cvelist/2005/4xxx/CVE-2005-4348.json

208 lines
6.4 KiB
JSON
Raw Normal View History

2017-10-16 12:31:07 -04:00
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2005-4348",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
},
"vendor_name" : "n/a"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "fetchmail before 6.3.1 and before 6.2.5.5, when configured for multidrop mode, allows remote attackers to cause a denial of service (application crash) by sending messages without headers from upstream mail servers."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"name" : "20051221 fetchmail security announcement fetchmail-SA-2005-03 (CVE-2005-4348)",
"refsource" : "BUGTRAQ",
2018-10-19 11:05:17 -04:00
"url" : "http://www.securityfocus.com/archive/1/420098/100/0/threaded"
2017-10-16 12:31:07 -04:00
},
{
"name" : "20060526 rPSA-2006-0084-1 fetchmail",
"refsource" : "BUGTRAQ",
2018-10-19 11:05:17 -04:00
"url" : "http://www.securityfocus.com/archive/1/435197/100/0/threaded"
2017-10-16 12:31:07 -04:00
},
{
"name" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=343836",
"refsource" : "MISC",
2017-10-16 12:31:07 -04:00
"url" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=343836"
},
{
"name" : "http://fetchmail.berlios.de/fetchmail-SA-2005-03.txt",
"refsource" : "CONFIRM",
2017-10-16 12:31:07 -04:00
"url" : "http://fetchmail.berlios.de/fetchmail-SA-2005-03.txt"
},
{
"name" : "DSA-939",
"refsource" : "DEBIAN",
2017-10-16 12:31:07 -04:00
"url" : "http://www.debian.org/security/2005/dsa-939"
},
{
"name" : "MDKSA-2005:236",
"refsource" : "MANDRIVA",
2017-10-16 12:31:07 -04:00
"url" : "http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:236"
},
{
"name" : "RHSA-2007:0018",
"refsource" : "REDHAT",
2017-10-16 12:31:07 -04:00
"url" : "http://www.redhat.com/support/errata/RHSA-2007-0018.html"
},
{
"name" : "20070201-01-P",
"refsource" : "SGI",
2017-10-16 12:31:07 -04:00
"url" : "ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc"
},
{
"name" : "SSA:2006-045-01",
"refsource" : "SLACKWARE",
2017-10-16 12:31:07 -04:00
"url" : "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.443499"
},
{
"name" : "SUSE-SR:2007:004",
"refsource" : "SUSE",
2017-10-16 12:31:07 -04:00
"url" : "http://www.novell.com/linux/security/advisories/2007_4_sr.html"
},
{
"name" : "2006-0002",
"refsource" : "TRUSTIX",
2017-10-16 12:31:07 -04:00
"url" : "http://www.trustix.org/errata/2006/0002/"
},
{
"name" : "USN-233-1",
"refsource" : "UBUNTU",
2018-10-03 17:05:39 -04:00
"url" : "https://usn.ubuntu.com/233-1/"
2017-10-16 12:31:07 -04:00
},
{
"name" : "15987",
"refsource" : "BID",
2017-10-16 12:31:07 -04:00
"url" : "http://www.securityfocus.com/bid/15987"
},
{
"name" : "19289",
"refsource" : "BID",
2017-10-16 12:31:07 -04:00
"url" : "http://www.securityfocus.com/bid/19289"
},
{
"name" : "oval:org.mitre.oval:def:9659",
"refsource" : "OVAL",
2017-10-16 12:31:07 -04:00
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9659"
},
{
"name" : "ADV-2005-2996",
"refsource" : "VUPEN",
2017-10-16 12:31:07 -04:00
"url" : "http://www.vupen.com/english/advisories/2005/2996"
},
{
"name" : "ADV-2006-3101",
"refsource" : "VUPEN",
2017-10-16 12:31:07 -04:00
"url" : "http://www.vupen.com/english/advisories/2006/3101"
},
{
"name" : "21906",
"refsource" : "OSVDB",
2017-10-16 12:31:07 -04:00
"url" : "http://www.osvdb.org/21906"
},
{
"name" : "1015383",
"refsource" : "SECTRACK",
2017-10-16 12:31:07 -04:00
"url" : "http://securitytracker.com/id?1015383"
},
{
"name" : "17891",
"refsource" : "SECUNIA",
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/17891"
},
{
"name" : "18172",
"refsource" : "SECUNIA",
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/18172"
},
{
"name" : "18231",
"refsource" : "SECUNIA",
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/18231"
},
{
"name" : "18266",
"refsource" : "SECUNIA",
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/18266"
},
{
"name" : "18433",
"refsource" : "SECUNIA",
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/18433"
},
{
"name" : "18895",
"refsource" : "SECUNIA",
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/18895"
},
{
"name" : "18463",
"refsource" : "SECUNIA",
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/18463"
},
{
"name" : "21253",
"refsource" : "SECUNIA",
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/21253"
},
{
"name" : "24007",
"refsource" : "SECUNIA",
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/24007"
},
{
"name" : "24284",
"refsource" : "SECUNIA",
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/24284"
},
{
"name" : "fetchmail-null-pointer-dos(23713)",
"refsource" : "XF",
2017-10-16 12:31:07 -04:00
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/23713"
}
]
}
}