CVE-2002-1365Improper Restriction of Operations within the Bounds of a Memory Buffer in Fetchmail

Severity
7.5HIGHNVD
EPSS
4.8%
top 10.51%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 23
Latest updateMay 3

Description

Heap-based buffer overflow in Fetchmail 6.1.3 and earlier does not account for the "@" character when determining buffer lengths for local addresses, which allows remote attackers to execute arbitrary code via a header with a large number of local addresses.

CVSS vector

AV:N/AC:L/C:P/I:P/A:PExploitability: 10.0 | Impact: 6.4

Affected Packages3 packages

debiandebian/fetchmail< fetchmail 6.2.0-1 (bookworm)
Debianfetchmail/fetchmail< 6.2.0-1+2
NVDfetchmail/fetchmail6.1.3+80

Patches

🔴Vulnerability Details

2
GHSA
GHSA-qf2w-6gx5-q88j: Heap-based buffer overflow in Fetchmail 62022-05-03
OSV
CVE-2002-1365: Heap-based buffer overflow in Fetchmail 62002-12-23

📋Vendor Advisories

2
Red Hat
security flaw2002-12-13
Debian
CVE-2002-1365: fetchmail - Heap-based buffer overflow in Fetchmail 6.1.3 and earlier does not account for t...2002

💬Community

1
Bugzilla
CVE-2002-1365 security flaw2018-08-16
CVE-2002-1365 — Debian Fetchmail vulnerability | cvebase