name": "Red Hat Desktop version 3", "product_id": "3Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 3", "product": { "name": "Red Hat Enterprise Linux ES version 3", "product_id": "3ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 3", "product": { "name": "Red Hat Enterprise Linux WS version 3", "product_id": "3WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::ws" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product": { "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::as" } } }, { "category": "product_name", "name": "Red Hat Linux Advanced Workstation 2.1", "product": { "name": "Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::aw" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 2.1", "product": { "name": "Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 2.1", "product": { "name": "Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::ws" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64", "product": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64", "product_id": "fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.0-3.el3.3?arch=ia64" } } }, { "category": "product_version", "name": "fetchmail-0:6.2.0-3.el3.3.ia64", "product": { "name": "fetchmail-0:6.2.0-3.el3.3.ia64", "product_id": "fetchmail-0:6.2.0-3.el3.3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@6.2.0-3.el3.3?arch=ia64" } } }, { "category": "product_version", "name": "fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64", "product": { "name": "fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64", "product_id": "fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@5.9.0-21.7.3.el2.1.4?arch=ia64" } } }, { "category": "product_version", "name": "fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64", "product": { "name": "fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64", "product_id": "fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmailconf@5.9.0-21.7.3.el2.1.4?arch=ia64" } } }, { "category": "product_version", "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64", "product": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64", "product_id": "fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.5-6.el4.5?arch=ia64" } } }, { "category": "product_version", "name": "fetchmail-0:6.2.5-6.el4.5.ia64", "product": { "name": "fetchmail-0:6.2.5-6.el4.5.ia64", "product_id": "fetchmail-0:6.2.5-6.el4.5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@6.2.5-6.el4.5?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64", "product": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64", "product_id": "fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.0-3.el3.3?arch=x86_64" } } }, { "category": "product_version", "name": "fetchmail-0:6.2.0-3.el3.3.x86_64", "product": { "name": "fetchmail-0:6.2.0-3.el3.3.x86_64", "product_id": "fetchmail-0:6.2.0-3.el3.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@6.2.0-3.el3.3?arch=x86_64" } } }, { "category": "product_version", "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64", "product": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64", "product_id": "fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.5-6.el4.5?arch=x86_64" } } }, { "category": "product_version", "name": "fetchmail-0:6.2.5-6.el4.5.x86_64", "product": { "name": "fetchmail-0:6.2.5-6.el4.5.x86_64", "product_id": "fetchmail-0:6.2.5-6.el4.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@6.2.5-6.el4.5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.i386", "product": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.i386", "product_id": "fetchmail-debuginfo-0:6.2.0-3.el3.3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.0-3.el3.3?arch=i386" } } }, { "category": "product_version", "name": "fetchmail-0:6.2.0-3.el3.3.i386", "product": { "name": "fetchmail-0:6.2.0-3.el3.3.i386", "product_id": "fetchmail-0:6.2.0-3.el3.3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@6.2.0-3.el3.3?arch=i386" } } }, { "category": "product_version", "name": "fetchmail-0:5.9.0-21.7.3.el2.1.4.i386", "product": { "name": "fetchmail-0:5.9.0-21.7.3.el2.1.4.i386", "product_id": "fetchmail-0:5.9.0-21.7.3.el2.1.4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@5.9.0-21.7.3.el2.1.4?arch=i386" } } }, { "category": "product_version", "name": "fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386", "product": { "name": "fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386", "product_id": "fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmailconf@5.9.0-21.7.3.el2.1.4?arch=i386" } } }, { "category": "product_version", "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.i386", "product": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.i386", "product_id": "fetchmail-debuginfo-0:6.2.5-6.el4.5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.5-6.el4.5?arch=i386" } } }, { "category": "product_version", "name": "fetchmail-0:6.2.5-6.el4.5.i386", "product": { "name": "fetchmail-0:6.2.5-6.el4.5.i386", "product_id": "fetchmail-0:6.2.5-6.el4.5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@6.2.5-6.el4.5?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "fetchmail-0:6.2.0-3.el3.3.src", "product": { "name": "fetchmail-0:6.2.0-3.el3.3.src", "product_id": "fetchmail-0:6.2.0-3.el3.3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@6.2.0-3.el3.3?arch=src" } } }, { "category": "product_version", "name": "fetchmail-0:5.9.0-21.7.3.el2.1.4.src", "product": { "name": "fetchmail-0:5.9.0-21.7.3.el2.1.4.src", "product_id": "fetchmail-0:5.9.0-21.7.3.el2.1.4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@5.9.0-21.7.3.el2.1.4?arch=src" } } }, { "category": "product_version", "name": "fetchmail-0:6.2.5-6.el4.5.src", "product": { "name": "fetchmail-0:6.2.5-6.el4.5.src", "product_id": "fetchmail-0:6.2.5-6.el4.5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@6.2.5-6.el4.5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc", "product": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc", "product_id": "fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.0-3.el3.3?arch=ppc" } } }, { "category": "product_version", "name": "fetchmail-0:6.2.0-3.el3.3.ppc", "product": { "name": "fetchmail-0:6.2.0-3.el3.3.ppc", "product_id": "fetchmail-0:6.2.0-3.el3.3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@6.2.0-3.el3.3?arch=ppc" } } }, { "category": "product_version", "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc", "product": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc", "product_id": "fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.5-6.el4.5?arch=ppc" } } }, { "category": "product_version", "name": "fetchmail-0:6.2.5-6.el4.5.ppc", "product": { "name": "fetchmail-0:6.2.5-6.el4.5.ppc", "product_id": "fetchmail-0:6.2.5-6.el4.5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@6.2.5-6.el4.5?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x", "product": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x", "product_id": "fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.0-3.el3.3?arch=s390x" } } }, { "category": "product_version", "name": "fetchmail-0:6.2.0-3.el3.3.s390x", "product": { "name": "fetchmail-0:6.2.0-3.el3.3.s390x", "product_id": "fetchmail-0:6.2.0-3.el3.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@6.2.0-3.el3.3?arch=s390x" } } }, { "category": "product_version", "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x", "product": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x", "product_id": "fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.5-6.el4.5?arch=s390x" } } }, { "category": "product_version", "name": "fetchmail-0:6.2.5-6.el4.5.s390x", "product": { "name": "fetchmail-0:6.2.5-6.el4.5.s390x", "product_id": "fetchmail-0:6.2.5-6.el4.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@6.2.5-6.el4.5?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.s390", "product": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.s390", "product_id": "fetchmail-debuginfo-0:6.2.0-3.el3.3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.0-3.el3.3?arch=s390" } } }, { "category": "product_version", "name": "fetchmail-0:6.2.0-3.el3.3.s390", "product": { "name": "fetchmail-0:6.2.0-3.el3.3.s390", "product_id": "fetchmail-0:6.2.0-3.el3.3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@6.2.0-3.el3.3?arch=s390" } } }, { "category": "product_version", "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.s390", "product": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.s390", "product_id": "fetchmail-debuginfo-0:6.2.5-6.el4.5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.5-6.el4.5?arch=s390" } } }, { "category": "product_version", "name": "fetchmail-0:6.2.5-6.el4.5.s390", "product": { "name": "fetchmail-0:6.2.5-6.el4.5.s390", "product_id": "fetchmail-0:6.2.5-6.el4.5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@6.2.5-6.el4.5?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:5.9.0-21.7.3.el2.1.4.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:fetchmail-0:5.9.0-21.7.3.el2.1.4.i386" }, "product_reference": "fetchmail-0:5.9.0-21.7.3.el2.1.4.i386", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64" }, "product_reference": "fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:5.9.0-21.7.3.el2.1.4.src as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:fetchmail-0:5.9.0-21.7.3.el2.1.4.src" }, "product_reference": "fetchmail-0:5.9.0-21.7.3.el2.1.4.src", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386" }, "product_reference": "fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64" }, "product_reference": "fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:5.9.0-21.7.3.el2.1.4.i386 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:fetchmail-0:5.9.0-21.7.3.el2.1.4.i386" }, "product_reference": "fetchmail-0:5.9.0-21.7.3.el2.1.4.i386", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64" }, "product_reference": "fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:5.9.0-21.7.3.el2.1.4.src as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:fetchmail-0:5.9.0-21.7.3.el2.1.4.src" }, "product_reference": "fetchmail-0:5.9.0-21.7.3.el2.1.4.src", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386" }, "product_reference": "fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64" }, "product_reference": "fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:5.9.0-21.7.3.el2.1.4.i386 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:fetchmail-0:5.9.0-21.7.3.el2.1.4.i386" }, "product_reference": "fetchmail-0:5.9.0-21.7.3.el2.1.4.i386", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64" }, "product_reference": "fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:5.9.0-21.7.3.el2.1.4.src as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:fetchmail-0:5.9.0-21.7.3.el2.1.4.src" }, "product_reference": "fetchmail-0:5.9.0-21.7.3.el2.1.4.src", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386" }, "product_reference": "fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64" }, "product_reference": "fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:5.9.0-21.7.3.el2.1.4.i386 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:fetchmail-0:5.9.0-21.7.3.el2.1.4.i386" }, "product_reference": "fetchmail-0:5.9.0-21.7.3.el2.1.4.i386", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64" }, "product_reference": "fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:5.9.0-21.7.3.el2.1.4.src as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:fetchmail-0:5.9.0-21.7.3.el2.1.4.src" }, "product_reference": "fetchmail-0:5.9.0-21.7.3.el2.1.4.src", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386" }, "product_reference": "fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64" }, "product_reference": "fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.3.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:fetchmail-0:6.2.0-3.el3.3.i386" }, "product_reference": "fetchmail-0:6.2.0-3.el3.3.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.3.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:fetchmail-0:6.2.0-3.el3.3.ia64" }, "product_reference": "fetchmail-0:6.2.0-3.el3.3.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.3.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:fetchmail-0:6.2.0-3.el3.3.ppc" }, "product_reference": "fetchmail-0:6.2.0-3.el3.3.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.3.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:fetchmail-0:6.2.0-3.el3.3.s390" }, "product_reference": "fetchmail-0:6.2.0-3.el3.3.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.3.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:fetchmail-0:6.2.0-3.el3.3.s390x" }, "product_reference": "fetchmail-0:6.2.0-3.el3.3.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.3.src as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:fetchmail-0:6.2.0-3.el3.3.src" }, "product_reference": "fetchmail-0:6.2.0-3.el3.3.src", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.3.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:fetchmail-0:6.2.0-3.el3.3.x86_64" }, "product_reference": "fetchmail-0:6.2.0-3.el3.3.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.i386" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.3.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.3.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.3.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:fetchmail-0:6.2.0-3.el3.3.i386" }, "product_reference": "fetchmail-0:6.2.0-3.el3.3.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.3.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:fetchmail-0:6.2.0-3.el3.3.ia64" }, "product_reference": "fetchmail-0:6.2.0-3.el3.3.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.3.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:fetchmail-0:6.2.0-3.el3.3.ppc" }, "product_reference": "fetchmail-0:6.2.0-3.el3.3.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.3.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:fetchmail-0:6.2.0-3.el3.3.s390" }, "product_reference": "fetchmail-0:6.2.0-3.el3.3.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.3.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:fetchmail-0:6.2.0-3.el3.3.s390x" }, "product_reference": "fetchmail-0:6.2.0-3.el3.3.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.3.src as a component of Red Hat Desktop version 3", "product_id": "3Desktop:fetchmail-0:6.2.0-3.el3.3.src" }, "product_reference": "fetchmail-0:6.2.0-3.el3.3.src", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.3.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:fetchmail-0:6.2.0-3.el3.3.x86_64" }, "product_reference": "fetchmail-0:6.2.0-3.el3.3.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.i386" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.3.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.3.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.3.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:fetchmail-0:6.2.0-3.el3.3.i386" }, "product_reference": "fetchmail-0:6.2.0-3.el3.3.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.3.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:fetchmail-0:6.2.0-3.el3.3.ia64" }, "product_reference": "fetchmail-0:6.2.0-3.el3.3.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.3.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:fetchmail-0:6.2.0-3.el3.3.ppc" }, "product_reference": "fetchmail-0:6.2.0-3.el3.3.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.3.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:fetchmail-0:6.2.0-3.el3.3.s390" }, "product_reference": "fetchmail-0:6.2.0-3.el3.3.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.3.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:fetchmail-0:6.2.0-3.el3.3.s390x" }, "product_reference": "fetchmail-0:6.2.0-3.el3.3.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.3.src as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:fetchmail-0:6.2.0-3.el3.3.src" }, "product_reference": "fetchmail-0:6.2.0-3.el3.3.src", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.3.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:fetchmail-0:6.2.0-3.el3.3.x86_64" }, "product_reference": "fetchmail-0:6.2.0-3.el3.3.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.i386" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.3.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.3.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.3.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:fetchmail-0:6.2.0-3.el3.3.i386" }, "product_reference": "fetchmail-0:6.2.0-3.el3.3.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.3.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:fetchmail-0:6.2.0-3.el3.3.ia64" }, "product_reference": "fetchmail-0:6.2.0-3.el3.3.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.3.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:fetchmail-0:6.2.0-3.el3.3.ppc" }, "product_reference": "fetchmail-0:6.2.0-3.el3.3.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.3.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:fetchmail-0:6.2.0-3.el3.3.s390" }, "product_reference": "fetchmail-0:6.2.0-3.el3.3.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.3.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:fetchmail-0:6.2.0-3.el3.3.s390x" }, "product_reference": "fetchmail-0:6.2.0-3.el3.3.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.3.src as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:fetchmail-0:6.2.0-3.el3.3.src" }, "product_reference": "fetchmail-0:6.2.0-3.el3.3.src", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.3.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:fetchmail-0:6.2.0-3.el3.3.x86_64" }, "product_reference": "fetchmail-0:6.2.0-3.el3.3.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.i386" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.3.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.3.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.5.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:fetchmail-0:6.2.5-6.el4.5.i386" }, "product_reference": "fetchmail-0:6.2.5-6.el4.5.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.5.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:fetchmail-0:6.2.5-6.el4.5.ia64" }, "product_reference": "fetchmail-0:6.2.5-6.el4.5.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.5.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:fetchmail-0:6.2.5-6.el4.5.ppc" }, "product_reference": "fetchmail-0:6.2.5-6.el4.5.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.5.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:fetchmail-0:6.2.5-6.el4.5.s390" }, "product_reference": "fetchmail-0:6.2.5-6.el4.5.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.5.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:fetchmail-0:6.2.5-6.el4.5.s390x" }, "product_reference": "fetchmail-0:6.2.5-6.el4.5.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.5.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:fetchmail-0:6.2.5-6.el4.5.src" }, "product_reference": "fetchmail-0:6.2.5-6.el4.5.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.5.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:fetchmail-0:6.2.5-6.el4.5.x86_64" }, "product_reference": "fetchmail-0:6.2.5-6.el4.5.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.i386" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.5.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.5.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.5.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:fetchmail-0:6.2.5-6.el4.5.i386" }, "product_reference": "fetchmail-0:6.2.5-6.el4.5.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.5.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:fetchmail-0:6.2.5-6.el4.5.ia64" }, "product_reference": "fetchmail-0:6.2.5-6.el4.5.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.5.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:fetchmail-0:6.2.5-6.el4.5.ppc" }, "product_reference": "fetchmail-0:6.2.5-6.el4.5.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.5.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:fetchmail-0:6.2.5-6.el4.5.s390" }, "product_reference": "fetchmail-0:6.2.5-6.el4.5.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.5.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:fetchmail-0:6.2.5-6.el4.5.s390x" }, "product_reference": "fetchmail-0:6.2.5-6.el4.5.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.5.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:fetchmail-0:6.2.5-6.el4.5.src" }, "product_reference": "fetchmail-0:6.2.5-6.el4.5.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.5.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:fetchmail-0:6.2.5-6.el4.5.x86_64" }, "product_reference": "fetchmail-0:6.2.5-6.el4.5.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.i386" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.5.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.5.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.5.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:fetchmail-0:6.2.5-6.el4.5.i386" }, "product_reference": "fetchmail-0:6.2.5-6.el4.5.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.5.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:fetchmail-0:6.2.5-6.el4.5.ia64" }, "product_reference": "fetchmail-0:6.2.5-6.el4.5.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.5.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:fetchmail-0:6.2.5-6.el4.5.ppc" }, "product_reference": "fetchmail-0:6.2.5-6.el4.5.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.5.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:fetchmail-0:6.2.5-6.el4.5.s390" }, "product_reference": "fetchmail-0:6.2.5-6.el4.5.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.5.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:fetchmail-0:6.2.5-6.el4.5.s390x" }, "product_reference": "fetchmail-0:6.2.5-6.el4.5.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.5.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:fetchmail-0:6.2.5-6.el4.5.src" }, "product_reference": "fetchmail-0:6.2.5-6.el4.5.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.5.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:fetchmail-0:6.2.5-6.el4.5.x86_64" }, "product_reference": "fetchmail-0:6.2.5-6.el4.5.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.i386" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.5.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.5.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.5.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:fetchmail-0:6.2.5-6.el4.5.i386" }, "product_reference": "fetchmail-0:6.2.5-6.el4.5.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.5.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:fetchmail-0:6.2.5-6.el4.5.ia64" }, "product_reference": "fetchmail-0:6.2.5-6.el4.5.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.5.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:fetchmail-0:6.2.5-6.el4.5.ppc" }, "product_reference": "fetchmail-0:6.2.5-6.el4.5.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.5.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:fetchmail-0:6.2.5-6.el4.5.s390" }, "product_reference": "fetchmail-0:6.2.5-6.el4.5.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.5.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:fetchmail-0:6.2.5-6.el4.5.s390x" }, "product_reference": "fetchmail-0:6.2.5-6.el4.5.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.5.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:fetchmail-0:6.2.5-6.el4.5.src" }, "product_reference": "fetchmail-0:6.2.5-6.el4.5.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.5.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:fetchmail-0:6.2.5-6.el4.5.x86_64" }, "product_reference": "fetchmail-0:6.2.5-6.el4.5.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.i386" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.5.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.5.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64", "relates_to_product_reference": "4WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2005-4348", "discovery_date": "2005-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617856" } ], "notes": [ { "category": "description", "text": "fetchmail before 6.3.1 and before 6.2.5.5, when configured for multidrop mode, allows remote attackers to cause a denial of service (application crash) by sending messages without headers from upstream mail servers.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" }, { "category": "other", "text": "The Red Hat Security Response Team has rated this issue as having low security impact. An update is available for Red Hat Enterprise Linux 4 to correct this issue:\nhttp://rhn.redhat.com/errata/RHSA-2007-0018.html\n\nThis issue did not affect Red Hat Enterprise Linux 2.1 and 3.", "title": "Statement" } ], "product_status": { "fixed": [ "2.1AS:fetchmail-0:5.9.0-21.7.3.el2.1.4.i386", "2.1AS:fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64", "2.1AS:fetchmail-0:5.9.0-21.7.3.el2.1.4.src", "2.1AS:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386", "2.1AS:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64", "2.1AW:fetchmail-0:5.9.0-21.7.3.el2.1.4.i386", "2.1AW:fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64", "2.1AW:fetchmail-0:5.9.0-21.7.3.el2.1.4.src", "2.1AW:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386", "2.1AW:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64", "2.1ES:fetchmail-0:5.9.0-21.7.3.el2.1.4.i386", "2.1ES:fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64", "2.1ES:fetchmail-0:5.9.0-21.7.3.el2.1.4.src", "2.1ES:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386", "2.1ES:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64", "2.1WS:fetchmail-0:5.9.0-21.7.3.el2.1.4.i386", "2.1WS:fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64", "2.1WS:fetchmail-0:5.9.0-21.7.3.el2.1.4.src", "2.1WS:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386", "2.1WS:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64", "3AS:fetchmail-0:6.2.0-3.el3.3.i386", "3AS:fetchmail-0:6.2.0-3.el3.3.ia64", "3AS:fetchmail-0:6.2.0-3.el3.3.ppc", "3AS:fetchmail-0:6.2.0-3.el3.3.s390", "3AS:fetchmail-0:6.2.0-3.el3.3.s390x", "3AS:fetchmail-0:6.2.0-3.el3.3.src", "3AS:fetchmail-0:6.2.0-3.el3.3.x86_64", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.i386", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64", "3Desktop:fetchmail-0:6.2.0-3.el3.3.i386", "3Desktop:fetchmail-0:6.2.0-3.el3.3.ia64", "3Desktop:fetchmail-0:6.2.0-3.el3.3.ppc", "3Desktop:fetchmail-0:6.2.0-3.el3.3.s390", "3Desktop:fetchmail-0:6.2.0-3.el3.3.s390x", "3Desktop:fetchmail-0:6.2.0-3.el3.3.src", "3Desktop:fetchmail-0:6.2.0-3.el3.3.x86_64", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.i386", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64", "3ES:fetchmail-0:6.2.0-3.el3.3.i386", "3ES:fetchmail-0:6.2.0-3.el3.3.ia64", "3ES:fetchmail-0:6.2.0-3.el3.3.ppc", "3ES:fetchmail-0:6.2.0-3.el3.3.s390", "3ES:fetchmail-0:6.2.0-3.el3.3.s390x", "3ES:fetchmail-0:6.2.0-3.el3.3.src", "3ES:fetchmail-0:6.2.0-3.el3.3.x86_64", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.i386", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64", "3WS:fetchmail-0:6.2.0-3.el3.3.i386", "3WS:fetchmail-0:6.2.0-3.el3.3.ia64", "3WS:fetchmail-0:6.2.0-3.el3.3.ppc", "3WS:fetchmail-0:6.2.0-3.el3.3.s390", "3WS:fetchmail-0:6.2.0-3.el3.3.s390x", "3WS:fetchmail-0:6.2.0-3.el3.3.src", "3WS:fetchmail-0:6.2.0-3.el3.3.x86_64", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.i386", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64", "4AS:fetchmail-0:6.2.5-6.el4.5.i386", "4AS:fetchmail-0:6.2.5-6.el4.5.ia64", "4AS:fetchmail-0:6.2.5-6.el4.5.ppc", "4AS:fetchmail-0:6.2.5-6.el4.5.s390", "4AS:fetchmail-0:6.2.5-6.el4.5.s390x", "4AS:fetchmail-0:6.2.5-6.el4.5.src", "4AS:fetchmail-0:6.2.5-6.el4.5.x86_64", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.i386", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64", "4Desktop:fetchmail-0:6.2.5-6.el4.5.i386", "4Desktop:fetchmail-0:6.2.5-6.el4.5.ia64", "4Desktop:fetchmail-0:6.2.5-6.el4.5.ppc", "4Desktop:fetchmail-0:6.2.5-6.el4.5.s390", "4Desktop:fetchmail-0:6.2.5-6.el4.5.s390x", "4Desktop:fetchmail-0:6.2.5-6.el4.5.src", "4Desktop:fetchmail-0:6.2.5-6.el4.5.x86_64", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.i386", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64", "4ES:fetchmail-0:6.2.5-6.el4.5.i386", "4ES:fetchmail-0:6.2.5-6.el4.5.ia64", "4ES:fetchmail-0:6.2.5-6.el4.5.ppc", "4ES:fetchmail-0:6.2.5-6.el4.5.s390", "4ES:fetchmail-0:6.2.5-6.el4.5.s390x", "4ES:fetchmail-0:6.2.5-6.el4.5.src", "4ES:fetchmail-0:6.2.5-6.el4.5.x86_64", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.i386", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64", "4WS:fetchmail-0:6.2.5-6.el4.5.i386", "4WS:fetchmail-0:6.2.5-6.el4.5.ia64", "4WS:fetchmail-0:6.2.5-6.el4.5.ppc", "4WS:fetchmail-0:6.2.5-6.el4.5.s390", "4WS:fetchmail-0:6.2.5-6.el4.5.s390x", "4WS:fetchmail-0:6.2.5-6.el4.5.src", "4WS:fetchmail-0:6.2.5-6.el4.5.x86_64", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.i386", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-4348" }, { "category": "external", "summary": "RHBZ#1617856", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617856" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-4348", "url": "https://www.cve.org/CVERecord?id=CVE-2005-4348" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-4348", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-4348" } ], "release_date": "2005-12-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-01-31T17:20:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "2.1AS:fetchmail-0:5.9.0-21.7.3.el2.1.4.i386", "2.1AS:fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64", "2.1AS:fetchmail-0:5.9.0-21.7.3.el2.1.4.src", "2.1AS:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386", "2.1AS:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64", "2.1AW:fetchmail-0:5.9.0-21.7.3.el2.1.4.i386", "2.1AW:fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64", "2.1AW:fetchmail-0:5.9.0-21.7.3.el2.1.4.src", "2.1AW:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386", "2.1AW:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64", "2.1ES:fetchmail-0:5.9.0-21.7.3.el2.1.4.i386", "2.1ES:fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64", "2.1ES:fetchmail-0:5.9.0-21.7.3.el2.1.4.src", "2.1ES:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386", "2.1ES:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64", "2.1WS:fetchmail-0:5.9.0-21.7.3.el2.1.4.i386", "2.1WS:fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64", "2.1WS:fetchmail-0:5.9.0-21.7.3.el2.1.4.src", "2.1WS:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386", "2.1WS:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64", "3AS:fetchmail-0:6.2.0-3.el3.3.i386", "3AS:fetchmail-0:6.2.0-3.el3.3.ia64", "3AS:fetchmail-0:6.2.0-3.el3.3.ppc", "3AS:fetchmail-0:6.2.0-3.el3.3.s390", "3AS:fetchmail-0:6.2.0-3.el3.3.s390x", "3AS:fetchmail-0:6.2.0-3.el3.3.src", "3AS:fetchmail-0:6.2.0-3.el3.3.x86_64", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.i386", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64", "3Desktop:fetchmail-0:6.2.0-3.el3.3.i386", "3Desktop:fetchmail-0:6.2.0-3.el3.3.ia64", "3Desktop:fetchmail-0:6.2.0-3.el3.3.ppc", "3Desktop:fetchmail-0:6.2.0-3.el3.3.s390", "3Desktop:fetchmail-0:6.2.0-3.el3.3.s390x", "3Desktop:fetchmail-0:6.2.0-3.el3.3.src", "3Desktop:fetchmail-0:6.2.0-3.el3.3.x86_64", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.i386", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64", "3ES:fetchmail-0:6.2.0-3.el3.3.i386", "3ES:fetchmail-0:6.2.0-3.el3.3.ia64", "3ES:fetchmail-0:6.2.0-3.el3.3.ppc", "3ES:fetchmail-0:6.2.0-3.el3.3.s390", "3ES:fetchmail-0:6.2.0-3.el3.3.s390x", "3ES:fetchmail-0:6.2.0-3.el3.3.src", "3ES:fetchmail-0:6.2.0-3.el3.3.x86_64", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.i386", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64", "3WS:fetchmail-0:6.2.0-3.el3.3.i386", "3WS:fetchmail-0:6.2.0-3.el3.3.ia64", "3WS:fetchmail-0:6.2.0-3.el3.3.ppc", "3WS:fetchmail-0:6.2.0-3.el3.3.s390", "3WS:fetchmail-0:6.2.0-3.el3.3.s390x", "3WS:fetchmail-0:6.2.0-3.el3.3.src", "3WS:fetchmail-0:6.2.0-3.el3.3.x86_64", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.i386", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64", "4AS:fetchmail-0:6.2.5-6.el4.5.i386", "4AS:fetchmail-0:6.2.5-6.el4.5.ia64", "4AS:fetchmail-0:6.2.5-6.el4.5.ppc", "4AS:fetchmail-0:6.2.5-6.el4.5.s390", "4AS:fetchmail-0:6.2.5-6.el4.5.s390x", "4AS:fetchmail-0:6.2.5-6.el4.5.src", "4AS:fetchmail-0:6.2.5-6.el4.5.x86_64", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.i386", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64", "4Desktop:fetchmail-0:6.2.5-6.el4.5.i386", "4Desktop:fetchmail-0:6.2.5-6.el4.5.ia64", "4Desktop:fetchmail-0:6.2.5-6.el4.5.ppc", "4Desktop:fetchmail-0:6.2.5-6.el4.5.s390", "4Desktop:fetchmail-0:6.2.5-6.el4.5.s390x", "4Desktop:fetchmail-0:6.2.5-6.el4.5.src", "4Desktop:fetchmail-0:6.2.5-6.el4.5.x86_64", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.i386", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64", "4ES:fetchmail-0:6.2.5-6.el4.5.i386", "4ES:fetchmail-0:6.2.5-6.el4.5.ia64", "4ES:fetchmail-0:6.2.5-6.el4.5.ppc", "4ES:fetchmail-0:6.2.5-6.el4.5.s390", "4ES:fetchmail-0:6.2.5-6.el4.5.s390x", "4ES:fetchmail-0:6.2.5-6.el4.5.src", "4ES:fetchmail-0:6.2.5-6.el4.5.x86_64", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.i386", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64", "4WS:fetchmail-0:6.2.5-6.el4.5.i386", "4WS:fetchmail-0:6.2.5-6.el4.5.ia64", "4WS:fetchmail-0:6.2.5-6.el4.5.ppc", "4WS:fetchmail-0:6.2.5-6.el4.5.s390", "4WS:fetchmail-0:6.2.5-6.el4.5.s390x", "4WS:fetchmail-0:6.2.5-6.el4.5.src", "4WS:fetchmail-0:6.2.5-6.el4.5.x86_64", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.i386", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:0018" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2006-5867", "discovery_date": "2007-01-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "221984" } ], "notes": [ { "category": "description", "text": "fetchmail before 6.3.6-rc4 does not properly enforce TLS and may transmit cleartext passwords over unsecured links if certain circumstances occur, which allows remote attackers to obtain sensitive information via man-in-the-middle (MITM) attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "fetchmail not enforcing TLS for POP3 properly", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "2.1AS:fetchmail-0:5.9.0-21.7.3.el2.1.4.i386", "2.1AS:fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64", "2.1AS:fetchmail-0:5.9.0-21.7.3.el2.1.4.src", "2.1AS:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386", "2.1AS:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64", "2.1AW:fetchmail-0:5.9.0-21.7.3.el2.1.4.i386", "2.1AW:fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64", "2.1AW:fetchmail-0:5.9.0-21.7.3.el2.1.4.src", "2.1AW:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386", "2.1AW:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64", "2.1ES:fetchmail-0:5.9.0-21.7.3.el2.1.4.i386", "2.1ES:fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64", "2.1ES:fetchmail-0:5.9.0-21.7.3.el2.1.4.src", "2.1ES:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386", "2.1ES:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64", "2.1WS:fetchmail-0:5.9.0-21.7.3.el2.1.4.i386", "2.1WS:fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64", "2.1WS:fetchmail-0:5.9.0-21.7.3.el2.1.4.src", "2.1WS:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386", "2.1WS:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64", "3AS:fetchmail-0:6.2.0-3.el3.3.i386", "3AS:fetchmail-0:6.2.0-3.el3.3.ia64", "3AS:fetchmail-0:6.2.0-3.el3.3.ppc", "3AS:fetchmail-0:6.2.0-3.el3.3.s390", "3AS:fetchmail-0:6.2.0-3.el3.3.s390x", "3AS:fetchmail-0:6.2.0-3.el3.3.src", "3AS:fetchmail-0:6.2.0-3.el3.3.x86_64", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.i386", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64", "3Desktop:fetchmail-0:6.2.0-3.el3.3.i386", "3Desktop:fetchmail-0:6.2.0-3.el3.3.ia64", "3Desktop:fetchmail-0:6.2.0-3.el3.3.ppc", "3Desktop:fetchmail-0:6.2.0-3.el3.3.s390", "3Desktop:fetchmail-0:6.2.0-3.el3.3.s390x", "3Desktop:fetchmail-0:6.2.0-3.el3.3.src", "3Desktop:fetchmail-0:6.2.0-3.el3.3.x86_64", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.i386", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64", "3ES:fetchmail-0:6.2.0-3.el3.3.i386", "3ES:fetchmail-0:6.2.0-3.el3.3.ia64", "3ES:fetchmail-0:6.2.0-3.el3.3.ppc", "3ES:fetchmail-0:6.2.0-3.el3.3.s390", "3ES:fetchmail-0:6.2.0-3.el3.3.s390x", "3ES:fetchmail-0:6.2.0-3.el3.3.src", "3ES:fetchmail-0:6.2.0-3.el3.3.x86_64", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.i386", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64", "3WS:fetchmail-0:6.2.0-3.el3.3.i386", "3WS:fetchmail-0:6.2.0-3.el3.3.ia64", "3WS:fetchmail-0:6.2.0-3.el3.3.ppc", "3WS:fetchmail-0:6.2.0-3.el3.3.s390", "3WS:fetchmail-0:6.2.0-3.el3.3.s390x", "3WS:fetchmail-0:6.2.0-3.el3.3.src", "3WS:fetchmail-0:6.2.0-3.el3.3.x86_64", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.i386", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64", "4AS:fetchmail-0:6.2.5-6.el4.5.i386", "4AS:fetchmail-0:6.2.5-6.el4.5.ia64", "4AS:fetchmail-0:6.2.5-6.el4.5.ppc", "4AS:fetchmail-0:6.2.5-6.el4.5.s390", "4AS:fetchmail-0:6.2.5-6.el4.5.s390x", "4AS:fetchmail-0:6.2.5-6.el4.5.src", "4AS:fetchmail-0:6.2.5-6.el4.5.x86_64", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.i386", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64", "4Desktop:fetchmail-0:6.2.5-6.el4.5.i386", "4Desktop:fetchmail-0:6.2.5-6.el4.5.ia64", "4Desktop:fetchmail-0:6.2.5-6.el4.5.ppc", "4Desktop:fetchmail-0:6.2.5-6.el4.5.s390", "4Desktop:fetchmail-0:6.2.5-6.el4.5.s390x", "4Desktop:fetchmail-0:6.2.5-6.el4.5.src", "4Desktop:fetchmail-0:6.2.5-6.el4.5.x86_64", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.i386", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64", "4ES:fetchmail-0:6.2.5-6.el4.5.i386", "4ES:fetchmail-0:6.2.5-6.el4.5.ia64", "4ES:fetchmail-0:6.2.5-6.el4.5.ppc", "4ES:fetchmail-0:6.2.5-6.el4.5.s390", "4ES:fetchmail-0:6.2.5-6.el4.5.s390x", "4ES:fetchmail-0:6.2.5-6.el4.5.src", "4ES:fetchmail-0:6.2.5-6.el4.5.x86_64", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.i386", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64", "4WS:fetchmail-0:6.2.5-6.el4.5.i386", "4WS:fetchmail-0:6.2.5-6.el4.5.ia64", "4WS:fetchmail-0:6.2.5-6.el4.5.ppc", "4WS:fetchmail-0:6.2.5-6.el4.5.s390", "4WS:fetchmail-0:6.2.5-6.el4.5.s390x", "4WS:fetchmail-0:6.2.5-6.el4.5.src", "4WS:fetchmail-0:6.2.5-6.el4.5.x86_64", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.i386", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-5867" }, { "category": "external", "summary": "RHBZ#221984", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=221984" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-5867", "url": "https://www.cve.org/CVERecord?id=CVE-2006-5867" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-5867", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-5867" } ], "release_date": "2007-01-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-01-31T17:20:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "2.1AS:fetchmail-0:5.9.0-21.7.3.el2.1.4.i386", "2.1AS:fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64", "2.1AS:fetchmail-0:5.9.0-21.7.3.el2.1.4.src", "2.1AS:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386", "2.1AS:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64", "2.1AW:fetchmail-0:5.9.0-21.7.3.el2.1.4.i386", "2.1AW:fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64", "2.1AW:fetchmail-0:5.9.0-21.7.3.el2.1.4.src", "2.1AW:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386", "2.1AW:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64", "2.1ES:fetchmail-0:5.9.0-21.7.3.el2.1.4.i386", "2.1ES:fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64", "2.1ES:fetchmail-0:5.9.0-21.7.3.el2.1.4.src", "2.1ES:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386", "2.1ES:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64", "2.1WS:fetchmail-0:5.9.0-21.7.3.el2.1.4.i386", "2.1WS:fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64", "2.1WS:fetchmail-0:5.9.0-21.7.3.el2.1.4.src", "2.1WS:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386", "2.1WS:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64", "3AS:fetchmail-0:6.2.0-3.el3.3.i386", "3AS:fetchmail-0:6.2.0-3.el3.3.ia64", "3AS:fetchmail-0:6.2.0-3.el3.3.ppc", "3AS:fetchmail-0:6.2.0-3.el3.3.s390", "3AS:fetchmail-0:6.2.0-3.el3.3.s390x", "3AS:fetchmail-0:6.2.0-3.el3.3.src", "3AS:fetchmail-0:6.2.0-3.el3.3.x86_64", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.i386", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64", "3Desktop:fetchmail-0:6.2.0-3.el3.3.i386", "3Desktop:fetchmail-0:6.2.0-3.el3.3.ia64", "3Desktop:fetchmail-0:6.2.0-3.el3.3.ppc", "3Desktop:fetchmail-0:6.2.0-3.el3.3.s390", "3Desktop:fetchmail-0:6.2.0-3.el3.3.s390x", "3Desktop:fetchmail-0:6.2.0-3.el3.3.src", "3Desktop:fetchmail-0:6.2.0-3.el3.3.x86_64", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.i386", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64", "3ES:fetchmail-0:6.2.0-3.el3.3.i386", "3ES:fetchmail-0:6.2.0-3.el3.3.ia64", "3ES:fetchmail-0:6.2.0-3.el3.3.ppc", "3ES:fetchmail-0:6.2.0-3.el3.3.s390", "3ES:fetchmail-0:6.2.0-3.el3.3.s390x", "3ES:fetchmail-0:6.2.0-3.el3.3.src", "3ES:fetchmail-0:6.2.0-3.el3.3.x86_64", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.i386", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64", "3WS:fetchmail-0:6.2.0-3.el3.3.i386", "3WS:fetchmail-0:6.2.0-3.el3.3.ia64", "3WS:fetchmail-0:6.2.0-3.el3.3.ppc", "3WS:fetchmail-0:6.2.0-3.el3.3.s390", "3WS:fetchmail-0:6.2.0-3.el3.3.s390x", "3WS:fetchmail-0:6.2.0-3.el3.3.src", "3WS:fetchmail-0:6.2.0-3.el3.3.x86_64", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.i386", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64", "4AS:fetchmail-0:6.2.5-6.el4.5.i386", "4AS:fetchmail-0:6.2.5-6.el4.5.ia64", "4AS:fetchmail-0:6.2.5-6.el4.5.ppc", "4AS:fetchmail-0:6.2.5-6.el4.5.s390", "4AS:fetchmail-0:6.2.5-6.el4.5.s390x", "4AS:fetchmail-0:6.2.5-6.el4.5.src", "4AS:fetchmail-0:6.2.5-6.el4.5.x86_64", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.i386", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64", "4Desktop:fetchmail-0:6.2.5-6.el4.5.i386", "4Desktop:fetchmail-0:6.2.5-6.el4.5.ia64", "4Desktop:fetchmail-0:6.2.5-6.el4.5.ppc", "4Desktop:fetchmail-0:6.2.5-6.el4.5.s390", "4Desktop:fetchmail-0:6.2.5-6.el4.5.s390x", "4Desktop:fetchmail-0:6.2.5-6.el4.5.src", "4Desktop:fetchmail-0:6.2.5-6.el4.5.x86_64", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.i386", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64", "4ES:fetchmail-0:6.2.5-6.el4.5.i386", "4ES:fetchmail-0:6.2.5-6.el4.5.ia64", "4ES:fetchmail-0:6.2.5-6.el4.5.ppc", "4ES:fetchmail-0:6.2.5-6.el4.5.s390", "4ES:fetchmail-0:6.2.5-6.el4.5.s390x", "4ES:fetchmail-0:6.2.5-6.el4.5.src", "4ES:fetchmail-0:6.2.5-6.el4.5.x86_64", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.i386", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64", "4WS:fetchmail-0:6.2.5-6.el4.5.i386", "4WS:fetchmail-0:6.2.5-6.el4.5.ia64", "4WS:fetchmail-0:6.2.5-6.el4.5.ppc", "4WS:fetchmail-0:6.2.5-6.el4.5.s390", "4WS:fetchmail-0:6.2.5-6.el4.5.s390x", "4WS:fetchmail-0:6.2.5-6.el4.5.src", "4WS:fetchmail-0:6.2.5-6.el4.5.x86_64", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.i386", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:0018" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "fetchmail not enforcing TLS for POP3 properly" } ] }
rhsa-2007_0018
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated fetchmail packages that fix two security issues are now available.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "Fetchmail is a remote mail retrieval and forwarding utility.\n\nA denial of service flaw was found when Fetchmail was run in multidrop\nmode. A malicious mail server could send a message without headers which\nwould cause Fetchmail to crash (CVE-2005-4348). This issue did not affect\nthe version of Fetchmail shipped with Red Hat Enterprise Linux 2.1 or 3.\n\nA flaw was found in the way Fetchmail used TLS encryption to connect to\nremote hosts. Fetchmail provided no way to enforce the use of TLS\nencryption and would not authenticate POP3 protocol connections properly\n(CVE-2006-5867). This update corrects this issue by enforcing TLS\nencryption when the \"sslproto\" configuration directive is set to \"tls1\". \n\nUsers of Fetchmail should update to these packages, which contain \nbackported patches to correct these issues.\n\nNote: This update may break configurations which assumed that Fetchmail\nwould use plain-text authentication if TLS encryption is not supported by\nthe POP3 server even if the \"sslproto\" directive is set to \"tls1\". If you\nare using a custom configuration that depended on this behavior you will\nneed to modify your configuration appropriately after installing this update.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2007:0018", "url": "https://access.redhat.com/errata/RHSA-2007:0018" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "http://fetchmail.berlios.de/fetchmail-SA-2005-03.txt", "url": "http://fetchmail.berlios.de/fetchmail-SA-2005-03.txt" }, { "category": "external", "summary": "http://fetchmail.berlios.de/fetchmail-SA-2006-03.txt", "url": "http://fetchmail.berlios.de/fetchmail-SA-2006-03.txt" }, { "category": "external", "summary": "176266", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=176266" }, { "category": "external", "summary": "221981", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=221981" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2007/rhsa-2007_0018.json" } ], "title": "Red Hat Security Advisory: fetchmail security update", "tracking": { "current_release_date": "2024-11-22T00:35:23+00:00", "generator": { "date": "2024-11-22T00:35:23+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2007:0018", "initial_release_date": "2007-01-31T17:20:00+00:00", "revision_history": [ { "date": "2007-01-31T17:20:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2007-01-31T12:20:07+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T00:35:23+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 3", "product": { "name": "Red Hat Enterprise Linux AS version 3", "product_id": "3AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::as" } } }, { "category": "product_name", "name": "Red Hat Desktop version 3", "product": { "name": "Red Hat Desktop version 3", "product_id": "3Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 3", "product": { "name": "Red Hat Enterprise Linux ES version 3", "product_id": "3ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 3", "product": { "name": "Red Hat Enterprise Linux WS version 3", "product_id": "3WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::ws" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product": { "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::as" } } }, { "category": "product_name", "name": "Red Hat Linux Advanced Workstation 2.1", "product": { "name": "Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::aw" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 2.1", "product": { "name": "Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 2.1", "product": { "name": "Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::ws" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64", "product": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64", "product_id": "fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.0-3.el3.3?arch=ia64" } } }, { "category": "product_version", "name": "fetchmail-0:6.2.0-3.el3.3.ia64", "product": { "name": "fetchmail-0:6.2.0-3.el3.3.ia64", "product_id": "fetchmail-0:6.2.0-3.el3.3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@6.2.0-3.el3.3?arch=ia64" } } }, { "category": "product_version", "name": "fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64", "product": { "name": "fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64", "product_id": "fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@5.9.0-21.7.3.el2.1.4?arch=ia64" } } }, { "category": "product_version", "name": "fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64", "product": { "name": "fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64", "product_id": "fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmailconf@5.9.0-21.7.3.el2.1.4?arch=ia64" } } }, { "category": "product_version", "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64", "product": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64", "product_id": "fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.5-6.el4.5?arch=ia64" } } }, { "category": "product_version", "name": "fetchmail-0:6.2.5-6.el4.5.ia64", "product": { "name": "fetchmail-0:6.2.5-6.el4.5.ia64", "product_id": "fetchmail-0:6.2.5-6.el4.5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@6.2.5-6.el4.5?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64", "product": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64", "product_id": "fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.0-3.el3.3?arch=x86_64" } } }, { "category": "product_version", "name": "fetchmail-0:6.2.0-3.el3.3.x86_64", "product": { "name": "fetchmail-0:6.2.0-3.el3.3.x86_64", "product_id": "fetchmail-0:6.2.0-3.el3.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@6.2.0-3.el3.3?arch=x86_64" } } }, { "category": "product_version", "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64", "product": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64", "product_id": "fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.5-6.el4.5?arch=x86_64" } } }, { "category": "product_version", "name": "fetchmail-0:6.2.5-6.el4.5.x86_64", "product": { "name": "fetchmail-0:6.2.5-6.el4.5.x86_64", "product_id": "fetchmail-0:6.2.5-6.el4.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@6.2.5-6.el4.5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.i386", "product": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.i386", "product_id": "fetchmail-debuginfo-0:6.2.0-3.el3.3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.0-3.el3.3?arch=i386" } } }, { "category": "product_version", "name": "fetchmail-0:6.2.0-3.el3.3.i386", "product": { "name": "fetchmail-0:6.2.0-3.el3.3.i386", "product_id": "fetchmail-0:6.2.0-3.el3.3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@6.2.0-3.el3.3?arch=i386" } } }, { "category": "product_version", "name": "fetchmail-0:5.9.0-21.7.3.el2.1.4.i386", "product": { "name": "fetchmail-0:5.9.0-21.7.3.el2.1.4.i386", "product_id": "fetchmail-0:5.9.0-21.7.3.el2.1.4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@5.9.0-21.7.3.el2.1.4?arch=i386" } } }, { "category": "product_version", "name": "fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386", "product": { "name": "fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386", "product_id": "fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmailconf@5.9.0-21.7.3.el2.1.4?arch=i386" } } }, { "category": "product_version", "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.i386", "product": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.i386", "product_id": "fetchmail-debuginfo-0:6.2.5-6.el4.5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.5-6.el4.5?arch=i386" } } }, { "category": "product_version", "name": "fetchmail-0:6.2.5-6.el4.5.i386", "product": { "name": "fetchmail-0:6.2.5-6.el4.5.i386", "product_id": "fetchmail-0:6.2.5-6.el4.5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@6.2.5-6.el4.5?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "fetchmail-0:6.2.0-3.el3.3.src", "product": { "name": "fetchmail-0:6.2.0-3.el3.3.src", "product_id": "fetchmail-0:6.2.0-3.el3.3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@6.2.0-3.el3.3?arch=src" } } }, { "category": "product_version", "name": "fetchmail-0:5.9.0-21.7.3.el2.1.4.src", "product": { "name": "fetchmail-0:5.9.0-21.7.3.el2.1.4.src", "product_id": "fetchmail-0:5.9.0-21.7.3.el2.1.4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@5.9.0-21.7.3.el2.1.4?arch=src" } } }, { "category": "product_version", "name": "fetchmail-0:6.2.5-6.el4.5.src", "product": { "name": "fetchmail-0:6.2.5-6.el4.5.src", "product_id": "fetchmail-0:6.2.5-6.el4.5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@6.2.5-6.el4.5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc", "product": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc", "product_id": "fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.0-3.el3.3?arch=ppc" } } }, { "category": "product_version", "name": "fetchmail-0:6.2.0-3.el3.3.ppc", "product": { "name": "fetchmail-0:6.2.0-3.el3.3.ppc", "product_id": "fetchmail-0:6.2.0-3.el3.3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@6.2.0-3.el3.3?arch=ppc" } } }, { "category": "product_version", "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc", "product": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc", "product_id": "fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.5-6.el4.5?arch=ppc" } } }, { "category": "product_version", "name": "fetchmail-0:6.2.5-6.el4.5.ppc", "product": { "name": "fetchmail-0:6.2.5-6.el4.5.ppc", "product_id": "fetchmail-0:6.2.5-6.el4.5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@6.2.5-6.el4.5?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x", "product": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x", "product_id": "fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.0-3.el3.3?arch=s390x" } } }, { "category": "product_version", "name": "fetchmail-0:6.2.0-3.el3.3.s390x", "product": { "name": "fetchmail-0:6.2.0-3.el3.3.s390x", "product_id": "fetchmail-0:6.2.0-3.el3.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@6.2.0-3.el3.3?arch=s390x" } } }, { "category": "product_version", "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x", "product": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x", "product_id": "fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.5-6.el4.5?arch=s390x" } } }, { "category": "product_version", "name": "fetchmail-0:6.2.5-6.el4.5.s390x", "product": { "name": "fetchmail-0:6.2.5-6.el4.5.s390x", "product_id": "fetchmail-0:6.2.5-6.el4.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@6.2.5-6.el4.5?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.s390", "product": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.s390", "product_id": "fetchmail-debuginfo-0:6.2.0-3.el3.3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.0-3.el3.3?arch=s390" } } }, { "category": "product_version", "name": "fetchmail-0:6.2.0-3.el3.3.s390", "product": { "name": "fetchmail-0:6.2.0-3.el3.3.s390", "product_id": "fetchmail-0:6.2.0-3.el3.3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@6.2.0-3.el3.3?arch=s390" } } }, { "category": "product_version", "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.s390", "product": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.s390", "product_id": "fetchmail-debuginfo-0:6.2.5-6.el4.5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.5-6.el4.5?arch=s390" } } }, { "category": "product_version", "name": "fetchmail-0:6.2.5-6.el4.5.s390", "product": { "name": "fetchmail-0:6.2.5-6.el4.5.s390", "product_id": "fetchmail-0:6.2.5-6.el4.5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/fetchmail@6.2.5-6.el4.5?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:5.9.0-21.7.3.el2.1.4.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:fetchmail-0:5.9.0-21.7.3.el2.1.4.i386" }, "product_reference": "fetchmail-0:5.9.0-21.7.3.el2.1.4.i386", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64" }, "product_reference": "fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:5.9.0-21.7.3.el2.1.4.src as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:fetchmail-0:5.9.0-21.7.3.el2.1.4.src" }, "product_reference": "fetchmail-0:5.9.0-21.7.3.el2.1.4.src", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386" }, "product_reference": "fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64" }, "product_reference": "fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:5.9.0-21.7.3.el2.1.4.i386 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:fetchmail-0:5.9.0-21.7.3.el2.1.4.i386" }, "product_reference": "fetchmail-0:5.9.0-21.7.3.el2.1.4.i386", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64" }, "product_reference": "fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:5.9.0-21.7.3.el2.1.4.src as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:fetchmail-0:5.9.0-21.7.3.el2.1.4.src" }, "product_reference": "fetchmail-0:5.9.0-21.7.3.el2.1.4.src", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386" }, "product_reference": "fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64" }, "product_reference": "fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:5.9.0-21.7.3.el2.1.4.i386 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:fetchmail-0:5.9.0-21.7.3.el2.1.4.i386" }, "product_reference": "fetchmail-0:5.9.0-21.7.3.el2.1.4.i386", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64" }, "product_reference": "fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:5.9.0-21.7.3.el2.1.4.src as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:fetchmail-0:5.9.0-21.7.3.el2.1.4.src" }, "product_reference": "fetchmail-0:5.9.0-21.7.3.el2.1.4.src", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386" }, "product_reference": "fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64" }, "product_reference": "fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:5.9.0-21.7.3.el2.1.4.i386 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:fetchmail-0:5.9.0-21.7.3.el2.1.4.i386" }, "product_reference": "fetchmail-0:5.9.0-21.7.3.el2.1.4.i386", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64" }, "product_reference": "fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:5.9.0-21.7.3.el2.1.4.src as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:fetchmail-0:5.9.0-21.7.3.el2.1.4.src" }, "product_reference": "fetchmail-0:5.9.0-21.7.3.el2.1.4.src", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386" }, "product_reference": "fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64" }, "product_reference": "fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.3.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:fetchmail-0:6.2.0-3.el3.3.i386" }, "product_reference": "fetchmail-0:6.2.0-3.el3.3.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.3.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:fetchmail-0:6.2.0-3.el3.3.ia64" }, "product_reference": "fetchmail-0:6.2.0-3.el3.3.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.3.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:fetchmail-0:6.2.0-3.el3.3.ppc" }, "product_reference": "fetchmail-0:6.2.0-3.el3.3.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.3.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:fetchmail-0:6.2.0-3.el3.3.s390" }, "product_reference": "fetchmail-0:6.2.0-3.el3.3.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.3.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:fetchmail-0:6.2.0-3.el3.3.s390x" }, "product_reference": "fetchmail-0:6.2.0-3.el3.3.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.3.src as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:fetchmail-0:6.2.0-3.el3.3.src" }, "product_reference": "fetchmail-0:6.2.0-3.el3.3.src", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.3.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:fetchmail-0:6.2.0-3.el3.3.x86_64" }, "product_reference": "fetchmail-0:6.2.0-3.el3.3.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.i386" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.3.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.3.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.3.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:fetchmail-0:6.2.0-3.el3.3.i386" }, "product_reference": "fetchmail-0:6.2.0-3.el3.3.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.3.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:fetchmail-0:6.2.0-3.el3.3.ia64" }, "product_reference": "fetchmail-0:6.2.0-3.el3.3.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.3.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:fetchmail-0:6.2.0-3.el3.3.ppc" }, "product_reference": "fetchmail-0:6.2.0-3.el3.3.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.3.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:fetchmail-0:6.2.0-3.el3.3.s390" }, "product_reference": "fetchmail-0:6.2.0-3.el3.3.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.3.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:fetchmail-0:6.2.0-3.el3.3.s390x" }, "product_reference": "fetchmail-0:6.2.0-3.el3.3.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.3.src as a component of Red Hat Desktop version 3", "product_id": "3Desktop:fetchmail-0:6.2.0-3.el3.3.src" }, "product_reference": "fetchmail-0:6.2.0-3.el3.3.src", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.3.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:fetchmail-0:6.2.0-3.el3.3.x86_64" }, "product_reference": "fetchmail-0:6.2.0-3.el3.3.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.i386" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.3.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.3.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.3.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:fetchmail-0:6.2.0-3.el3.3.i386" }, "product_reference": "fetchmail-0:6.2.0-3.el3.3.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.3.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:fetchmail-0:6.2.0-3.el3.3.ia64" }, "product_reference": "fetchmail-0:6.2.0-3.el3.3.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.3.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:fetchmail-0:6.2.0-3.el3.3.ppc" }, "product_reference": "fetchmail-0:6.2.0-3.el3.3.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.3.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:fetchmail-0:6.2.0-3.el3.3.s390" }, "product_reference": "fetchmail-0:6.2.0-3.el3.3.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.3.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:fetchmail-0:6.2.0-3.el3.3.s390x" }, "product_reference": "fetchmail-0:6.2.0-3.el3.3.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.3.src as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:fetchmail-0:6.2.0-3.el3.3.src" }, "product_reference": "fetchmail-0:6.2.0-3.el3.3.src", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.3.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:fetchmail-0:6.2.0-3.el3.3.x86_64" }, "product_reference": "fetchmail-0:6.2.0-3.el3.3.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.i386" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.3.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.3.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.3.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:fetchmail-0:6.2.0-3.el3.3.i386" }, "product_reference": "fetchmail-0:6.2.0-3.el3.3.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.3.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:fetchmail-0:6.2.0-3.el3.3.ia64" }, "product_reference": "fetchmail-0:6.2.0-3.el3.3.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.3.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:fetchmail-0:6.2.0-3.el3.3.ppc" }, "product_reference": "fetchmail-0:6.2.0-3.el3.3.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.3.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:fetchmail-0:6.2.0-3.el3.3.s390" }, "product_reference": "fetchmail-0:6.2.0-3.el3.3.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.3.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:fetchmail-0:6.2.0-3.el3.3.s390x" }, "product_reference": "fetchmail-0:6.2.0-3.el3.3.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.3.src as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:fetchmail-0:6.2.0-3.el3.3.src" }, "product_reference": "fetchmail-0:6.2.0-3.el3.3.src", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.0-3.el3.3.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:fetchmail-0:6.2.0-3.el3.3.x86_64" }, "product_reference": "fetchmail-0:6.2.0-3.el3.3.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.i386" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.3.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.3.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64" }, "product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.5.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:fetchmail-0:6.2.5-6.el4.5.i386" }, "product_reference": "fetchmail-0:6.2.5-6.el4.5.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.5.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:fetchmail-0:6.2.5-6.el4.5.ia64" }, "product_reference": "fetchmail-0:6.2.5-6.el4.5.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.5.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:fetchmail-0:6.2.5-6.el4.5.ppc" }, "product_reference": "fetchmail-0:6.2.5-6.el4.5.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.5.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:fetchmail-0:6.2.5-6.el4.5.s390" }, "product_reference": "fetchmail-0:6.2.5-6.el4.5.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.5.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:fetchmail-0:6.2.5-6.el4.5.s390x" }, "product_reference": "fetchmail-0:6.2.5-6.el4.5.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.5.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:fetchmail-0:6.2.5-6.el4.5.src" }, "product_reference": "fetchmail-0:6.2.5-6.el4.5.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.5.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:fetchmail-0:6.2.5-6.el4.5.x86_64" }, "product_reference": "fetchmail-0:6.2.5-6.el4.5.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.i386" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.5.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.5.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.5.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:fetchmail-0:6.2.5-6.el4.5.i386" }, "product_reference": "fetchmail-0:6.2.5-6.el4.5.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.5.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:fetchmail-0:6.2.5-6.el4.5.ia64" }, "product_reference": "fetchmail-0:6.2.5-6.el4.5.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.5.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:fetchmail-0:6.2.5-6.el4.5.ppc" }, "product_reference": "fetchmail-0:6.2.5-6.el4.5.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.5.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:fetchmail-0:6.2.5-6.el4.5.s390" }, "product_reference": "fetchmail-0:6.2.5-6.el4.5.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.5.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:fetchmail-0:6.2.5-6.el4.5.s390x" }, "product_reference": "fetchmail-0:6.2.5-6.el4.5.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.5.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:fetchmail-0:6.2.5-6.el4.5.src" }, "product_reference": "fetchmail-0:6.2.5-6.el4.5.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.5.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:fetchmail-0:6.2.5-6.el4.5.x86_64" }, "product_reference": "fetchmail-0:6.2.5-6.el4.5.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.i386" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.5.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.5.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.5.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:fetchmail-0:6.2.5-6.el4.5.i386" }, "product_reference": "fetchmail-0:6.2.5-6.el4.5.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.5.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:fetchmail-0:6.2.5-6.el4.5.ia64" }, "product_reference": "fetchmail-0:6.2.5-6.el4.5.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.5.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:fetchmail-0:6.2.5-6.el4.5.ppc" }, "product_reference": "fetchmail-0:6.2.5-6.el4.5.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.5.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:fetchmail-0:6.2.5-6.el4.5.s390" }, "product_reference": "fetchmail-0:6.2.5-6.el4.5.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.5.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:fetchmail-0:6.2.5-6.el4.5.s390x" }, "product_reference": "fetchmail-0:6.2.5-6.el4.5.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.5.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:fetchmail-0:6.2.5-6.el4.5.src" }, "product_reference": "fetchmail-0:6.2.5-6.el4.5.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.5.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:fetchmail-0:6.2.5-6.el4.5.x86_64" }, "product_reference": "fetchmail-0:6.2.5-6.el4.5.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.i386" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.5.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.5.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.5.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:fetchmail-0:6.2.5-6.el4.5.i386" }, "product_reference": "fetchmail-0:6.2.5-6.el4.5.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.5.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:fetchmail-0:6.2.5-6.el4.5.ia64" }, "product_reference": "fetchmail-0:6.2.5-6.el4.5.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.5.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:fetchmail-0:6.2.5-6.el4.5.ppc" }, "product_reference": "fetchmail-0:6.2.5-6.el4.5.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.5.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:fetchmail-0:6.2.5-6.el4.5.s390" }, "product_reference": "fetchmail-0:6.2.5-6.el4.5.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.5.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:fetchmail-0:6.2.5-6.el4.5.s390x" }, "product_reference": "fetchmail-0:6.2.5-6.el4.5.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.5.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:fetchmail-0:6.2.5-6.el4.5.src" }, "product_reference": "fetchmail-0:6.2.5-6.el4.5.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-0:6.2.5-6.el4.5.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:fetchmail-0:6.2.5-6.el4.5.x86_64" }, "product_reference": "fetchmail-0:6.2.5-6.el4.5.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.i386" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.5.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.5.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64" }, "product_reference": "fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64", "relates_to_product_reference": "4WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2005-4348", "discovery_date": "2005-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617856" } ], "notes": [ { "category": "description", "text": "fetchmail before 6.3.1 and before 6.2.5.5, when configured for multidrop mode, allows remote attackers to cause a denial of service (application crash) by sending messages without headers from upstream mail servers.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" }, { "category": "other", "text": "The Red Hat Security Response Team has rated this issue as having low security impact. An update is available for Red Hat Enterprise Linux 4 to correct this issue:\nhttp://rhn.redhat.com/errata/RHSA-2007-0018.html\n\nThis issue did not affect Red Hat Enterprise Linux 2.1 and 3.", "title": "Statement" } ], "product_status": { "fixed": [ "2.1AS:fetchmail-0:5.9.0-21.7.3.el2.1.4.i386", "2.1AS:fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64", "2.1AS:fetchmail-0:5.9.0-21.7.3.el2.1.4.src", "2.1AS:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386", "2.1AS:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64", "2.1AW:fetchmail-0:5.9.0-21.7.3.el2.1.4.i386", "2.1AW:fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64", "2.1AW:fetchmail-0:5.9.0-21.7.3.el2.1.4.src", "2.1AW:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386", "2.1AW:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64", "2.1ES:fetchmail-0:5.9.0-21.7.3.el2.1.4.i386", "2.1ES:fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64", "2.1ES:fetchmail-0:5.9.0-21.7.3.el2.1.4.src", "2.1ES:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386", "2.1ES:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64", "2.1WS:fetchmail-0:5.9.0-21.7.3.el2.1.4.i386", "2.1WS:fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64", "2.1WS:fetchmail-0:5.9.0-21.7.3.el2.1.4.src", "2.1WS:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386", "2.1WS:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64", "3AS:fetchmail-0:6.2.0-3.el3.3.i386", "3AS:fetchmail-0:6.2.0-3.el3.3.ia64", "3AS:fetchmail-0:6.2.0-3.el3.3.ppc", "3AS:fetchmail-0:6.2.0-3.el3.3.s390", "3AS:fetchmail-0:6.2.0-3.el3.3.s390x", "3AS:fetchmail-0:6.2.0-3.el3.3.src", "3AS:fetchmail-0:6.2.0-3.el3.3.x86_64", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.i386", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64", "3Desktop:fetchmail-0:6.2.0-3.el3.3.i386", "3Desktop:fetchmail-0:6.2.0-3.el3.3.ia64", "3Desktop:fetchmail-0:6.2.0-3.el3.3.ppc", "3Desktop:fetchmail-0:6.2.0-3.el3.3.s390", "3Desktop:fetchmail-0:6.2.0-3.el3.3.s390x", "3Desktop:fetchmail-0:6.2.0-3.el3.3.src", "3Desktop:fetchmail-0:6.2.0-3.el3.3.x86_64", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.i386", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64", "3ES:fetchmail-0:6.2.0-3.el3.3.i386", "3ES:fetchmail-0:6.2.0-3.el3.3.ia64", "3ES:fetchmail-0:6.2.0-3.el3.3.ppc", "3ES:fetchmail-0:6.2.0-3.el3.3.s390", "3ES:fetchmail-0:6.2.0-3.el3.3.s390x", "3ES:fetchmail-0:6.2.0-3.el3.3.src", "3ES:fetchmail-0:6.2.0-3.el3.3.x86_64", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.i386", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64", "3WS:fetchmail-0:6.2.0-3.el3.3.i386", "3WS:fetchmail-0:6.2.0-3.el3.3.ia64", "3WS:fetchmail-0:6.2.0-3.el3.3.ppc", "3WS:fetchmail-0:6.2.0-3.el3.3.s390", "3WS:fetchmail-0:6.2.0-3.el3.3.s390x", "3WS:fetchmail-0:6.2.0-3.el3.3.src", "3WS:fetchmail-0:6.2.0-3.el3.3.x86_64", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.i386", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64", "4AS:fetchmail-0:6.2.5-6.el4.5.i386", "4AS:fetchmail-0:6.2.5-6.el4.5.ia64", "4AS:fetchmail-0:6.2.5-6.el4.5.ppc", "4AS:fetchmail-0:6.2.5-6.el4.5.s390", "4AS:fetchmail-0:6.2.5-6.el4.5.s390x", "4AS:fetchmail-0:6.2.5-6.el4.5.src", "4AS:fetchmail-0:6.2.5-6.el4.5.x86_64", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.i386", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64", "4Desktop:fetchmail-0:6.2.5-6.el4.5.i386", "4Desktop:fetchmail-0:6.2.5-6.el4.5.ia64", "4Desktop:fetchmail-0:6.2.5-6.el4.5.ppc", "4Desktop:fetchmail-0:6.2.5-6.el4.5.s390", "4Desktop:fetchmail-0:6.2.5-6.el4.5.s390x", "4Desktop:fetchmail-0:6.2.5-6.el4.5.src", "4Desktop:fetchmail-0:6.2.5-6.el4.5.x86_64", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.i386", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64", "4ES:fetchmail-0:6.2.5-6.el4.5.i386", "4ES:fetchmail-0:6.2.5-6.el4.5.ia64", "4ES:fetchmail-0:6.2.5-6.el4.5.ppc", "4ES:fetchmail-0:6.2.5-6.el4.5.s390", "4ES:fetchmail-0:6.2.5-6.el4.5.s390x", "4ES:fetchmail-0:6.2.5-6.el4.5.src", "4ES:fetchmail-0:6.2.5-6.el4.5.x86_64", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.i386", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64", "4WS:fetchmail-0:6.2.5-6.el4.5.i386", "4WS:fetchmail-0:6.2.5-6.el4.5.ia64", "4WS:fetchmail-0:6.2.5-6.el4.5.ppc", "4WS:fetchmail-0:6.2.5-6.el4.5.s390", "4WS:fetchmail-0:6.2.5-6.el4.5.s390x", "4WS:fetchmail-0:6.2.5-6.el4.5.src", "4WS:fetchmail-0:6.2.5-6.el4.5.x86_64", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.i386", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-4348" }, { "category": "external", "summary": "RHBZ#1617856", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617856" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-4348", "url": "https://www.cve.org/CVERecord?id=CVE-2005-4348" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-4348", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-4348" } ], "release_date": "2005-12-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-01-31T17:20:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "2.1AS:fetchmail-0:5.9.0-21.7.3.el2.1.4.i386", "2.1AS:fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64", "2.1AS:fetchmail-0:5.9.0-21.7.3.el2.1.4.src", "2.1AS:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386", "2.1AS:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64", "2.1AW:fetchmail-0:5.9.0-21.7.3.el2.1.4.i386", "2.1AW:fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64", "2.1AW:fetchmail-0:5.9.0-21.7.3.el2.1.4.src", "2.1AW:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386", "2.1AW:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64", "2.1ES:fetchmail-0:5.9.0-21.7.3.el2.1.4.i386", "2.1ES:fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64", "2.1ES:fetchmail-0:5.9.0-21.7.3.el2.1.4.src", "2.1ES:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386", "2.1ES:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64", "2.1WS:fetchmail-0:5.9.0-21.7.3.el2.1.4.i386", "2.1WS:fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64", "2.1WS:fetchmail-0:5.9.0-21.7.3.el2.1.4.src", "2.1WS:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386", "2.1WS:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64", "3AS:fetchmail-0:6.2.0-3.el3.3.i386", "3AS:fetchmail-0:6.2.0-3.el3.3.ia64", "3AS:fetchmail-0:6.2.0-3.el3.3.ppc", "3AS:fetchmail-0:6.2.0-3.el3.3.s390", "3AS:fetchmail-0:6.2.0-3.el3.3.s390x", "3AS:fetchmail-0:6.2.0-3.el3.3.src", "3AS:fetchmail-0:6.2.0-3.el3.3.x86_64", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.i386", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64", "3Desktop:fetchmail-0:6.2.0-3.el3.3.i386", "3Desktop:fetchmail-0:6.2.0-3.el3.3.ia64", "3Desktop:fetchmail-0:6.2.0-3.el3.3.ppc", "3Desktop:fetchmail-0:6.2.0-3.el3.3.s390", "3Desktop:fetchmail-0:6.2.0-3.el3.3.s390x", "3Desktop:fetchmail-0:6.2.0-3.el3.3.src", "3Desktop:fetchmail-0:6.2.0-3.el3.3.x86_64", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.i386", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64", "3ES:fetchmail-0:6.2.0-3.el3.3.i386", "3ES:fetchmail-0:6.2.0-3.el3.3.ia64", "3ES:fetchmail-0:6.2.0-3.el3.3.ppc", "3ES:fetchmail-0:6.2.0-3.el3.3.s390", "3ES:fetchmail-0:6.2.0-3.el3.3.s390x", "3ES:fetchmail-0:6.2.0-3.el3.3.src", "3ES:fetchmail-0:6.2.0-3.el3.3.x86_64", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.i386", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64", "3WS:fetchmail-0:6.2.0-3.el3.3.i386", "3WS:fetchmail-0:6.2.0-3.el3.3.ia64", "3WS:fetchmail-0:6.2.0-3.el3.3.ppc", "3WS:fetchmail-0:6.2.0-3.el3.3.s390", "3WS:fetchmail-0:6.2.0-3.el3.3.s390x", "3WS:fetchmail-0:6.2.0-3.el3.3.src", "3WS:fetchmail-0:6.2.0-3.el3.3.x86_64", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.i386", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64", "4AS:fetchmail-0:6.2.5-6.el4.5.i386", "4AS:fetchmail-0:6.2.5-6.el4.5.ia64", "4AS:fetchmail-0:6.2.5-6.el4.5.ppc", "4AS:fetchmail-0:6.2.5-6.el4.5.s390", "4AS:fetchmail-0:6.2.5-6.el4.5.s390x", "4AS:fetchmail-0:6.2.5-6.el4.5.src", "4AS:fetchmail-0:6.2.5-6.el4.5.x86_64", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.i386", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64", "4Desktop:fetchmail-0:6.2.5-6.el4.5.i386", "4Desktop:fetchmail-0:6.2.5-6.el4.5.ia64", "4Desktop:fetchmail-0:6.2.5-6.el4.5.ppc", "4Desktop:fetchmail-0:6.2.5-6.el4.5.s390", "4Desktop:fetchmail-0:6.2.5-6.el4.5.s390x", "4Desktop:fetchmail-0:6.2.5-6.el4.5.src", "4Desktop:fetchmail-0:6.2.5-6.el4.5.x86_64", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.i386", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64", "4ES:fetchmail-0:6.2.5-6.el4.5.i386", "4ES:fetchmail-0:6.2.5-6.el4.5.ia64", "4ES:fetchmail-0:6.2.5-6.el4.5.ppc", "4ES:fetchmail-0:6.2.5-6.el4.5.s390", "4ES:fetchmail-0:6.2.5-6.el4.5.s390x", "4ES:fetchmail-0:6.2.5-6.el4.5.src", "4ES:fetchmail-0:6.2.5-6.el4.5.x86_64", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.i386", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64", "4WS:fetchmail-0:6.2.5-6.el4.5.i386", "4WS:fetchmail-0:6.2.5-6.el4.5.ia64", "4WS:fetchmail-0:6.2.5-6.el4.5.ppc", "4WS:fetchmail-0:6.2.5-6.el4.5.s390", "4WS:fetchmail-0:6.2.5-6.el4.5.s390x", "4WS:fetchmail-0:6.2.5-6.el4.5.src", "4WS:fetchmail-0:6.2.5-6.el4.5.x86_64", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.i386", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:0018" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2006-5867", "discovery_date": "2007-01-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "221984" } ], "notes": [ { "category": "description", "text": "fetchmail before 6.3.6-rc4 does not properly enforce TLS and may transmit cleartext passwords over unsecured links if certain circumstances occur, which allows remote attackers to obtain sensitive information via man-in-the-middle (MITM) attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "fetchmail not enforcing TLS for POP3 properly", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "2.1AS:fetchmail-0:5.9.0-21.7.3.el2.1.4.i386", "2.1AS:fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64", "2.1AS:fetchmail-0:5.9.0-21.7.3.el2.1.4.src", "2.1AS:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386", "2.1AS:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64", "2.1AW:fetchmail-0:5.9.0-21.7.3.el2.1.4.i386", "2.1AW:fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64", "2.1AW:fetchmail-0:5.9.0-21.7.3.el2.1.4.src", "2.1AW:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386", "2.1AW:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64", "2.1ES:fetchmail-0:5.9.0-21.7.3.el2.1.4.i386", "2.1ES:fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64", "2.1ES:fetchmail-0:5.9.0-21.7.3.el2.1.4.src", "2.1ES:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386", "2.1ES:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64", "2.1WS:fetchmail-0:5.9.0-21.7.3.el2.1.4.i386", "2.1WS:fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64", "2.1WS:fetchmail-0:5.9.0-21.7.3.el2.1.4.src", "2.1WS:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386", "2.1WS:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64", "3AS:fetchmail-0:6.2.0-3.el3.3.i386", "3AS:fetchmail-0:6.2.0-3.el3.3.ia64", "3AS:fetchmail-0:6.2.0-3.el3.3.ppc", "3AS:fetchmail-0:6.2.0-3.el3.3.s390", "3AS:fetchmail-0:6.2.0-3.el3.3.s390x", "3AS:fetchmail-0:6.2.0-3.el3.3.src", "3AS:fetchmail-0:6.2.0-3.el3.3.x86_64", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.i386", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64", "3Desktop:fetchmail-0:6.2.0-3.el3.3.i386", "3Desktop:fetchmail-0:6.2.0-3.el3.3.ia64", "3Desktop:fetchmail-0:6.2.0-3.el3.3.ppc", "3Desktop:fetchmail-0:6.2.0-3.el3.3.s390", "3Desktop:fetchmail-0:6.2.0-3.el3.3.s390x", "3Desktop:fetchmail-0:6.2.0-3.el3.3.src", "3Desktop:fetchmail-0:6.2.0-3.el3.3.x86_64", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.i386", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64", "3ES:fetchmail-0:6.2.0-3.el3.3.i386", "3ES:fetchmail-0:6.2.0-3.el3.3.ia64", "3ES:fetchmail-0:6.2.0-3.el3.3.ppc", "3ES:fetchmail-0:6.2.0-3.el3.3.s390", "3ES:fetchmail-0:6.2.0-3.el3.3.s390x", "3ES:fetchmail-0:6.2.0-3.el3.3.src", "3ES:fetchmail-0:6.2.0-3.el3.3.x86_64", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.i386", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64", "3WS:fetchmail-0:6.2.0-3.el3.3.i386", "3WS:fetchmail-0:6.2.0-3.el3.3.ia64", "3WS:fetchmail-0:6.2.0-3.el3.3.ppc", "3WS:fetchmail-0:6.2.0-3.el3.3.s390", "3WS:fetchmail-0:6.2.0-3.el3.3.s390x", "3WS:fetchmail-0:6.2.0-3.el3.3.src", "3WS:fetchmail-0:6.2.0-3.el3.3.x86_64", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.i386", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64", "4AS:fetchmail-0:6.2.5-6.el4.5.i386", "4AS:fetchmail-0:6.2.5-6.el4.5.ia64", "4AS:fetchmail-0:6.2.5-6.el4.5.ppc", "4AS:fetchmail-0:6.2.5-6.el4.5.s390", "4AS:fetchmail-0:6.2.5-6.el4.5.s390x", "4AS:fetchmail-0:6.2.5-6.el4.5.src", "4AS:fetchmail-0:6.2.5-6.el4.5.x86_64", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.i386", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64", "4Desktop:fetchmail-0:6.2.5-6.el4.5.i386", "4Desktop:fetchmail-0:6.2.5-6.el4.5.ia64", "4Desktop:fetchmail-0:6.2.5-6.el4.5.ppc", "4Desktop:fetchmail-0:6.2.5-6.el4.5.s390", "4Desktop:fetchmail-0:6.2.5-6.el4.5.s390x", "4Desktop:fetchmail-0:6.2.5-6.el4.5.src", "4Desktop:fetchmail-0:6.2.5-6.el4.5.x86_64", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.i386", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64", "4ES:fetchmail-0:6.2.5-6.el4.5.i386", "4ES:fetchmail-0:6.2.5-6.el4.5.ia64", "4ES:fetchmail-0:6.2.5-6.el4.5.ppc", "4ES:fetchmail-0:6.2.5-6.el4.5.s390", "4ES:fetchmail-0:6.2.5-6.el4.5.s390x", "4ES:fetchmail-0:6.2.5-6.el4.5.src", "4ES:fetchmail-0:6.2.5-6.el4.5.x86_64", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.i386", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64", "4WS:fetchmail-0:6.2.5-6.el4.5.i386", "4WS:fetchmail-0:6.2.5-6.el4.5.ia64", "4WS:fetchmail-0:6.2.5-6.el4.5.ppc", "4WS:fetchmail-0:6.2.5-6.el4.5.s390", "4WS:fetchmail-0:6.2.5-6.el4.5.s390x", "4WS:fetchmail-0:6.2.5-6.el4.5.src", "4WS:fetchmail-0:6.2.5-6.el4.5.x86_64", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.i386", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-5867" }, { "category": "external", "summary": "RHBZ#221984", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=221984" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-5867", "url": "https://www.cve.org/CVERecord?id=CVE-2006-5867" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-5867", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-5867" } ], "release_date": "2007-01-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-01-31T17:20:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "2.1AS:fetchmail-0:5.9.0-21.7.3.el2.1.4.i386", "2.1AS:fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64", "2.1AS:fetchmail-0:5.9.0-21.7.3.el2.1.4.src", "2.1AS:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386", "2.1AS:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64", "2.1AW:fetchmail-0:5.9.0-21.7.3.el2.1.4.i386", "2.1AW:fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64", "2.1AW:fetchmail-0:5.9.0-21.7.3.el2.1.4.src", "2.1AW:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386", "2.1AW:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64", "2.1ES:fetchmail-0:5.9.0-21.7.3.el2.1.4.i386", "2.1ES:fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64", "2.1ES:fetchmail-0:5.9.0-21.7.3.el2.1.4.src", "2.1ES:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386", "2.1ES:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64", "2.1WS:fetchmail-0:5.9.0-21.7.3.el2.1.4.i386", "2.1WS:fetchmail-0:5.9.0-21.7.3.el2.1.4.ia64", "2.1WS:fetchmail-0:5.9.0-21.7.3.el2.1.4.src", "2.1WS:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.i386", "2.1WS:fetchmailconf-0:5.9.0-21.7.3.el2.1.4.ia64", "3AS:fetchmail-0:6.2.0-3.el3.3.i386", "3AS:fetchmail-0:6.2.0-3.el3.3.ia64", "3AS:fetchmail-0:6.2.0-3.el3.3.ppc", "3AS:fetchmail-0:6.2.0-3.el3.3.s390", "3AS:fetchmail-0:6.2.0-3.el3.3.s390x", "3AS:fetchmail-0:6.2.0-3.el3.3.src", "3AS:fetchmail-0:6.2.0-3.el3.3.x86_64", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.i386", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x", "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64", "3Desktop:fetchmail-0:6.2.0-3.el3.3.i386", "3Desktop:fetchmail-0:6.2.0-3.el3.3.ia64", "3Desktop:fetchmail-0:6.2.0-3.el3.3.ppc", "3Desktop:fetchmail-0:6.2.0-3.el3.3.s390", "3Desktop:fetchmail-0:6.2.0-3.el3.3.s390x", "3Desktop:fetchmail-0:6.2.0-3.el3.3.src", "3Desktop:fetchmail-0:6.2.0-3.el3.3.x86_64", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.i386", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x", "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64", "3ES:fetchmail-0:6.2.0-3.el3.3.i386", "3ES:fetchmail-0:6.2.0-3.el3.3.ia64", "3ES:fetchmail-0:6.2.0-3.el3.3.ppc", "3ES:fetchmail-0:6.2.0-3.el3.3.s390", "3ES:fetchmail-0:6.2.0-3.el3.3.s390x", "3ES:fetchmail-0:6.2.0-3.el3.3.src", "3ES:fetchmail-0:6.2.0-3.el3.3.x86_64", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.i386", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x", "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64", "3WS:fetchmail-0:6.2.0-3.el3.3.i386", "3WS:fetchmail-0:6.2.0-3.el3.3.ia64", "3WS:fetchmail-0:6.2.0-3.el3.3.ppc", "3WS:fetchmail-0:6.2.0-3.el3.3.s390", "3WS:fetchmail-0:6.2.0-3.el3.3.s390x", "3WS:fetchmail-0:6.2.0-3.el3.3.src", "3WS:fetchmail-0:6.2.0-3.el3.3.x86_64", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.i386", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.ia64", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.ppc", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.s390x", "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.3.x86_64", "4AS:fetchmail-0:6.2.5-6.el4.5.i386", "4AS:fetchmail-0:6.2.5-6.el4.5.ia64", "4AS:fetchmail-0:6.2.5-6.el4.5.ppc", "4AS:fetchmail-0:6.2.5-6.el4.5.s390", "4AS:fetchmail-0:6.2.5-6.el4.5.s390x", "4AS:fetchmail-0:6.2.5-6.el4.5.src", "4AS:fetchmail-0:6.2.5-6.el4.5.x86_64", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.i386", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x", "4AS:fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64", "4Desktop:fetchmail-0:6.2.5-6.el4.5.i386", "4Desktop:fetchmail-0:6.2.5-6.el4.5.ia64", "4Desktop:fetchmail-0:6.2.5-6.el4.5.ppc", "4Desktop:fetchmail-0:6.2.5-6.el4.5.s390", "4Desktop:fetchmail-0:6.2.5-6.el4.5.s390x", "4Desktop:fetchmail-0:6.2.5-6.el4.5.src", "4Desktop:fetchmail-0:6.2.5-6.el4.5.x86_64", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.i386", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x", "4Desktop:fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64", "4ES:fetchmail-0:6.2.5-6.el4.5.i386", "4ES:fetchmail-0:6.2.5-6.el4.5.ia64", "4ES:fetchmail-0:6.2.5-6.el4.5.ppc", "4ES:fetchmail-0:6.2.5-6.el4.5.s390", "4ES:fetchmail-0:6.2.5-6.el4.5.s390x", "4ES:fetchmail-0:6.2.5-6.el4.5.src", "4ES:fetchmail-0:6.2.5-6.el4.5.x86_64", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.i386", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x", "4ES:fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64", "4WS:fetchmail-0:6.2.5-6.el4.5.i386", "4WS:fetchmail-0:6.2.5-6.el4.5.ia64", "4WS:fetchmail-0:6.2.5-6.el4.5.ppc", "4WS:fetchmail-0:6.2.5-6.el4.5.s390", "4WS:fetchmail-0:6.2.5-6.el4.5.s390x", "4WS:fetchmail-0:6.2.5-6.el4.5.src", "4WS:fetchmail-0:6.2.5-6.el4.5.x86_64", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.i386", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.ia64", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.ppc", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.s390x", "4WS:fetchmail-debuginfo-0:6.2.5-6.el4.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:0018" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "fetchmail not enforcing TLS for POP3 properly" } ] }
gsd-2006-5867
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2006-5867", "description": "fetchmail before 6.3.6-rc4 does not properly enforce TLS and may transmit cleartext passwords over unsecured links if certain circumstances occur, which allows remote attackers to obtain sensitive information via man-in-the-middle (MITM) attacks.", "id": "GSD-2006-5867", "references": [ "https://www.suse.com/security/cve/CVE-2006-5867.html", "https://www.debian.org/security/2007/dsa-1259", "https://access.redhat.com/errata/RHSA-2007:0018", "https://linux.oracle.com/cve/CVE-2006-5867.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2006-5867" ], "details": "fetchmail before 6.3.6-rc4 does not properly enforce TLS and may transmit cleartext passwords over unsecured links if certain circumstances occur, which allows remote attackers to obtain sensitive information via man-in-the-middle (MITM) attacks.", "id": "GSD-2006-5867", "modified": "2023-12-13T01:19:56.158933Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-5867", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "fetchmail before 6.3.6-rc4 does not properly enforce TLS and may transmit cleartext passwords over unsecured links if certain circumstances occur, which allows remote attackers to obtain sensitive information via man-in-the-middle (MITM) attacks." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "SSA:2007-024-01", "refsource": "SLACKWARE", "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.517995" }, { "name": "USN-405-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/usn-405-1" }, { "name": "24966", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24966" }, { "name": "31580", "refsource": "OSVDB", "url": "http://osvdb.org/31580" }, { "name": "23781", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/23781" }, { "name": "24174", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24174" }, { "name": "DSA-1259", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2007/dsa-1259" }, { "name": "23838", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/23838" }, { "name": "24151", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24151" }, { "name": "http://docs.info.apple.com/article.html?artnum=305391", "refsource": "CONFIRM", "url": "http://docs.info.apple.com/article.html?artnum=305391" }, { "name": "23714", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/23714" }, { "name": "21903", "refsource": "BID", "url": "http://www.securityfocus.com/bid/21903" }, { "name": "24284", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24284" }, { "name": "23631", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/23631" }, { "name": "24007", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24007" }, { "name": "23804", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/23804" }, { "name": "20070105 fetchmail security announcement 2006-02 (CVE-2006-5867)", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/456115/100/0/threaded" }, { "name": "ADV-2007-0088", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/0088" }, { "name": "SUSE-SR:2007:004", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2007_4_sr.html" }, { "name": "TA07-109A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA07-109A.html" }, { "name": "23695", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/23695" }, { "name": "http://fetchmail.berlios.de/fetchmail-SA-2006-02.txt", "refsource": "CONFIRM", "url": "http://fetchmail.berlios.de/fetchmail-SA-2006-02.txt" }, { "name": "MDKSA-2007:016", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:016" }, { "name": "FEDORA-2007-041", "refsource": "FEDORA", "url": "http://fedoranews.org/cms/node/2429" }, { "name": "23923", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/23923" }, { "name": "OpenPKG-SA-2007.004", "refsource": "OPENPKG", "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.004.html" }, { "name": "2007-0007", "refsource": "TRUSTIX", "url": "http://www.trustix.org/errata/2007/0007" }, { "name": "20070218 Re: [SECURITY] [DSA 1259-1] New fetchmail packages fix information disclosure", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/460528/100/0/threaded" }, { "name": "GLSA-200701-13", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200701-13.xml" }, { "name": "1017478", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1017478" }, { "name": "https://issues.rpath.com/browse/RPL-919", "refsource": "CONFIRM", "url": "https://issues.rpath.com/browse/RPL-919" }, { "name": "20070201-01-P", "refsource": "SGI", "url": "ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc" }, { "name": "APPLE-SA-2007-04-19", "refsource": "APPLE", "url": "http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html" }, { "name": "ADV-2007-1470", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/1470" }, { "name": "ADV-2007-0087", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/0087" }, { "name": "RHSA-2007:0018", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2007-0018.html" }, { "name": "oval:org.mitre.oval:def:10566", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10566" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:6.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:6.2.5.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:6.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:6.2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.9.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.9.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.8.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.5.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.2.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.0.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.0.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:4.7.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:4.7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:4.6.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:4.6.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:4.6.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:4.6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:4.5.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:4.5.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.8.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:6.2.5.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc8:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:6.2.5.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:6.3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:6.2.6:pre4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:6.2.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.9.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.9.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.8.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.8.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.8.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.5.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.4.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.3.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.0.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.0.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:4.7.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:4.7.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:4.6.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:4.6.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:4.5.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:4.5.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:6.2.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc10:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:6.2.6:pre9:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:6.2.6:pre8:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:6.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:6.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.8.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.8.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.7.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.4.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.4.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.2.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.2.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.2.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.0.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.0.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:4.7.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:4.7.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:4.6.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:4.6.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:4.5.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:4.5.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:6.3.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:*:rc3:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "6.3.6", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:6.3.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:6.3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:6.3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:6.2.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:6.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.9.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.9.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.8.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.8.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.5.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.5.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.1.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:4.7.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:4.7.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:4.6.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:4.6.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:4.5.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:4.5.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:6.1.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.8.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:5.7.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc9:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-5867" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "fetchmail before 6.3.6-rc4 does not properly enforce TLS and may transmit cleartext passwords over unsecured links if certain circumstances occur, which allows remote attackers to obtain sensitive information via man-in-the-middle (MITM) attacks." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "http://fetchmail.berlios.de/fetchmail-SA-2006-02.txt", "refsource": "CONFIRM", "tags": [], "url": "http://fetchmail.berlios.de/fetchmail-SA-2006-02.txt" }, { "name": "21903", "refsource": "BID", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/21903" }, { "name": "23631", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/23631" }, { "name": "https://issues.rpath.com/browse/RPL-919", "refsource": "CONFIRM", "tags": [], "url": "https://issues.rpath.com/browse/RPL-919" }, { "name": "OpenPKG-SA-2007.004", "refsource": "OPENPKG", "tags": [], "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.004.html" }, { "name": "1017478", "refsource": "SECTRACK", "tags": [], "url": "http://securitytracker.com/id?1017478" }, { "name": "23695", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/23695" }, { "name": "USN-405-1", "refsource": "UBUNTU", "tags": [], "url": "http://www.ubuntu.com/usn/usn-405-1" }, { "name": "23714", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/23714" }, { "name": "23781", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/23781" }, { "name": "DSA-1259", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2007/dsa-1259" }, { "name": "FEDORA-2007-041", "refsource": "FEDORA", "tags": [], "url": "http://fedoranews.org/cms/node/2429" }, { "name": "GLSA-200701-13", "refsource": "GENTOO", "tags": [], "url": "http://security.gentoo.org/glsa/glsa-200701-13.xml" }, { "name": "RHSA-2007:0018", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2007-0018.html" }, { "name": "SSA:2007-024-01", "refsource": "SLACKWARE", "tags": [], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.517995" }, { "name": "2007-0007", "refsource": "TRUSTIX", "tags": [], "url": "http://www.trustix.org/errata/2007/0007" }, { "name": "23804", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/23804" }, { "name": "23838", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/23838" }, { "name": "23923", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/23923" }, { "name": "24007", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/24007" }, { "name": "24151", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/24151" }, { "name": "24174", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/24174" }, { "name": "SUSE-SR:2007:004", "refsource": "SUSE", "tags": [], "url": "http://www.novell.com/linux/security/advisories/2007_4_sr.html" }, { "name": "APPLE-SA-2007-04-19", "refsource": "APPLE", "tags": [], "url": "http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html" }, { "name": "24966", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/24966" }, { "name": "MDKSA-2007:016", "refsource": "MANDRIVA", "tags": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:016" }, { "name": "20070201-01-P", "refsource": "SGI", "tags": [], "url": "ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc" }, { "name": "TA07-109A", "refsource": "CERT", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-109A.html" }, { "name": "24284", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/24284" }, { "name": "31580", "refsource": "OSVDB", "tags": [], "url": "http://osvdb.org/31580" }, { "name": "ADV-2007-0087", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2007/0087" }, { "name": "ADV-2007-1470", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2007/1470" }, { "name": "ADV-2007-0088", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2007/0088" }, { "name": "http://docs.info.apple.com/article.html?artnum=305391", "refsource": "CONFIRM", "tags": [], "url": "http://docs.info.apple.com/article.html?artnum=305391" }, { "name": "oval:org.mitre.oval:def:10566", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10566" }, { "name": "20070218 Re: [SECURITY] [DSA 1259-1] New fetchmail packages fix information disclosure", "refsource": "BUGTRAQ", "tags": [], "url": "http://www.securityfocus.com/archive/1/460528/100/0/threaded" }, { "name": "20070105 fetchmail security announcement 2006-02 (CVE-2006-5867)", "refsource": "BUGTRAQ", "tags": [], "url": "http://www.securityfocus.com/archive/1/456115/100/0/threaded" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 7.8, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false } }, "lastModifiedDate": "2018-10-17T21:45Z", "publishedDate": "2006-12-31T05:00Z" } } }
ghsa-cq85-qr6h-4x5p
Vulnerability from github
fetchmail before 6.3.6-rc4 does not properly enforce TLS and may transmit cleartext passwords over unsecured links if certain circumstances occur, which allows remote attackers to obtain sensitive information via man-in-the-middle (MITM) attacks.
{ "affected": [], "aliases": [ "CVE-2006-5867" ], "database_specific": { "cwe_ids": [ "CWE-20" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2006-12-31T05:00:00Z", "severity": "HIGH" }, "details": "fetchmail before 6.3.6-rc4 does not properly enforce TLS and may transmit cleartext passwords over unsecured links if certain circumstances occur, which allows remote attackers to obtain sensitive information via man-in-the-middle (MITM) attacks.", "id": "GHSA-cq85-qr6h-4x5p", "modified": "2022-05-03T03:16:42Z", "published": "2022-05-03T03:16:42Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-5867" }, { "type": "WEB", "url": "https://issues.rpath.com/browse/RPL-919" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10566" }, { "type": "WEB", "url": "http://docs.info.apple.com/article.html?artnum=305391" }, { "type": "WEB", "url": "http://fedoranews.org/cms/node/2429" }, { "type": "WEB", "url": "http://fetchmail.berlios.de/fetchmail-SA-2006-02.txt" }, { "type": "WEB", "url": "http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html" }, { "type": "WEB", "url": "http://osvdb.org/31580" }, { "type": "WEB", "url": "http://secunia.com/advisories/23631" }, { "type": "WEB", "url": "http://secunia.com/advisories/23695" }, { "type": "WEB", "url": "http://secunia.com/advisories/23714" }, { "type": "WEB", "url": "http://secunia.com/advisories/23781" }, { "type": "WEB", "url": "http://secunia.com/advisories/23804" }, { "type": "WEB", "url": "http://secunia.com/advisories/23838" }, { "type": "WEB", "url": "http://secunia.com/advisories/23923" }, { "type": "WEB", "url": "http://secunia.com/advisories/24007" }, { "type": "WEB", "url": "http://secunia.com/advisories/24151" }, { "type": "WEB", "url": "http://secunia.com/advisories/24174" }, { "type": "WEB", "url": "http://secunia.com/advisories/24284" }, { "type": "WEB", "url": "http://secunia.com/advisories/24966" }, { "type": "WEB", "url": "http://security.gentoo.org/glsa/glsa-200701-13.xml" }, { "type": "WEB", "url": "http://securitytracker.com/id?1017478" }, { "type": "WEB", "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.517995" }, { "type": "WEB", "url": "http://www.debian.org/security/2007/dsa-1259" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:016" }, { "type": "WEB", "url": "http://www.novell.com/linux/security/advisories/2007_4_sr.html" }, { "type": "WEB", "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.004.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2007-0018.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/456115/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/460528/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/21903" }, { "type": "WEB", "url": "http://www.trustix.org/errata/2007/0007" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/usn-405-1" }, { "type": "WEB", "url": "http://www.us-cert.gov/cas/techalerts/TA07-109A.html" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2007/0087" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2007/0088" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2007/1470" } ], "schema_version": "1.4.0", "severity": [] }
CERTA-2007-AVI-185
Vulnerability from certfr_avis
Plusieurs vulnérabilités sous Apple MacOS X permettent à un utilisateur malveillant de compromettre un système vulnérable, localement ou à distance.
Description
Plusieurs vulnérabilités sont présentes sous Apple MacOS X :
- une vulnérabilité du client AFP permet à un utilisateur local de créer des fichiers ou d'exécuter des commandes avec les privilèges système ;
- une vulnérabilité dans Airport de type débordement de mémoire permettrait l'exécution d'un code arbitraire avec des privilèges élevés ;
- une vulnérabilité de CarbonCore permet l'exécution d'un code arbitraire avec des privilèges élevés ;
- une vulnérabilité dans fsck permet à un utilisateur d'exécuter du code arbitraire à distance en incitant un utilisateur à charger un fichier image (.dmg) spécialement conçu;
- une vulnérabilité dans fetchmail provoque l'envoi d'informations d'authentification en clair, même lorsque la configuration exige l'utilisation de TLS ;
- un débordement de mémoire dans ftpd permet à un utilisateur authentifié d'exécuter un code arbitraire à distance ;
- une mauvaise gestion de format dans Help Viewer et un débordement de mémoire dans GNU Tar permettent à un utilisateur malintentionné de provoquer un arrêt inopiné de l'application ou d'exécuter du code arbitraire ;
- un contrôle insuffisant dans HID permet à un utilisateur malveillant de capturer les entrées au clavier, y compris les données sensibles ;
- une erreur de gestion de format dans Installer permet à un utilisateur malintentionné de provoquer un arrêt inopiné de l'application ou d'exécuter du code arbitraire à distance ;
- une erreur dans WebFoundation permet à un domaine parent de lire un cookie positionné par l'un de ses sous-domaines ;
- le défaut de gestion de l'environnement par WebDav permet à un utilisateur local malintentionné de créer des fichiers ou d'exécuter des commandes avec les privilèges système ;
- un défaut de validation des paquets SIP par Videoconference permet à un utilisateur malintentionné d'exécuter un code arbitraire à distance ;
- URLMount monte des systèmes de fichiers distants via un serveur SMB en appelant la commande mount_smb ; Les identifiants et les mots de passe sont transmis comme arguments en ligne de commande, ce qui les expose à être divulgués à d'autres utilisateurs ;
- un manque de contrôle dans launchctl permet aux administrateurs locaux de lancer des commandes avec les privilèges système sans s'authentifier ;
- le défaut de gestion de l'environnement par le serveur SMB permettrait à un utilisateur local malintentionné de créer des fichiers ou d'exécuter des commandes avec les privilèges système ;
- lorsque le partage Internet Sharing est actif, un mauvais traitement de paquets RTSP permet à un utilisateur mal intentionné de provoquer un déni de service ou l'exécution de code arbitraire à distance ;
- des erreurs dans Login Window permettent à un utilisateur local de se connecter sans authentification ou d'élever ses privilèges ;
- des erreurs dans Libinfo permettent à un utilisateur malintentionné de provoquer un déni de service ou d'exécuter du code arbitraire à distance ;
- des vulnérabilités dans le démon d'administration de Kerberos permettent à un utilisateur malintentionné de provoquer un arrêt inopiné de l'application ou l'exécution de code arbitraire avec les droits système.
Apple a publié le 01 mai 2007 deux mises à jour de correctifs. La première concerne les pilotes sans-fil Airport pour Mac OS X v10.3.9, et la seconde le serveur FTP FTPServer sous Mac OS X v10.4.9. Le précédent correctif applique un fichier de configuration FTP incorrect, qui permettrait aux utilisateurs d'accéder illégitimement à certains répertoires.
Solution
Appliquer la mise à jour de sécurité 2007-004., ainsi que le correctif de cette mise à jour (v1.1). Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneTitle | Publication Time | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Apple MacOS X server version 10.3.x et 10.4.x.", "product": { "name": "macOS", "vendor": { "name": "Apple", "scada": false } } }, { "description": "Apple MacOS X version 10.3.x et 10.4.x ;", "product": { "name": "macOS", "vendor": { "name": "Apple", "scada": false } } } ], "affected_systems_content": null, "content": "## Description\n\nPlusieurs vuln\u00e9rabilit\u00e9s sont pr\u00e9sentes sous Apple MacOS X :\n\n- une vuln\u00e9rabilit\u00e9 du client AFP permet \u00e0 un utilisateur local de\n cr\u00e9er des fichiers ou d\u0027ex\u00e9cuter des commandes avec les privil\u00e8ges\n syst\u00e8me ;\n- une vuln\u00e9rabilit\u00e9 dans Airport de type d\u00e9bordement de m\u00e9moire\n permettrait l\u0027ex\u00e9cution d\u0027un code arbitraire avec des privil\u00e8ges\n \u00e9lev\u00e9s ;\n- une vuln\u00e9rabilit\u00e9 de CarbonCore permet l\u0027ex\u00e9cution d\u0027un code\n arbitraire avec des privil\u00e8ges \u00e9lev\u00e9s ;\n- une vuln\u00e9rabilit\u00e9 dans fsck permet \u00e0 un utilisateur d\u0027ex\u00e9cuter du\n code arbitraire \u00e0 distance en incitant un utilisateur \u00e0 charger un\n fichier image (.dmg) sp\u00e9cialement con\u00e7u;\n- une vuln\u00e9rabilit\u00e9 dans fetchmail provoque l\u0027envoi d\u0027informations\n d\u0027authentification en clair, m\u00eame lorsque la configuration exige\n l\u0027utilisation de TLS ;\n- un d\u00e9bordement de m\u00e9moire dans ftpd permet \u00e0 un utilisateur\n authentifi\u00e9 d\u0027ex\u00e9cuter un code arbitraire \u00e0 distance ;\n- une mauvaise gestion de format dans Help Viewer et un d\u00e9bordement de\n m\u00e9moire dans GNU Tar permettent \u00e0 un utilisateur malintentionn\u00e9 de\n provoquer un arr\u00eat inopin\u00e9 de l\u0027application ou d\u0027ex\u00e9cuter du code\n arbitraire ;\n- un contr\u00f4le insuffisant dans HID permet \u00e0 un utilisateur malveillant\n de capturer les entr\u00e9es au clavier, y compris les donn\u00e9es sensibles\n ;\n- une erreur de gestion de format dans Installer permet \u00e0 un\n utilisateur malintentionn\u00e9 de provoquer un arr\u00eat inopin\u00e9 de\n l\u0027application ou d\u0027ex\u00e9cuter du code arbitraire \u00e0 distance ;\n- une erreur dans WebFoundation permet \u00e0 un domaine parent de lire un\n cookie positionn\u00e9 par l\u0027un de ses sous-domaines ;\n- le d\u00e9faut de gestion de l\u0027environnement par WebDav permet \u00e0 un\n utilisateur local malintentionn\u00e9 de cr\u00e9er des fichiers ou d\u0027ex\u00e9cuter\n des commandes avec les privil\u00e8ges syst\u00e8me ;\n- un d\u00e9faut de validation des paquets SIP par Videoconference permet \u00e0\n un utilisateur malintentionn\u00e9 d\u0027ex\u00e9cuter un code arbitraire \u00e0\n distance ;\n- URLMount monte des syst\u00e8mes de fichiers distants via un serveur SMB\n en appelant la commande mount_smb ; Les identifiants et les mots de\n passe sont transmis comme arguments en ligne de commande, ce qui les\n expose \u00e0 \u00eatre divulgu\u00e9s \u00e0 d\u0027autres utilisateurs ;\n- un manque de contr\u00f4le dans launchctl permet aux administrateurs\n locaux de lancer des commandes avec les privil\u00e8ges syst\u00e8me sans\n s\u0027authentifier ;\n- le d\u00e9faut de gestion de l\u0027environnement par le serveur SMB\n permettrait \u00e0 un utilisateur local malintentionn\u00e9 de cr\u00e9er des\n fichiers ou d\u0027ex\u00e9cuter des commandes avec les privil\u00e8ges syst\u00e8me ;\n- lorsque le partage Internet Sharing est actif, un mauvais traitement\n de paquets RTSP permet \u00e0 un utilisateur mal intentionn\u00e9 de provoquer\n un d\u00e9ni de service ou l\u0027ex\u00e9cution de code arbitraire \u00e0 distance ;\n- des erreurs dans Login Window permettent \u00e0 un utilisateur local de\n se connecter sans authentification ou d\u0027\u00e9lever ses privil\u00e8ges ;\n- des erreurs dans Libinfo permettent \u00e0 un utilisateur malintentionn\u00e9\n de provoquer un d\u00e9ni de service ou d\u0027ex\u00e9cuter du code arbitraire \u00e0\n distance ;\n- des vuln\u00e9rabilit\u00e9s dans le d\u00e9mon d\u0027administration de Kerberos\n permettent \u00e0 un utilisateur malintentionn\u00e9 de provoquer un arr\u00eat\n inopin\u00e9 de l\u0027application ou l\u0027ex\u00e9cution de code arbitraire avec les\n droits syst\u00e8me.\n\nApple a publi\u00e9 le 01 mai 2007 deux mises \u00e0 jour de correctifs. La\npremi\u00e8re concerne les pilotes sans-fil Airport pour Mac OS X v10.3.9, et\nla seconde le serveur FTP FTPServer sous Mac OS X v10.4.9. Le pr\u00e9c\u00e9dent\ncorrectif applique un fichier de configuration FTP incorrect, qui\npermettrait aux utilisateurs d\u0027acc\u00e9der ill\u00e9gitimement \u00e0 certains\nr\u00e9pertoires.\n\n## Solution\n\nAppliquer la mise \u00e0 jour de s\u00e9curit\u00e9 2007-004., ainsi que le correctif\nde cette mise \u00e0 jour (v1.1). Se r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de\nl\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2007-0744", "url": "https://www.cve.org/CVERecord?id=CVE-2007-0744" }, { "name": "CVE-2007-0646", "url": "https://www.cve.org/CVERecord?id=CVE-2007-0646" }, { "name": "CVE-2007-0732", "url": "https://www.cve.org/CVERecord?id=CVE-2007-0732" }, { "name": "CVE-2007-0738", "url": "https://www.cve.org/CVERecord?id=CVE-2007-0738" }, { "name": "CVE-2006-5867", "url": "https://www.cve.org/CVERecord?id=CVE-2006-5867" }, { "name": "CVE-2007-0741", "url": "https://www.cve.org/CVERecord?id=CVE-2007-0741" }, { "name": "CVE-2007-0957", "url": "https://www.cve.org/CVERecord?id=CVE-2007-0957" }, { "name": "CVE-2007-0742", "url": "https://www.cve.org/CVERecord?id=CVE-2007-0742" }, { "name": "CVE-2007-0729", "url": "https://www.cve.org/CVERecord?id=CVE-2007-0729" }, { "name": "CVE-2007-0743", "url": "https://www.cve.org/CVERecord?id=CVE-2007-0743" }, { "name": "CVE-2007-0736", "url": "https://www.cve.org/CVERecord?id=CVE-2007-0736" }, { "name": "CVE-2007-0465", "url": "https://www.cve.org/CVERecord?id=CVE-2007-0465" }, { "name": "CVE-2007-0724", "url": "https://www.cve.org/CVERecord?id=CVE-2007-0724" }, { "name": "CVE-2007-0739", "url": "https://www.cve.org/CVERecord?id=CVE-2007-0739" }, { "name": "CVE-2007-1216", "url": "https://www.cve.org/CVERecord?id=CVE-2007-1216" }, { "name": "CVE-2007-0734", "url": "https://www.cve.org/CVERecord?id=CVE-2007-0734" }, { "name": "CVE-2007-0746", "url": "https://www.cve.org/CVERecord?id=CVE-2007-0746" }, { "name": "CVE-2007-0927", "url": "https://www.cve.org/CVERecord?id=CVE-2007-0927" }, { "name": "CVE-2006-0300", "url": "https://www.cve.org/CVERecord?id=CVE-2006-0300" }, { "name": "CVE-2007-0745", "url": "https://www.cve.org/CVERecord?id=CVE-2007-0745" }, { "name": "CVE-2007-0725", "url": "https://www.cve.org/CVERecord?id=CVE-2007-0725" }, { "name": "CVE-2007-0747", "url": "https://www.cve.org/CVERecord?id=CVE-2007-0747" }, { "name": "CVE-2007-0022", "url": "https://www.cve.org/CVERecord?id=CVE-2007-0022" }, { "name": "CVE-2007-0735", "url": "https://www.cve.org/CVERecord?id=CVE-2007-0735" }, { "name": "CVE-2007-0737", "url": "https://www.cve.org/CVERecord?id=CVE-2007-0737" }, { "name": "CVE-2006-6652", "url": "https://www.cve.org/CVERecord?id=CVE-2006-6652" }, { "name": "CVE-2006-6143", "url": "https://www.cve.org/CVERecord?id=CVE-2006-6143" } ], "initial_release_date": "2007-04-20T00:00:00", "last_revision_date": "2007-05-03T00:00:00", "links": [ { "title": "Bulletin de s\u00e9curit\u00e9 Apple du 19 avril 2007 :", "url": "http://docs.info.apple.com/article.html?artnum=305391" }, { "title": "Mise \u00e0 jour du bulletin pr\u00e9c\u00e9dent, faite le 01 mai 2007 :", "url": "http://docs.info.apple.com/article.html?artnum=305445" } ], "reference": "CERTA-2007-AVI-185", "revisions": [ { "description": "version initiale.", "revision_date": "2007-04-20T00:00:00.000000" }, { "description": "ajout de la mise \u00e0 jour du bulletin d\u0027avril 2007, ainsi que la r\u00e9f\u00e9rence au CVE CVE-2007-0745.", "revision_date": "2007-05-03T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "D\u00e9ni de service" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "Plusieurs vuln\u00e9rabilit\u00e9s sous \u003cspan class=\"textit\"\u003eApple MacOS X\u003c/span\u003e\npermettent \u00e0 un utilisateur malveillant de compromettre un syst\u00e8me\nvuln\u00e9rable, localement ou \u00e0 distance.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans Apple MacOS X", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de mise \u00e0 jour Apple", "url": null } ] }
CERTA-2007-AVI-020
Vulnerability from certfr_avis
Plusieurs vulnérabilités dans Fetchmail permettent à un utilisateur distant de provoquer un déni de service ou de porter atteinte à la confidentialité de données de connexions.
Description
Deux vulnérabilités sont présentes dans l'utilitaire de reccupération de mail Fetchmail :
- la première vulnérabilité est de type «pointeur nul» et permet à un utilisateur distant de provoquer un arrêt inopiné du service par le biais d'un message construit de façon particulière ;
- la deuxième vulnérabilité concerne un ensemble d'erreurs dans la mise en œuvre d'un certain nombre de systèmes d'authentification. Ces erreurs permettraient à un utilisateur distant de forcer Fetchmail à envoyer les données de connexions comme les mots de passe en clair plutôt qu'en chiffré comme indiqué dans son fichier de configuration.
Solution
La version 6.3.6 de Fetchmail corrige le problème :
http://fetchmail.berlios.de
Fetchmail versions 6.3.5 et antérieures.
Vendor | Product | Description |
---|
Title | Publication Time | Tags | |||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [], "affected_systems_content": "\u003cp\u003eFetchmail versions 6.3.5 et ant\u00e9rieures.\u003c/p\u003e", "content": "## Description\n\nDeux vuln\u00e9rabilit\u00e9s sont pr\u00e9sentes dans l\u0027utilitaire de reccup\u00e9ration de\nmail Fetchmail :\n\n- la premi\u00e8re vuln\u00e9rabilit\u00e9 est de type \u00abpointeur nul\u00bb et permet \u00e0 un\n utilisateur distant de provoquer un arr\u00eat inopin\u00e9 du service par le\n biais d\u0027un message construit de fa\u00e7on particuli\u00e8re ;\n- la deuxi\u00e8me vuln\u00e9rabilit\u00e9 concerne un ensemble d\u0027erreurs dans la\n mise en \u0153uvre d\u0027un certain nombre de syst\u00e8mes d\u0027authentification.\n Ces erreurs permettraient \u00e0 un utilisateur distant de forcer\n Fetchmail \u00e0 envoyer les donn\u00e9es de connexions comme les mots de\n passe en clair plut\u00f4t qu\u0027en chiffr\u00e9 comme indiqu\u00e9 dans son fichier\n de configuration.\n\n## Solution\n\nLa version 6.3.6 de Fetchmail corrige le probl\u00e8me :\n\n http://fetchmail.berlios.de\n", "cves": [ { "name": "CVE-2006-5867", "url": "https://www.cve.org/CVERecord?id=CVE-2006-5867" }, { "name": "CVE-2006-5974", "url": "https://www.cve.org/CVERecord?id=CVE-2006-5974" } ], "initial_release_date": "2007-01-10T00:00:00", "last_revision_date": "2007-03-26T00:00:00", "links": [ { "title": "Bulletin de s\u00e9curit\u00e9 Fetchmail SA-2006-02 du 04 janvier 2007 :", "url": "http://fetchmail.berlios.de/fetchmail-SA-2006-02.txt" }, { "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-405-1 du 11 janvier 2007 :", "url": "http://www.ubuntu.com/usn/usn-405-1" }, { "title": "Bulletin de s\u00e9curit\u00e9 Debian DSA-1259 du 14 f\u00e9vrier 2007 :", "url": "http://www.debian.org/security/2007/dsa-1259" }, { "title": "Bulletin de s\u00e9curit\u00e9 Fetchmail SA-2006-03 du 04 janvier 2007 :", "url": "http://fetchmail.berlios.de/fetchmail-SA-2006-03.txt" }, { "title": "Bulletin de s\u00e9curit\u00e9 SuSE SUSE-SR:2007:004 du 16 mars 2007 :", "url": "http://lists.suse.com/archive/suse-security-announce/2007-Mar/0005.html" }, { "title": "Bulletin de s\u00e9curit\u00e9 Mandriva MDKSA-2007:016 du 15 janvier 2007 :", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:016" }, { "title": "Bulletin de s\u00e9curit\u00e9 Gentoo GLSA 200701-13 du 22 janvier 2007 :", "url": "http://www.gentoo.org/security/en/glsa/glsa-200701-13.xml" }, { "title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2007:0018 du 31 janvier 2007 :", "url": "http://rhn.redhat.com/errata/RHSA-2007-0018.html" } ], "reference": "CERTA-2007-AVI-020", "revisions": [ { "description": "version initiale.", "revision_date": "2007-01-10T00:00:00.000000" }, { "description": "ajout des r\u00e9f\u00e9rences aux bulletins de s\u00e9curit\u00e9 Gentoo, Mandriva et Ubuntu.", "revision_date": "2007-01-29T00:00:00.000000" }, { "description": "ajout de la r\u00e9f\u00e9rence au bulletin de s\u00e9curit\u00e9 RedHat.", "revision_date": "2007-02-02T00:00:00.000000" }, { "description": "ajout des r\u00e9f\u00e9rences aux bulletins de s\u00e9curit\u00e9 Debian et SuSE.", "revision_date": "2007-03-26T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "Plusieurs vuln\u00e9rabilit\u00e9s dans Fetchmail permettent \u00e0 un utilisateur\ndistant de provoquer un d\u00e9ni de service ou de porter atteinte \u00e0 la\nconfidentialit\u00e9 de donn\u00e9es de connexions.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans Fetchmail", "vendor_advisories": [ { "published_at": null, "title": "Bulletins de s\u00e9curit\u00e9 Fetchmail SA-2006-02 et SA-2006-03", "url": null } ] }
opensuse-su-2024:10753-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "fetchmail-6.4.21-2.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the fetchmail-6.4.21-2.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-10753", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10753-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2006-0321 page", "url": "https://www.suse.com/security/cve/CVE-2006-0321/" }, { "category": "self", "summary": "SUSE CVE CVE-2006-5867 page", "url": "https://www.suse.com/security/cve/CVE-2006-5867/" }, { "category": "self", "summary": "SUSE CVE CVE-2006-5974 page", "url": "https://www.suse.com/security/cve/CVE-2006-5974/" }, { "category": "self", "summary": "SUSE CVE CVE-2007-1558 page", "url": "https://www.suse.com/security/cve/CVE-2007-1558/" }, { "category": "self", "summary": "SUSE CVE CVE-2007-4565 page", "url": "https://www.suse.com/security/cve/CVE-2007-4565/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-36386 page", "url": "https://www.suse.com/security/cve/CVE-2021-36386/" } ], "title": "fetchmail-6.4.21-2.1 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:10753-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "fetchmail-6.4.21-2.1.aarch64", "product": { "name": "fetchmail-6.4.21-2.1.aarch64", "product_id": "fetchmail-6.4.21-2.1.aarch64" } }, { "category": "product_version", "name": "fetchmailconf-6.4.21-2.1.aarch64", "product": { "name": "fetchmailconf-6.4.21-2.1.aarch64", "product_id": "fetchmailconf-6.4.21-2.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "fetchmail-6.4.21-2.1.ppc64le", "product": { "name": "fetchmail-6.4.21-2.1.ppc64le", "product_id": "fetchmail-6.4.21-2.1.ppc64le" } }, { "category": "product_version", "name": "fetchmailconf-6.4.21-2.1.ppc64le", "product": { "name": "fetchmailconf-6.4.21-2.1.ppc64le", "product_id": "fetchmailconf-6.4.21-2.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "fetchmail-6.4.21-2.1.s390x", "product": { "name": "fetchmail-6.4.21-2.1.s390x", "product_id": "fetchmail-6.4.21-2.1.s390x" } }, { "category": "product_version", "name": "fetchmailconf-6.4.21-2.1.s390x", "product": { "name": "fetchmailconf-6.4.21-2.1.s390x", "product_id": "fetchmailconf-6.4.21-2.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "fetchmail-6.4.21-2.1.x86_64", "product": { "name": "fetchmail-6.4.21-2.1.x86_64", "product_id": "fetchmail-6.4.21-2.1.x86_64" } }, { "category": "product_version", "name": "fetchmailconf-6.4.21-2.1.x86_64", "product": { "name": "fetchmailconf-6.4.21-2.1.x86_64", "product_id": "fetchmailconf-6.4.21-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "fetchmail-6.4.21-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:fetchmail-6.4.21-2.1.aarch64" }, "product_reference": "fetchmail-6.4.21-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-6.4.21-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:fetchmail-6.4.21-2.1.ppc64le" }, "product_reference": "fetchmail-6.4.21-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-6.4.21-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:fetchmail-6.4.21-2.1.s390x" }, "product_reference": "fetchmail-6.4.21-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmail-6.4.21-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:fetchmail-6.4.21-2.1.x86_64" }, "product_reference": "fetchmail-6.4.21-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmailconf-6.4.21-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.aarch64" }, "product_reference": "fetchmailconf-6.4.21-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmailconf-6.4.21-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.ppc64le" }, "product_reference": "fetchmailconf-6.4.21-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmailconf-6.4.21-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.s390x" }, "product_reference": "fetchmailconf-6.4.21-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "fetchmailconf-6.4.21-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.x86_64" }, "product_reference": "fetchmailconf-6.4.21-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2006-0321", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2006-0321" } ], "notes": [ { "category": "general", "text": "fetchmail 6.3.0 and other versions before 6.3.2 allows remote attackers to cause a denial of service (crash) via crafted e-mail messages that cause a free of an invalid pointer when fetchmail bounces the message to the originator or local postmaster.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:fetchmail-6.4.21-2.1.aarch64", "openSUSE Tumbleweed:fetchmail-6.4.21-2.1.ppc64le", "openSUSE Tumbleweed:fetchmail-6.4.21-2.1.s390x", "openSUSE Tumbleweed:fetchmail-6.4.21-2.1.x86_64", "openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.aarch64", "openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.ppc64le", "openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.s390x", "openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2006-0321", "url": "https://www.suse.com/security/cve/CVE-2006-0321" }, { "category": "external", "summary": "SUSE Bug 140475 for CVE-2006-0321", "url": "https://bugzilla.suse.com/140475" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:fetchmail-6.4.21-2.1.aarch64", "openSUSE Tumbleweed:fetchmail-6.4.21-2.1.ppc64le", "openSUSE Tumbleweed:fetchmail-6.4.21-2.1.s390x", "openSUSE Tumbleweed:fetchmail-6.4.21-2.1.x86_64", "openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.aarch64", "openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.ppc64le", "openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.s390x", "openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2006-0321" }, { "cve": "CVE-2006-5867", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2006-5867" } ], "notes": [ { "category": "general", "text": "fetchmail before 6.3.6-rc4 does not properly enforce TLS and may transmit cleartext passwords over unsecured links if certain circumstances occur, which allows remote attackers to obtain sensitive information via man-in-the-middle (MITM) attacks.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:fetchmail-6.4.21-2.1.aarch64", "openSUSE Tumbleweed:fetchmail-6.4.21-2.1.ppc64le", "openSUSE Tumbleweed:fetchmail-6.4.21-2.1.s390x", "openSUSE Tumbleweed:fetchmail-6.4.21-2.1.x86_64", "openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.aarch64", "openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.ppc64le", "openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.s390x", "openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2006-5867", "url": "https://www.suse.com/security/cve/CVE-2006-5867" }, { "category": "external", "summary": "SUSE Bug 223507 for CVE-2006-5867", "url": "https://bugzilla.suse.com/223507" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:fetchmail-6.4.21-2.1.aarch64", "openSUSE Tumbleweed:fetchmail-6.4.21-2.1.ppc64le", "openSUSE Tumbleweed:fetchmail-6.4.21-2.1.s390x", "openSUSE Tumbleweed:fetchmail-6.4.21-2.1.x86_64", "openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.aarch64", "openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.ppc64le", "openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.s390x", "openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2006-5867" }, { "cve": "CVE-2006-5974", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2006-5974" } ], "notes": [ { "category": "general", "text": "fetchmail 6.3.5 and 6.3.6 before 6.3.6-rc4, when refusing a message delivered via the mda option, allows remote attackers to cause a denial of service (crash) via unknown vectors that trigger a NULL pointer dereference when calling the (1) ferror or (2) fflush functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:fetchmail-6.4.21-2.1.aarch64", "openSUSE Tumbleweed:fetchmail-6.4.21-2.1.ppc64le", "openSUSE Tumbleweed:fetchmail-6.4.21-2.1.s390x", "openSUSE Tumbleweed:fetchmail-6.4.21-2.1.x86_64", "openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.aarch64", "openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.ppc64le", "openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.s390x", "openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2006-5974", "url": "https://www.suse.com/security/cve/CVE-2006-5974" }, { "category": "external", "summary": "SUSE Bug 223507 for CVE-2006-5974", "url": "https://bugzilla.suse.com/223507" }, { "category": "external", "summary": "SUSE Bug 239002 for CVE-2006-5974", "url": "https://bugzilla.suse.com/239002" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:fetchmail-6.4.21-2.1.aarch64", "openSUSE Tumbleweed:fetchmail-6.4.21-2.1.ppc64le", "openSUSE Tumbleweed:fetchmail-6.4.21-2.1.s390x", "openSUSE Tumbleweed:fetchmail-6.4.21-2.1.x86_64", "openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.aarch64", "openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.ppc64le", "openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.s390x", "openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2006-5974" }, { "cve": "CVE-2007-1558", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2007-1558" } ], "notes": [ { "category": "general", "text": "The APOP protocol allows remote attackers to guess the first 3 characters of a password via man-in-the-middle (MITM) attacks that use crafted message IDs and MD5 collisions. NOTE: this design-level issue potentially affects all products that use APOP, including (1) Thunderbird 1.x before 1.5.0.12 and 2.x before 2.0.0.4, (2) Evolution, (3) mutt, (4) fetchmail before 6.3.8, (5) SeaMonkey 1.0.x before 1.0.9 and 1.1.x before 1.1.2, (6) Balsa 2.3.16 and earlier, (7) Mailfilter before 0.8.2, and possibly other products.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:fetchmail-6.4.21-2.1.aarch64", "openSUSE Tumbleweed:fetchmail-6.4.21-2.1.ppc64le", "openSUSE Tumbleweed:fetchmail-6.4.21-2.1.s390x", "openSUSE Tumbleweed:fetchmail-6.4.21-2.1.x86_64", "openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.aarch64", "openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.ppc64le", "openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.s390x", "openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2007-1558", "url": "https://www.suse.com/security/cve/CVE-2007-1558" }, { "category": "external", "summary": "SUSE Bug 262450 for CVE-2007-1558", "url": "https://bugzilla.suse.com/262450" }, { "category": "external", "summary": "SUSE Bug 271197 for CVE-2007-1558", "url": "https://bugzilla.suse.com/271197" }, { "category": "external", "summary": "SUSE Bug 279843 for CVE-2007-1558", "url": "https://bugzilla.suse.com/279843" }, { "category": "external", "summary": "SUSE Bug 281321 for CVE-2007-1558", "url": "https://bugzilla.suse.com/281321" }, { "category": "external", "summary": "SUSE Bug 281323 for CVE-2007-1558", "url": "https://bugzilla.suse.com/281323" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:fetchmail-6.4.21-2.1.aarch64", "openSUSE Tumbleweed:fetchmail-6.4.21-2.1.ppc64le", "openSUSE Tumbleweed:fetchmail-6.4.21-2.1.s390x", "openSUSE Tumbleweed:fetchmail-6.4.21-2.1.x86_64", "openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.aarch64", "openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.ppc64le", "openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.s390x", "openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2007-1558" }, { "cve": "CVE-2007-4565", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2007-4565" } ], "notes": [ { "category": "general", "text": "sink.c in fetchmail before 6.3.9 allows context-dependent attackers to cause a denial of service (NULL dereference and application crash) by refusing certain warning messages that are sent over SMTP.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:fetchmail-6.4.21-2.1.aarch64", "openSUSE Tumbleweed:fetchmail-6.4.21-2.1.ppc64le", "openSUSE Tumbleweed:fetchmail-6.4.21-2.1.s390x", "openSUSE Tumbleweed:fetchmail-6.4.21-2.1.x86_64", "openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.aarch64", "openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.ppc64le", "openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.s390x", "openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2007-4565", "url": "https://www.suse.com/security/cve/CVE-2007-4565" }, { "category": "external", "summary": "SUSE Bug 308271 for CVE-2007-4565", "url": "https://bugzilla.suse.com/308271" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:fetchmail-6.4.21-2.1.aarch64", "openSUSE Tumbleweed:fetchmail-6.4.21-2.1.ppc64le", "openSUSE Tumbleweed:fetchmail-6.4.21-2.1.s390x", "openSUSE Tumbleweed:fetchmail-6.4.21-2.1.x86_64", "openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.aarch64", "openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.ppc64le", "openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.s390x", "openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2007-4565" }, { "cve": "CVE-2021-36386", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-36386" } ], "notes": [ { "category": "general", "text": "report_vbuild in report.c in Fetchmail before 6.4.20 sometimes omits initialization of the vsnprintf va_list argument, which might allow mail servers to cause a denial of service or possibly have unspecified other impact via long error messages. NOTE: it is unclear whether use of Fetchmail on any realistic platform results in an impact beyond an inconvenience to the client user.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:fetchmail-6.4.21-2.1.aarch64", "openSUSE Tumbleweed:fetchmail-6.4.21-2.1.ppc64le", "openSUSE Tumbleweed:fetchmail-6.4.21-2.1.s390x", "openSUSE Tumbleweed:fetchmail-6.4.21-2.1.x86_64", "openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.aarch64", "openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.ppc64le", "openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.s390x", "openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-36386", "url": "https://www.suse.com/security/cve/CVE-2021-36386" }, { "category": "external", "summary": "SUSE Bug 1188875 for CVE-2021-36386", "url": "https://bugzilla.suse.com/1188875" }, { "category": "external", "summary": "SUSE Bug 1224188 for CVE-2021-36386", "url": "https://bugzilla.suse.com/1224188" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:fetchmail-6.4.21-2.1.aarch64", "openSUSE Tumbleweed:fetchmail-6.4.21-2.1.ppc64le", "openSUSE Tumbleweed:fetchmail-6.4.21-2.1.s390x", "openSUSE Tumbleweed:fetchmail-6.4.21-2.1.x86_64", "openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.aarch64", "openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.ppc64le", "openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.s390x", "openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:fetchmail-6.4.21-2.1.aarch64", "openSUSE Tumbleweed:fetchmail-6.4.21-2.1.ppc64le", "openSUSE Tumbleweed:fetchmail-6.4.21-2.1.s390x", "openSUSE Tumbleweed:fetchmail-6.4.21-2.1.x86_64", "openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.aarch64", "openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.ppc64le", "openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.s390x", "openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-36386" } ] }
fkie_cve-2006-5867
Vulnerability from fkie_nvd
URL | Tags | ||
---|---|---|---|
cve@mitre.org | ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc | ||
cve@mitre.org | http://docs.info.apple.com/article.html?artnum=305391 | ||
cve@mitre.org | http://fedoranews.org/cms/node/2429 | ||
cve@mitre.org | http://fetchmail.berlios.de/fetchmail-SA-2006-02.txt | ||
cve@mitre.org | http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html | ||
cve@mitre.org | http://osvdb.org/31580 | ||
cve@mitre.org | http://secunia.com/advisories/23631 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/23695 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/23714 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/23781 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/23804 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/23838 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/23923 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/24007 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/24151 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/24174 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/24284 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/24966 | Vendor Advisory | |
cve@mitre.org | http://security.gentoo.org/glsa/glsa-200701-13.xml | ||
cve@mitre.org | http://securitytracker.com/id?1017478 | ||
cve@mitre.org | http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.517995 | ||
cve@mitre.org | http://www.debian.org/security/2007/dsa-1259 | ||
cve@mitre.org | http://www.mandriva.com/security/advisories?name=MDKSA-2007:016 | ||
cve@mitre.org | http://www.novell.com/linux/security/advisories/2007_4_sr.html | ||
cve@mitre.org | http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.004.html | ||
cve@mitre.org | http://www.redhat.com/support/errata/RHSA-2007-0018.html | ||
cve@mitre.org | http://www.securityfocus.com/archive/1/456115/100/0/threaded | ||
cve@mitre.org | http://www.securityfocus.com/archive/1/460528/100/0/threaded | ||
cve@mitre.org | http://www.securityfocus.com/bid/21903 | Patch | |
cve@mitre.org | http://www.trustix.org/errata/2007/0007 | ||
cve@mitre.org | http://www.ubuntu.com/usn/usn-405-1 | ||
cve@mitre.org | http://www.us-cert.gov/cas/techalerts/TA07-109A.html | US Government Resource | |
cve@mitre.org | http://www.vupen.com/english/advisories/2007/0087 | ||
cve@mitre.org | http://www.vupen.com/english/advisories/2007/0088 | ||
cve@mitre.org | http://www.vupen.com/english/advisories/2007/1470 | ||
cve@mitre.org | https://issues.rpath.com/browse/RPL-919 | ||
cve@mitre.org | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10566 | ||
af854a3a-2127-422b-91ae-364da2661108 | ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc | ||
af854a3a-2127-422b-91ae-364da2661108 | http://docs.info.apple.com/article.html?artnum=305391 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://fedoranews.org/cms/node/2429 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://fetchmail.berlios.de/fetchmail-SA-2006-02.txt | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/31580 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/23631 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/23695 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/23714 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/23781 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/23804 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/23838 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/23923 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/24007 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/24151 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/24174 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/24284 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/24966 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-200701-13.xml | ||
af854a3a-2127-422b-91ae-364da2661108 | http://securitytracker.com/id?1017478 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.517995 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2007/dsa-1259 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDKSA-2007:016 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.novell.com/linux/security/advisories/2007_4_sr.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.004.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2007-0018.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/456115/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/460528/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/21903 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.trustix.org/errata/2007/0007 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/usn-405-1 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA07-109A.html | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2007/0087 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2007/0088 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2007/1470 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://issues.rpath.com/browse/RPL-919 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10566 |
Vendor | Product | Version | |
---|---|---|---|
fetchmail | fetchmail | * | |
fetchmail | fetchmail | 4.5.1 | |
fetchmail | fetchmail | 4.5.2 | |
fetchmail | fetchmail | 4.5.3 | |
fetchmail | fetchmail | 4.5.4 | |
fetchmail | fetchmail | 4.5.5 | |
fetchmail | fetchmail | 4.5.6 | |
fetchmail | fetchmail | 4.5.7 | |
fetchmail | fetchmail | 4.5.8 | |
fetchmail | fetchmail | 4.6.0 | |
fetchmail | fetchmail | 4.6.1 | |
fetchmail | fetchmail | 4.6.2 | |
fetchmail | fetchmail | 4.6.3 | |
fetchmail | fetchmail | 4.6.4 | |
fetchmail | fetchmail | 4.6.5 | |
fetchmail | fetchmail | 4.6.6 | |
fetchmail | fetchmail | 4.6.7 | |
fetchmail | fetchmail | 4.6.8 | |
fetchmail | fetchmail | 4.6.9 | |
fetchmail | fetchmail | 4.7.0 | |
fetchmail | fetchmail | 4.7.1 | |
fetchmail | fetchmail | 4.7.2 | |
fetchmail | fetchmail | 4.7.3 | |
fetchmail | fetchmail | 4.7.4 | |
fetchmail | fetchmail | 4.7.5 | |
fetchmail | fetchmail | 4.7.6 | |
fetchmail | fetchmail | 4.7.7 | |
fetchmail | fetchmail | 5.0.0 | |
fetchmail | fetchmail | 5.0.1 | |
fetchmail | fetchmail | 5.0.2 | |
fetchmail | fetchmail | 5.0.3 | |
fetchmail | fetchmail | 5.0.4 | |
fetchmail | fetchmail | 5.0.5 | |
fetchmail | fetchmail | 5.0.6 | |
fetchmail | fetchmail | 5.0.7 | |
fetchmail | fetchmail | 5.0.8 | |
fetchmail | fetchmail | 5.1.0 | |
fetchmail | fetchmail | 5.1.4 | |
fetchmail | fetchmail | 5.2.0 | |
fetchmail | fetchmail | 5.2.1 | |
fetchmail | fetchmail | 5.2.3 | |
fetchmail | fetchmail | 5.2.4 | |
fetchmail | fetchmail | 5.2.7 | |
fetchmail | fetchmail | 5.2.8 | |
fetchmail | fetchmail | 5.3.0 | |
fetchmail | fetchmail | 5.3.1 | |
fetchmail | fetchmail | 5.3.3 | |
fetchmail | fetchmail | 5.3.8 | |
fetchmail | fetchmail | 5.4.0 | |
fetchmail | fetchmail | 5.4.3 | |
fetchmail | fetchmail | 5.4.4 | |
fetchmail | fetchmail | 5.4.5 | |
fetchmail | fetchmail | 5.5.0 | |
fetchmail | fetchmail | 5.5.2 | |
fetchmail | fetchmail | 5.5.3 | |
fetchmail | fetchmail | 5.5.5 | |
fetchmail | fetchmail | 5.5.6 | |
fetchmail | fetchmail | 5.6.0 | |
fetchmail | fetchmail | 5.7.0 | |
fetchmail | fetchmail | 5.7.2 | |
fetchmail | fetchmail | 5.7.4 | |
fetchmail | fetchmail | 5.8 | |
fetchmail | fetchmail | 5.8.1 | |
fetchmail | fetchmail | 5.8.2 | |
fetchmail | fetchmail | 5.8.3 | |
fetchmail | fetchmail | 5.8.4 | |
fetchmail | fetchmail | 5.8.5 | |
fetchmail | fetchmail | 5.8.6 | |
fetchmail | fetchmail | 5.8.11 | |
fetchmail | fetchmail | 5.8.13 | |
fetchmail | fetchmail | 5.8.14 | |
fetchmail | fetchmail | 5.8.17 | |
fetchmail | fetchmail | 5.9.0 | |
fetchmail | fetchmail | 5.9.4 | |
fetchmail | fetchmail | 5.9.5 | |
fetchmail | fetchmail | 5.9.8 | |
fetchmail | fetchmail | 5.9.10 | |
fetchmail | fetchmail | 5.9.11 | |
fetchmail | fetchmail | 5.9.13 | |
fetchmail | fetchmail | 6.0.0 | |
fetchmail | fetchmail | 6.1.0 | |
fetchmail | fetchmail | 6.1.3 | |
fetchmail | fetchmail | 6.2.0 | |
fetchmail | fetchmail | 6.2.1 | |
fetchmail | fetchmail | 6.2.2 | |
fetchmail | fetchmail | 6.2.3 | |
fetchmail | fetchmail | 6.2.4 | |
fetchmail | fetchmail | 6.2.5 | |
fetchmail | fetchmail | 6.2.5.1 | |
fetchmail | fetchmail | 6.2.5.2 | |
fetchmail | fetchmail | 6.2.5.4 | |
fetchmail | fetchmail | 6.2.6 | |
fetchmail | fetchmail | 6.2.6 | |
fetchmail | fetchmail | 6.2.6 | |
fetchmail | fetchmail | 6.2.9 | |
fetchmail | fetchmail | 6.2.9 | |
fetchmail | fetchmail | 6.2.9 | |
fetchmail | fetchmail | 6.2.9 | |
fetchmail | fetchmail | 6.2.9 | |
fetchmail | fetchmail | 6.2.9 | |
fetchmail | fetchmail | 6.2.9 | |
fetchmail | fetchmail | 6.3.0 | |
fetchmail | fetchmail | 6.3.1 | |
fetchmail | fetchmail | 6.3.2 | |
fetchmail | fetchmail | 6.3.3 | |
fetchmail | fetchmail | 6.3.4 | |
fetchmail | fetchmail | 6.3.5 | |
fetchmail | fetchmail | 6.3.6 | |
fetchmail | fetchmail | 6.3.6 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fetchmail:fetchmail:*:rc3:*:*:*:*:*:*", "matchCriteriaId": "66F9758A-147C-4CB3-B54F-43EC86B9D344", "versionEndIncluding": "6.3.6", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "BF519D04-7596-42C6-A1D8-FC1018D1A414", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "9AFEC739-BDFA-4D14-9A04-96FFB71AE330", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "E1923712-7B88-483E-B38A-0EA6FB38EB38", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "C9608A96-D131-401B-B041-09ADEEB59354", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "F4555DBB-B63B-4637-86A9-399B34B27D14", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "D8AB8504-8CD1-4013-9413-1378F3BAE0AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "3DC47DA9-D110-4E6B-9F5B-D17ECB942B40", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.5.8:*:*:*:*:*:*:*", "matchCriteriaId": "345D0848-958F-4B44-8F31-0793C36A5ADD", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "7E179061-FB6A-44AA-8EAC-4916719D9A28", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "58A6B5F4-C799-45C4-9EAD-A55023767033", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "54FDB8B9-5537-4E08-8FA0-931D4BED43E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "E7EB9B1D-C6B0-494B-8A8C-752E5659EA1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "CC13DE1B-1428-4842-9567-BBE5EEF7042F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "215ED879-1E26-4FF4-8857-18499C5DE3A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "72604F3D-2DE8-4BFF-97D5-4AFA64399201", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "8792F7FF-9E56-4201-89FD-F0146D4F0DF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "B12812E8-1C5B-46CF-A266-EE19C5CD3B12", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.6.9:*:*:*:*:*:*:*", "matchCriteriaId": "4DEAA0E8-746D-446D-AAEA-0ED287766332", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "7D3E14C3-82AE-4D4A-8963-438BECBA5678", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "4DCFB7BB-2879-4EB7-BE1D-163238E313C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "6ED223B6-1864-415C-96D6-64E1EDE4C840", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "14CBC8ED-CC10-40B6-8AA7-9F1342432ECB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "D3417C2E-1117-4FE7-B2FA-74CAB57235B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.5:*:*:*:*:*:*:*", "matchCriteriaId": "07C61DC4-50D5-44B2-92F8-A59C65144108", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.6:*:*:*:*:*:*:*", "matchCriteriaId": "31A37E19-1E07-4FD0-AC6D-6AC3ED954787", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:4.7.7:*:*:*:*:*:*:*", "matchCriteriaId": "570C9443-81CE-42AC-B4A6-3B2ABAD97EC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "853DD3E0-668F-4FAC-BA0B-D4E9C416D646", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "CEF70FCA-5DA4-4C0B-B876-0345FA077D44", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "BF0C4F7C-0003-4C77-AE22-A9C2FCBFAF3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "78D12F53-07DE-447D-8403-40EB75B91955", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "19ECB844-F378-4A94-B9FC-A731B8186013", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "3169AA63-79F6-4B89-9405-8F6A2FB6FD64", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "88D1D54C-81A4-44CE-BE12-798CF7DD2CC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "D6615C7D-09B5-4943-A124-2FF9A0F4B927", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "EF18219F-0406-4D46-90DE-EA2A17C8EFF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "87B56DFD-BDA9-4D8B-BE54-BF59B762D574", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "33EA0CA8-468F-4A94-8DA3-5D820AB65973", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA21C847-57ED-4E7D-9366-6038467D9080", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "0450BD04-15D2-4122-A210-6225B89BDA7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "18428805-AEB2-4BA4-9762-906B59CE74D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "AFCCBB15-DFFE-4A57-A029-E57707D15E04", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "0427B5C8-265C-47C3-9BAB-B2A0EAA1DEE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "89A4B962-BE5B-471C-83EF-674525C5AE83", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "7166ECCB-54FB-44EA-BA80-4D2AAF494AF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "6B309C89-99E2-4F0B-976C-95E44A45ADC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "A3DE7EE7-F627-4955-8D95-1F00F1F85C7D", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "D549098D-FE16-4BCB-91C4-D71A8C8D2E9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "57BFA165-6E2E-49AF-9E2D-3D8923CF36C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "F5C67DFF-A1BE-4486-A11F-CD3729927220", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "1D365E6E-8777-4084-BEC8-7CBF4997D976", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "20C4FF28-0DBA-4995-8252-2D62FF896BC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "F80C6B9B-AFCE-46A1-8DEF-51C1B526EB18", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "BF667DB5-F41E-4E73-A01F-4EC3F60BAD0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "D2B144FA-A901-4CDF-AC3D-7F5E820B7A4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "96774635-9A12-4DAB-BCF6-2D678F244CE9", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "EFD2EE7A-36CB-4A26-8EEB-DACA2864D921", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "C3898EBC-75A9-4DDD-A0AF-2CDEC72DAE4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "4267DCE8-985C-416D-A6B7-536585E5A573", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "50E63EDF-FF0A-447C-A3FC-7BA2414C15CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "61DDD4A1-6185-41B6-A715-4C70F0AA2631", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8:*:*:*:*:*:*:*", "matchCriteriaId": "B10A7E3C-07CD-48A6-9075-5314B4E1EEAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "319955A4-27A8-46FF-ACE7-97E6DF27B2DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "925CF3DD-682B-40E6-900C-23F784CD9239", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "16366780-611E-4217-A614-EBA01421D148", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "43AEA36F-E730-4305-9CB6-738A7152F02E", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.5:*:*:*:*:*:*:*", "matchCriteriaId": "2B9536BA-6334-4957-9632-6D64365B88AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.6:*:*:*:*:*:*:*", "matchCriteriaId": "F52FA32B-8048-4FD7-9D20-20DC5E52098B", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.11:*:*:*:*:*:*:*", "matchCriteriaId": "9FA92DF1-3AAD-46AC-A9E4-E9386C977818", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.13:*:*:*:*:*:*:*", "matchCriteriaId": "837D66DB-F9CB-41F1-A091-BCFBAC2F45B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.14:*:*:*:*:*:*:*", "matchCriteriaId": "74D12B67-6E66-419A-A28F-6306402931EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.8.17:*:*:*:*:*:*:*", "matchCriteriaId": "A71FCBED-B25D-48E3-916C-FBA9E0DE8D12", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "1A17995E-DCAF-465A-8ABD-F1EA0D538784", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "93D03D78-C56E-4189-97FC-916C918EDFEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "19A66C77-041F-4A12-8A36-233A6B50641C", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C945059C-EF39-486D-A804-FBB8704AB927", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "1258CA65-FBC1-4848-A9E5-A8F5E5D6FBD5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.11:*:*:*:*:*:*:*", "matchCriteriaId": "A91C6418-41F0-46EB-ACFC-FCE907F5AA87", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:5.9.13:*:*:*:*:*:*:*", "matchCriteriaId": "0C020534-7596-496C-B9B0-739F58F6F4EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "0A77D40C-6FF5-42BD-9EFB-B532824D7606", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "F04C6A76-2718-4DBA-8972-A3EECDDB1A17", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "38ACD96E-5582-4ED0-BBB1-C891094D8217", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "264386DA-747F-492C-B660-D49BE9DB7139", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "DC4066AC-BE10-4189-86F6-BF94443738DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "1C25A146-50D5-4BA2-ABA2-20BF8784D7DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "72E76256-997F-4229-9B03-7BC3074F359D", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "7A717C50-2C5A-4CD1-B2E6-8CDF450940CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "61F908FF-9986-4F71-B0B6-D6A86555EF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "B0C1F99C-A246-40D3-B84A-5D11FF24AC1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "028F7F83-AF15-443B-A7DB-4E695E62EAFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "B418C3CE-E6E6-401D-AD83-5BB181009A7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.6:pre4:*:*:*:*:*:*", "matchCriteriaId": "8BF06FD2-0A4C-4557-B8EF-F0F021179498", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.6:pre8:*:*:*:*:*:*", "matchCriteriaId": "38C949C2-07A0-4FE4-8FBF-86215CB999CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.6:pre9:*:*:*:*:*:*", "matchCriteriaId": "88B23630-79DD-4B69-BB01-286193BA562E", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc10:*:*:*:*:*:*", "matchCriteriaId": "5FE21564-68C0-4765-BA40-9D3046C4CB14", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc3:*:*:*:*:*:*", "matchCriteriaId": "208102ED-6F22-44C5-BAF1-FD85EACF208F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc4:*:*:*:*:*:*", "matchCriteriaId": "C1CF7767-EB24-44E2-8E59-B4DBC99AFD23", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc5:*:*:*:*:*:*", "matchCriteriaId": "CF3D6D4C-5FD8-4EE1-A34A-99D397F09E85", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc7:*:*:*:*:*:*", "matchCriteriaId": "D63D88C1-B201-4D48-9659-5802DC4FD3EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc8:*:*:*:*:*:*", "matchCriteriaId": "16463B23-E884-467E-9F63-6B57EED39856", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc9:*:*:*:*:*:*", "matchCriteriaId": "9F2C03AF-666D-4AF6-BC69-F8B081EB41AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "84F90AFA-4B13-46A0-89D7-4065300C94C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "5DAD0F05-8B55-43ED-89D5-61A19F41EDFF", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "99053698-7F8B-4E71-8647-1A8B0DF7CEB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "9314F22D-22A8-4374-A2BF-3C64CF1F69BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "816E9640-A932-4E2F-9793-689F80D2AA89", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "5D09BB43-6CBA-499B-91D1-BA256A65E40D", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc1:*:*:*:*:*:*", "matchCriteriaId": "B98AFEDF-2BAB-4588-94E0-35AEA5F1B514", "vulnerable": true }, { "criteria": "cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc2:*:*:*:*:*:*", "matchCriteriaId": "4E8BAB5B-4DBC-4D05-B5E2-591573BC05FF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "fetchmail before 6.3.6-rc4 does not properly enforce TLS and may transmit cleartext passwords over unsecured links if certain circumstances occur, which allows remote attackers to obtain sensitive information via man-in-the-middle (MITM) attacks." }, { "lang": "es", "value": "fetchmail anetrior a 6.3.6-rc4 no fuerza TLS adecuadamente y puede transmitir contrase\u00f1as en texto en claro sobre enlaces inseguros si se producen determinadas circunstancias, lo cual permite a atacantes remotos obtener informaci\u00f3n sensible mediante ataques de hombre-en-medio (man-in-the-middle o MITM)." } ], "id": "CVE-2006-5867", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 7.8, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc" }, { "source": "cve@mitre.org", "url": "http://docs.info.apple.com/article.html?artnum=305391" }, { "source": "cve@mitre.org", "url": "http://fedoranews.org/cms/node/2429" }, { "source": "cve@mitre.org", "url": "http://fetchmail.berlios.de/fetchmail-SA-2006-02.txt" }, { "source": "cve@mitre.org", "url": "http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/31580" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/23631" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/23695" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/23714" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/23781" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/23804" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/23838" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/23923" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/24007" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/24151" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/24174" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/24284" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/24966" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200701-13.xml" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1017478" }, { "source": "cve@mitre.org", "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.517995" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2007/dsa-1259" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:016" }, { "source": "cve@mitre.org", "url": "http://www.novell.com/linux/security/advisories/2007_4_sr.html" }, { "source": "cve@mitre.org", "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.004.html" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2007-0018.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/456115/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/460528/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/21903" }, { "source": "cve@mitre.org", "url": "http://www.trustix.org/errata/2007/0007" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/usn-405-1" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-109A.html" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/0087" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/0088" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/1470" }, { "source": "cve@mitre.org", "url": "https://issues.rpath.com/browse/RPL-919" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10566" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://docs.info.apple.com/article.html?artnum=305391" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://fedoranews.org/cms/node/2429" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://fetchmail.berlios.de/fetchmail-SA-2006-02.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/31580" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/23631" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/23695" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/23714" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/23781" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/23804" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/23838" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/23923" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/24007" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/24151" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/24174" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/24284" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/24966" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200701-13.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1017478" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.517995" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2007/dsa-1259" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:016" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.novell.com/linux/security/advisories/2007_4_sr.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.004.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2007-0018.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/456115/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/460528/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/21903" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.trustix.org/errata/2007/0007" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/usn-405-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-109A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/0087" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/0088" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/1470" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://issues.rpath.com/browse/RPL-919" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10566" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.