CVE-2010-1167Improper Input Validation in Fetchmail

Severity
4.3MEDIUMNVD
EPSS
0.8%
top 26.27%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMay 7
Latest updateMay 2

Description

fetchmail 4.6.3 through 6.3.16, when debug mode is enabled, does not properly handle invalid characters in a multi-character locale, which allows remote attackers to cause a denial of service (memory consumption and application crash) via a crafted (1) message header or (2) POP3 UIDL list.

CVSS vector

AV:N/AC:M/C:N/I:N/A:PExploitability: 8.6 | Impact: 2.9

Affected Packages3 packages

debiandebian/fetchmail< fetchmail 6.3.16-2 (bookworm)
Debianfetchmail/fetchmail< 6.3.16-2+2
NVDfetchmail/fetchmail6.3.9+98

Patches

🔴Vulnerability Details

2
GHSA
GHSA-q82h-7r9g-jmwv: fetchmail 42022-05-02
OSV
CVE-2010-1167: fetchmail 42010-05-07

📋Vendor Advisories

2
Red Hat
fetchmail: denial of service in debug mode with multichar locales2010-04-18
Debian
CVE-2010-1167: fetchmail - fetchmail 4.6.3 through 6.3.16, when debug mode is enabled, does not properly ha...2010

💬Community

1
Bugzilla
CVE-2010-1167 fetchmail: denial of service in debug mode with multichar locales2010-04-19
CVE-2010-1167 — Improper Input Validation in Fetchmail | cvebase