Bugzilla – Bug 775988
VUL-1: CVE-2012-3482: fetchmail: DoS (Application crash) in the base64 decoder during server NTLM protocol exchange
Last modified: 2018-11-04 23:43:34 UTC
There has been a Denial of Service issue reported in fetchmail recently [1]. Upstream patch available from fetchmail's git repository [2]. [1] https://bugs.gentoo.org/show_bug.cgi?id=431284 [2] http://gitorious.org/fetchmail/fetchmail/commit/3fbc7cd331602c76f882d1b507 cd05c1d824ba8b
This is an autogenerated message for OBS integration: This bug (775988) was mentioned in https://build.opensuse.org/request/show/134928 Factory / fetchmail
Security team, There wasn't any other fetchmail bug for three years. Do you want me to submit the fetchmail packages (SLE-10 and SLE-11) or do we keep on waiting?
This issue has a low security impact. Only carefully crafted NTLM server packets can exploit this problem. We will leave this issue on the planed update list and fix it together with future bugfixes.
Issue affects SLE-10 and SLE11, SR's created
An update workflow for this issue was started. This issue was rated as low. Please submit fixed packages until 2016-04-07. When done, reassign the bug to security-team@suse.de. https://swamp.suse.de/webswamp/wf/62539
SUSE-SU-2016:0872-1: An update that fixes one vulnerability is now available. Category: security (moderate) Bug References: 775988 CVE References: CVE-2012-3482 Sources used: SUSE Linux Enterprise Server 11-SP4 (src): fetchmail-6.3.8.90-13.20.21.1 SUSE Linux Enterprise Desktop 11-SP4 (src): fetchmail-6.3.8.90-13.20.21.1 SUSE Linux Enterprise Debuginfo 11-SP4 (src): fetchmail-6.3.8.90-13.20.21.1
releasewd