CVE
- Id
- 13541
- CVE No.
- CVE-2005-2335
- Status
- Candidate
- Description
- Buffer overflow in the POP3 client in Fetchmail before 6.2.5.2 allows remote POP3 servers to cause a denial of service and possibly execute arbitrary code via long UIDL responses. NOTE: a typo in an advisory accidentally used the wrong CVE identifier for the Fetchmail issue. This is the correct identifier.
- Phase
- Assigned (20050721)
- Votes
- None (candidate not yet proposed)
- Comments
Related CVE References
Id | CVE Id | CVE No. | Reference | Actions |
---|---|---|---|---|
98019 | 13541 | CVE-2005-2335 | BUGTRAQ:20060526 rPSA-2006-0084-1 fetchmail | View |
98020 | 13541 | CVE-2005-2335 | URL:http://www.securityfocus.com/archive/1/archive/1/435197/100/0/threaded | View |
98021 | 13541 | CVE-2005-2335 | BUGTRAQ:20060801 DMA[2006-0801a] - "Apple OSX fetchmail buffer overflow" | View |
98022 | 13541 | CVE-2005-2335 | URL:http://www.securityfocus.com/archive/1/archive/1/441856/100/200/threaded | View |
98023 | 13541 | CVE-2005-2335 | CONFIRM:http://fetchmail.berlios.de/fetchmail-SA-2005-01.txt | View |
98024 | 13541 | CVE-2005-2335 | CONFIRM:http://developer.berlios.de/project/shownotes.php?release_id=6617 | View |
98025 | 13541 | CVE-2005-2335 | APPLE:APPLE-SA-2006-08-01 | View |
98026 | 13541 | CVE-2005-2335 | URL:http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html | View |
98027 | 13541 | CVE-2005-2335 | DEBIAN:DSA-774 | View |
98028 | 13541 | CVE-2005-2335 | URL:http://www.debian.org/security/2005/dsa-774 | View |
98029 | 13541 | CVE-2005-2335 | FEDORA:FEDORA-2005-613 | View |
98030 | 13541 | CVE-2005-2335 | URL:http://www.redhat.com/archives/fedora-announce-list/2005-July/msg00088.html | View |
98031 | 13541 | CVE-2005-2335 | FEDORA:FEDORA-2005-614 | View |
98032 | 13541 | CVE-2005-2335 | URL:http://www.redhat.com/archives/fedora-announce-list/2005-July/msg00089.html | View |
98033 | 13541 | CVE-2005-2335 | MISC:http://www.redhat.com/archives/fedora-announce-list/2005-July/msg00104.html | View |
98034 | 13541 | CVE-2005-2335 | REDHAT:RHSA-2005:640 | View |
98035 | 13541 | CVE-2005-2335 | URL:http://www.redhat.com/support/errata/RHSA-2005-640.html | View |
98036 | 13541 | CVE-2005-2335 | SUSE:SUSE-SR:2005:018 | View |
98037 | 13541 | CVE-2005-2335 | URL:http://www.novell.com/linux/security/advisories/2005_18_sr.html | View |
98038 | 13541 | CVE-2005-2335 | CERT:TA06-214A | View |
98039 | 13541 | CVE-2005-2335 | URL:http://www.us-cert.gov/cas/techalerts/TA06-214A.html | View |
98040 | 13541 | CVE-2005-2335 | BID:14349 | View |
98041 | 13541 | CVE-2005-2335 | URL:http://www.securityfocus.com/bid/14349 | View |
98042 | 13541 | CVE-2005-2335 | BID:19289 | View |
98043 | 13541 | CVE-2005-2335 | URL:http://www.securityfocus.com/bid/19289 | View |
98044 | 13541 | CVE-2005-2335 | OVAL:oval:org.mitre.oval:def:8833 | View |
98045 | 13541 | CVE-2005-2335 | URL:http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:8833 | View |
98046 | 13541 | CVE-2005-2335 | VUPEN:ADV-2005-1171 | View |
98047 | 13541 | CVE-2005-2335 | URL:http://www.vupen.com/english/advisories/2005/1171 | View |
98048 | 13541 | CVE-2005-2335 | VUPEN:ADV-2006-3101 | View |
98049 | 13541 | CVE-2005-2335 | URL:http://www.vupen.com/english/advisories/2006/3101 | View |
98050 | 13541 | CVE-2005-2335 | OSVDB:18174 | View |
98051 | 13541 | CVE-2005-2335 | URL:http://www.osvdb.org/18174 | View |
98052 | 13541 | CVE-2005-2335 | OVAL:oval:org.mitre.oval:def:1038 | View |
98053 | 13541 | CVE-2005-2335 | URL:http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:1038 | View |
98054 | 13541 | CVE-2005-2335 | OVAL:oval:org.mitre.oval:def:1124 | View |
98055 | 13541 | CVE-2005-2335 | URL:http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:1124 | View |
98056 | 13541 | CVE-2005-2335 | SECUNIA:16176 | View |
98057 | 13541 | CVE-2005-2335 | URL:http://secunia.com/advisories/16176 | View |
98058 | 13541 | CVE-2005-2335 | SECUNIA:21253 | View |
Related JVN
Id | JVN No. | Title | Summary | CVE No. | CVE Id | CVSS_v2 | CVSS_v3 | JVN URL | Actions |
---|---|---|---|---|---|---|---|---|---|
62336 | JVNDB-2005-000538 | Ruby においてセーフレベル 4 がサンドボックスとして機能しない脆弱性 | Ruby 言語には、信頼できないオブジェクトの操作を制限することができるセキュリティ機構(セキュリティモデル)が備わっています。そのセキュリティモデルは、「オブジェクトの汚染」と「セーフレベル」という仕組みによって成り立っています。その「セーフレベル」の設定を回避して、任意のスクリプト実行が可能な脆弱性が確認されています。 | CVE-2005-2337 | 13541 | 4.4 | http://jvndb.jvn.jp/ja/contents/2005/JVNDB-2005-000538.html | View |