Debian Fetchmail vulnerabilities

21 known vulnerabilities affecting debian/fetchmail.

Total CVEs
21
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH2MEDIUM6LOW13

Vulnerabilities

Page 1 of 2
CVE-2025-61962MEDIUMCVSS 5.9fixed in fetchmail 6.5.6-1 (sid)2025
CVE-2025-61962 [MEDIUM] CVE-2025-61962: fetchmail - In fetchmail before 6.5.6, the SMTP client can crash when authenticating upon re... In fetchmail before 6.5.6, the SMTP client can crash when authenticating upon receiving a 334 status code in a malformed context. Scope: local bookworm: open bullseye: open sid: resolved (fixed in 6.5.6-1) trixie: open
debian
CVE-2021-39272MEDIUMCVSS 5.9fixed in fetchmail 6.4.22-1 (bookworm)2021
CVE-2021-39272 [MEDIUM] CVE-2021-39272: fetchmail - Fetchmail before 6.4.22 fails to enforce STARTTLS session encryption in some cir... Fetchmail before 6.4.22 fails to enforce STARTTLS session encryption in some circumstances, such as a certain situation with IMAP and PREAUTH. Scope: local bookworm: resolved (fixed in 6.4.22-1) bullseye: open sid: resolved (fixed in 6.4.22-1) trixie: resolved (fixed in 6.4.22-1)
debian
CVE-2021-36386LOWCVSS 7.5fixed in fetchmail 6.4.16-4 (bookworm)2021
CVE-2021-36386 [HIGH] CVE-2021-36386: fetchmail - report_vbuild in report.c in Fetchmail before 6.4.20 sometimes omits initializat... report_vbuild in report.c in Fetchmail before 6.4.20 sometimes omits initialization of the vsnprintf va_list argument, which might allow mail servers to cause a denial of service or possibly have unspecified other impact via long error messages. NOTE: it is unclear whether use of Fetchmail on any realistic platform results in an impact beyond an inconvenience to t
debian
CVE-2012-3482LOWCVSS 5.8fixed in fetchmail 6.3.22-1 (bookworm)2012
CVE-2012-3482 [MEDIUM] CVE-2012-3482: fetchmail - Fetchmail 5.0.8 through 6.3.21, when using NTLM authentication in debug mode, al... Fetchmail 5.0.8 through 6.3.21, when using NTLM authentication in debug mode, allows remote NTLM servers to (1) cause a denial of service (crash and delayed delivery of inbound mail) via a crafted NTLM response that triggers an out-of-bounds read in the base64 decoder, or (2) obtain sensitive information from memory via an NTLM Type 2 message with a crafted Target
debian
CVE-2011-1947LOWCVSS 5.0fixed in fetchmail 6.3.22-1 (bookworm)2011
CVE-2011-1947 [MEDIUM] CVE-2011-1947: fetchmail - fetchmail 5.9.9 through 6.3.19 does not properly limit the wait time after issui... fetchmail 5.9.9 through 6.3.19 does not properly limit the wait time after issuing a (1) STARTTLS or (2) STLS request, which allows remote servers to cause a denial of service (application hang) by acknowledging the request but not sending additional packets. Scope: local bookworm: resolved (fixed in 6.3.22-1) bullseye: resolved (fixed in 6.3.22-1) sid: resolved (
debian
CVE-2010-0562LOWCVSS 6.8fixed in fetchmail 6.3.13-2 (bookworm)2010
CVE-2010-0562 [MEDIUM] CVE-2010-0562: fetchmail - The sdump function in sdump.c in fetchmail 6.3.11, 6.3.12, and 6.3.13, when runn... The sdump function in sdump.c in fetchmail 6.3.11, 6.3.12, and 6.3.13, when running in verbose mode on platforms for which char is signed, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an SSL X.509 certificate containing non-printable characters with the high bit set, which triggers a heap-based buf
debian
CVE-2010-1167LOWCVSS 4.3fixed in fetchmail 6.3.16-2 (bookworm)2010
CVE-2010-1167 [MEDIUM] CVE-2010-1167: fetchmail - fetchmail 4.6.3 through 6.3.16, when debug mode is enabled, does not properly ha... fetchmail 4.6.3 through 6.3.16, when debug mode is enabled, does not properly handle invalid characters in a multi-character locale, which allows remote attackers to cause a denial of service (memory consumption and application crash) via a crafted (1) message header or (2) POP3 UIDL list. Scope: local bookworm: resolved (fixed in 6.3.16-2) bullseye: resolved (fix
debian
CVE-2009-2666MEDIUMCVSS 5.9fixed in fetchmail 6.3.9~rc2-6 (bookworm)2009
CVE-2009-2666 [MEDIUM] CVE-2009-2666: fetchmail - socket.c in fetchmail before 6.3.11 does not properly handle a '\0' character in... socket.c in fetchmail before 6.3.11 does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408. Scope: local bookworm: res
debian
CVE-2008-2711LOWCVSS 4.3fixed in fetchmail 6.3.9~rc2-1 (bookworm)2008
CVE-2008-2711 [MEDIUM] CVE-2008-2711: fetchmail - fetchmail 6.3.8 and earlier, when running in -v -v (aka verbose) mode, allows re... fetchmail 6.3.8 and earlier, when running in -v -v (aka verbose) mode, allows remote attackers to cause a denial of service (crash and persistent mail failure) via a malformed mail message with long headers, which triggers an erroneous dereference when using vsnprintf to format log messages. Scope: local bookworm: resolved (fixed in 6.3.9~rc2-1) bullseye: resolved
debian
CVE-2007-1558LOWCVSS 2.6fixed in balsa 2.3.17-1 (bookworm)2007
CVE-2007-1558 [LOW] CVE-2007-1558: balsa - The APOP protocol allows remote attackers to guess the first 3 characters of a p... The APOP protocol allows remote attackers to guess the first 3 characters of a password via man-in-the-middle (MITM) attacks that use crafted message IDs and MD5 collisions. NOTE: this design-level issue potentially affects all products that use APOP, including (1) Thunderbird 1.x before 1.5.0.12 and 2.x before 2.0.0.4, (2) Evolution, (3) mutt, (4) fetchmail before 6.3.8
debian
CVE-2007-4565LOWCVSS 5.0fixed in fetchmail 6.3.8-8 (bookworm)2007
CVE-2007-4565 [MEDIUM] CVE-2007-4565: fetchmail - sink.c in fetchmail before 6.3.9 allows context-dependent attackers to cause a d... sink.c in fetchmail before 6.3.9 allows context-dependent attackers to cause a denial of service (NULL dereference and application crash) by refusing certain warning messages that are sent over SMTP. Scope: local bookworm: resolved (fixed in 6.3.8-8) bullseye: resolved (fixed in 6.3.8-8) sid: resolved (fixed in 6.3.8-8) trixie: resolved (fixed in 6.3.8-8)
debian
CVE-2006-5867LOWCVSS 7.8fixed in fetchmail 6.3.6-1 (bookworm)2006
CVE-2006-5867 [HIGH] CVE-2006-5867: fetchmail - fetchmail before 6.3.6-rc4 does not properly enforce TLS and may transmit cleart... fetchmail before 6.3.6-rc4 does not properly enforce TLS and may transmit cleartext passwords over unsecured links if certain circumstances occur, which allows remote attackers to obtain sensitive information via man-in-the-middle (MITM) attacks. Scope: local bookworm: resolved (fixed in 6.3.6-1) bullseye: resolved (fixed in 6.3.6-1) sid: resolved (fixed in 6.3.6-1)
debian
CVE-2006-0321LOWCVSS 5.0fixed in fetchmail 6.3.2-1 (bookworm)2006
CVE-2006-0321 [MEDIUM] CVE-2006-0321: fetchmail - fetchmail 6.3.0 and other versions before 6.3.2 allows remote attackers to cause... fetchmail 6.3.0 and other versions before 6.3.2 allows remote attackers to cause a denial of service (crash) via crafted e-mail messages that cause a free of an invalid pointer when fetchmail bounces the message to the originator or local postmaster. Scope: local bookworm: resolved (fixed in 6.3.2-1) bullseye: resolved (fixed in 6.3.2-1) sid: resolved (fixed in 6.
debian
CVE-2006-5974LOWCVSS 7.8fixed in fetchmail 6.3.6-1 (bookworm)2006
CVE-2006-5974 [HIGH] CVE-2006-5974: fetchmail - fetchmail 6.3.5 and 6.3.6 before 6.3.6-rc4, when refusing a message delivered vi... fetchmail 6.3.5 and 6.3.6 before 6.3.6-rc4, when refusing a message delivered via the mda option, allows remote attackers to cause a denial of service (crash) via unknown vectors that trigger a NULL pointer dereference when calling the (1) ferror or (2) fflush functions. Scope: local bookworm: resolved (fixed in 6.3.6-1) bullseye: resolved (fixed in 6.3.6-1) sid: re
debian
CVE-2005-2335MEDIUMCVSS 5.0fixed in fetchmail 6.2.5-16 (bookworm)2005
CVE-2005-2335 [MEDIUM] CVE-2005-2335: fetchmail - Buffer overflow in the POP3 client in Fetchmail before 6.2.5.2 allows remote POP... Buffer overflow in the POP3 client in Fetchmail before 6.2.5.2 allows remote POP3 servers to cause a denial of service and possibly execute arbitrary code via long UIDL responses. NOTE: a typo in an advisory accidentally used the wrong CVE identifier for the Fetchmail issue. This is the correct identifier. Scope: local bookworm: resolved (fixed in 6.2.5-16) bullse
debian
CVE-2005-4348LOWCVSS 7.8fixed in fetchmail 6.3.1-1 (bookworm)2005
CVE-2005-4348 [HIGH] CVE-2005-4348: fetchmail - fetchmail before 6.3.1 and before 6.2.5.5, when configured for multidrop mode, a... fetchmail before 6.3.1 and before 6.2.5.5, when configured for multidrop mode, allows remote attackers to cause a denial of service (application crash) by sending messages without headers from upstream mail servers. Scope: local bookworm: resolved (fixed in 6.3.1-1) bullseye: resolved (fixed in 6.3.1-1) sid: resolved (fixed in 6.3.1-1) trixie: resolved (fixed in 6.3
debian
CVE-2005-3088LOWCVSS 2.1fixed in fetchmail 6.2.5.4-1 (bookworm)2005
CVE-2005-3088 [LOW] CVE-2005-3088: fetchmail - fetchmailconf before 1.49 in fetchmail 6.2.0, 6.2.5 and 6.2.5.2 creates configur... fetchmailconf before 1.49 in fetchmail 6.2.0, 6.2.5 and 6.2.5.2 creates configuration files with insecure world-readable permissions, which allows local users to obtain sensitive information such as passwords. Scope: local bookworm: resolved (fixed in 6.2.5.4-1) bullseye: resolved (fixed in 6.2.5.4-1) sid: resolved (fixed in 6.2.5.4-1) trixie: resolved (fixed in 6.2.
debian
CVE-2003-0792MEDIUMCVSS 5.0fixed in fetchmail 6.2.5 (bookworm)2003
CVE-2003-0792 [MEDIUM] CVE-2003-0792: fetchmail - Fetchmail 6.2.4 and earlier does not properly allocate memory for long lines, wh... Fetchmail 6.2.4 and earlier does not properly allocate memory for long lines, which allows remote attackers to cause a denial of service (crash) via a certain email. Scope: local bookworm: resolved (fixed in 6.2.5) bullseye: resolved (fixed in 6.2.5) sid: resolved (fixed in 6.2.5) trixie: resolved (fixed in 6.2.5)
debian
CVE-2002-1174HIGHCVSS 7.5fixed in fetchmail 6.1.0-1 (bookworm)2002
CVE-2002-1174 [HIGH] CVE-2002-1174: fetchmail - Buffer overflows in Fetchmail 6.0.0 and earlier allow remote attackers to cause ... Buffer overflows in Fetchmail 6.0.0 and earlier allow remote attackers to cause a denial of service (crash) or execute arbitrary code via (1) long headers that are not properly processed by the readheaders function, or (2) via long Received: headers, which are not properly parsed by the parse_received function. Scope: local bookworm: resolved (fixed in 6.1.0-1) bull
debian
CVE-2002-1365HIGHCVSS 7.5fixed in fetchmail 6.2.0-1 (bookworm)2002
CVE-2002-1365 [HIGH] CVE-2002-1365: fetchmail - Heap-based buffer overflow in Fetchmail 6.1.3 and earlier does not account for t... Heap-based buffer overflow in Fetchmail 6.1.3 and earlier does not account for the "@" character when determining buffer lengths for local addresses, which allows remote attackers to execute arbitrary code via a header with a large number of local addresses. Scope: local bookworm: resolved (fixed in 6.2.0-1) bullseye: resolved (fixed in 6.2.0-1) sid: resolved (fixed
debian
Debian Fetchmail vulnerabilities | cvebase