Skip to navigation

Security Advisory Moderate: fetchmail security update

Advisory: RHSA-2007:0385-4
Type: Security Advisory
Severity: Moderate
Issued on: 2007-06-07
Last updated on: 2007-06-07
Affected Products: RHEL Desktop Workstation (v. 5 client)
Red Hat Desktop (v. 3)
Red Hat Desktop (v. 4)
Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux AS (v. 2.1)
Red Hat Enterprise Linux AS (v. 3)
Red Hat Enterprise Linux AS (v. 4)
Red Hat Enterprise Linux AS (v. 4.5.z)
Red Hat Enterprise Linux ES (v. 2.1)
Red Hat Enterprise Linux ES (v. 3)
Red Hat Enterprise Linux ES (v. 4)
Red Hat Enterprise Linux ES (v. 4.5.z)
Red Hat Enterprise Linux WS (v. 2.1)
Red Hat Enterprise Linux WS (v. 3)
Red Hat Enterprise Linux WS (v. 4)
Red Hat Linux Advanced Workstation 2.1 for the Itanium Processor
CVEs (cve.mitre.org): CVE-2007-1558

Details

An updated fetchmail package that fixes a security bug is now available for
Red Hat Enterprise Linux 2.1, 3, 4 and 5.

This update has been rated as having moderate security impact by the Red
Hat Security Response Team.

Fetchmail is a remote mail retrieval and forwarding utility intended
for use over on-demand TCP/IP links, like SLIP or PPP connections.

A flaw was found in the way fetchmail processed certain APOP authentication
requests. By sending certain responses when fetchmail attempted to
authenticate against an APOP server, a remote attacker could potentially
acquire certain portions of a user's authentication credentials.
(CVE-2007-1558)

All users of fetchmail should upgrade to this updated package, which
contains a backported patch to correct this issue.


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

Updated packages

RHEL Desktop Workstation (v. 5 client)

SRPMS:
fetchmail-6.3.6-1.0.1.el5.src.rpm
File outdated by:  RHBA-2011:1540
    MD5: 666e02a914664774f345ecac40559a2d
 
IA-32:
fetchmail-6.3.6-1.0.1.el5.i386.rpm
File outdated by:  RHBA-2011:1540
    MD5: 375d0b1208f2bd7d5cc2b353af1f946e
 
x86_64:
fetchmail-6.3.6-1.0.1.el5.x86_64.rpm
File outdated by:  RHBA-2011:1540
    MD5: 949bbf662673a20466b8bf3cffdc67f0
 
Red Hat Desktop (v. 3)

SRPMS:
fetchmail-6.2.0-3.el3.4.src.rpm
File outdated by:  RHSA-2009:1427
    MD5: e4049e8c0c6ea283c381316505f68c75
 
IA-32:
fetchmail-6.2.0-3.el3.4.i386.rpm
File outdated by:  RHSA-2009:1427
    MD5: cd26bbf307cb7536e9174bbb7ff41b71
 
x86_64:
fetchmail-6.2.0-3.el3.4.x86_64.rpm
File outdated by:  RHSA-2009:1427
    MD5: ec359701cb914c721eb657cf95281e4d
 
Red Hat Desktop (v. 4)

SRPMS:
fetchmail-6.2.5-6.0.1.el4.src.rpm
File outdated by:  RHSA-2009:1427
    MD5: 3e44a39b1953a94a0d0bc5d9350c3f19
 
IA-32:
fetchmail-6.2.5-6.0.1.el4.i386.rpm
File outdated by:  RHSA-2009:1427
    MD5: 6857913fd4ef4e820ca569e63e6b6043
 
x86_64:
fetchmail-6.2.5-6.0.1.el4.x86_64.rpm
File outdated by:  RHSA-2009:1427
    MD5: 42938e325c512f22a0385168a64d0a02
 
Red Hat Enterprise Linux (v. 5 server)

SRPMS:
fetchmail-6.3.6-1.0.1.el5.src.rpm
File outdated by:  RHBA-2011:1540
    MD5: 666e02a914664774f345ecac40559a2d
 
IA-32:
fetchmail-6.3.6-1.0.1.el5.i386.rpm
File outdated by:  RHBA-2011:1540
    MD5: 375d0b1208f2bd7d5cc2b353af1f946e
 
IA-64:
fetchmail-6.3.6-1.0.1.el5.ia64.rpm
File outdated by:  RHBA-2011:1540
    MD5: 25793651de52f19a1577f76c8a21f326
 
PPC:
fetchmail-6.3.6-1.0.1.el5.ppc.rpm
File outdated by:  RHBA-2011:1540
    MD5: b6e301472f65451199ffce4f806dad61
 
s390x:
fetchmail-6.3.6-1.0.1.el5.s390x.rpm
File outdated by:  RHBA-2011:1540
    MD5: 2e21162b1d4df12524ce2362c98895bb
 
x86_64:
fetchmail-6.3.6-1.0.1.el5.x86_64.rpm
File outdated by:  RHBA-2011:1540
    MD5: 949bbf662673a20466b8bf3cffdc67f0
 
Red Hat Enterprise Linux AS (v. 2.1)

SRPMS:
fetchmail-5.9.0-21.7.3.el2.1.6.src.rpm     MD5: 117edccd5352db96a61b676bcaa01ae6
 
IA-32:
fetchmail-5.9.0-21.7.3.el2.1.6.i386.rpm     MD5: 728c7b146503801d0fc808c897987e94
fetchmailconf-5.9.0-21.7.3.el2.1.6.i386.rpm     MD5: 1522beaa934b30cdc4bdad88e7bbe050
 
IA-64:
fetchmail-5.9.0-21.7.3.el2.1.6.ia64.rpm     MD5: 533657a336cf0e823c72027154f4617d
fetchmailconf-5.9.0-21.7.3.el2.1.6.ia64.rpm     MD5: e6b8e4a0bbc86888b81abb9621c64ea4
 
Red Hat Enterprise Linux AS (v. 3)

SRPMS:
fetchmail-6.2.0-3.el3.4.src.rpm
File outdated by:  RHSA-2009:1427
    MD5: e4049e8c0c6ea283c381316505f68c75
 
IA-32:
fetchmail-6.2.0-3.el3.4.i386.rpm
File outdated by:  RHSA-2009:1427
    MD5: cd26bbf307cb7536e9174bbb7ff41b71
 
IA-64:
fetchmail-6.2.0-3.el3.4.ia64.rpm
File outdated by:  RHSA-2009:1427
    MD5: 593597ab7bc9c98d4cd77791ce22b885
 
PPC:
fetchmail-6.2.0-3.el3.4.ppc.rpm
File outdated by:  RHSA-2009:1427
    MD5: 0de4e90b14b10d71221180193d8112df
 
s390:
fetchmail-6.2.0-3.el3.4.s390.rpm
File outdated by:  RHSA-2009:1427
    MD5: 82d7535a6c060c044abdcc35258cd9f6
 
s390x:
fetchmail-6.2.0-3.el3.4.s390x.rpm
File outdated by:  RHSA-2009:1427
    MD5: fe85674a73ed2c5e11a38d58c3d52c31
 
x86_64:
fetchmail-6.2.0-3.el3.4.x86_64.rpm
File outdated by:  RHSA-2009:1427
    MD5: ec359701cb914c721eb657cf95281e4d
 
Red Hat Enterprise Linux AS (v. 4)

SRPMS:
fetchmail-6.2.5-6.0.1.el4.src.rpm
File outdated by:  RHSA-2009:1427
    MD5: 3e44a39b1953a94a0d0bc5d9350c3f19
 
IA-32:
fetchmail-6.2.5-6.0.1.el4.i386.rpm
File outdated by:  RHSA-2009:1427
    MD5: 6857913fd4ef4e820ca569e63e6b6043
 
IA-64:
fetchmail-6.2.5-6.0.1.el4.ia64.rpm
File outdated by:  RHSA-2009:1427
    MD5: f3684335eb952d359ac12db780fb48f2
 
PPC:
fetchmail-6.2.5-6.0.1.el4.ppc.rpm
File outdated by:  RHSA-2009:1427
    MD5: b36cbb25c342f85070f2d90f7de02646
 
s390:
fetchmail-6.2.5-6.0.1.el4.s390.rpm
File outdated by:  RHSA-2009:1427
    MD5: 4ea73c34d4500f1c9fbc28175f0ede18
 
s390x:
fetchmail-6.2.5-6.0.1.el4.s390x.rpm
File outdated by:  RHSA-2009:1427
    MD5: 12e753c255e6e2da2d02105631d0302e
 
x86_64:
fetchmail-6.2.5-6.0.1.el4.x86_64.rpm
File outdated by:  RHSA-2009:1427
    MD5: 42938e325c512f22a0385168a64d0a02
 
Red Hat Enterprise Linux AS (v. 4.5.z)

SRPMS:
fetchmail-6.2.5-6.0.1.el4.src.rpm
File outdated by:  RHSA-2009:1427
    MD5: 3e44a39b1953a94a0d0bc5d9350c3f19
 
IA-32:
fetchmail-6.2.5-6.0.1.el4.i386.rpm     MD5: 6857913fd4ef4e820ca569e63e6b6043
 
IA-64:
fetchmail-6.2.5-6.0.1.el4.ia64.rpm     MD5: f3684335eb952d359ac12db780fb48f2
 
PPC:
fetchmail-6.2.5-6.0.1.el4.ppc.rpm     MD5: b36cbb25c342f85070f2d90f7de02646
 
s390:
fetchmail-6.2.5-6.0.1.el4.s390.rpm     MD5: 4ea73c34d4500f1c9fbc28175f0ede18
 
s390x:
fetchmail-6.2.5-6.0.1.el4.s390x.rpm     MD5: 12e753c255e6e2da2d02105631d0302e
 
x86_64:
fetchmail-6.2.5-6.0.1.el4.x86_64.rpm     MD5: 42938e325c512f22a0385168a64d0a02
 
Red Hat Enterprise Linux ES (v. 2.1)

SRPMS:
fetchmail-5.9.0-21.7.3.el2.1.6.src.rpm     MD5: 117edccd5352db96a61b676bcaa01ae6
 
IA-32:
fetchmail-5.9.0-21.7.3.el2.1.6.i386.rpm     MD5: 728c7b146503801d0fc808c897987e94
fetchmailconf-5.9.0-21.7.3.el2.1.6.i386.rpm     MD5: 1522beaa934b30cdc4bdad88e7bbe050
 
Red Hat Enterprise Linux ES (v. 3)

SRPMS:
fetchmail-6.2.0-3.el3.4.src.rpm
File outdated by:  RHSA-2009:1427
    MD5: e4049e8c0c6ea283c381316505f68c75
 
IA-32:
fetchmail-6.2.0-3.el3.4.i386.rpm
File outdated by:  RHSA-2009:1427
    MD5: cd26bbf307cb7536e9174bbb7ff41b71
 
IA-64:
fetchmail-6.2.0-3.el3.4.ia64.rpm
File outdated by:  RHSA-2009:1427
    MD5: 593597ab7bc9c98d4cd77791ce22b885
 
x86_64:
fetchmail-6.2.0-3.el3.4.x86_64.rpm
File outdated by:  RHSA-2009:1427
    MD5: ec359701cb914c721eb657cf95281e4d
 
Red Hat Enterprise Linux ES (v. 4)

SRPMS:
fetchmail-6.2.5-6.0.1.el4.src.rpm
File outdated by:  RHSA-2009:1427
    MD5: 3e44a39b1953a94a0d0bc5d9350c3f19
 
IA-32:
fetchmail-6.2.5-6.0.1.el4.i386.rpm
File outdated by:  RHSA-2009:1427
    MD5: 6857913fd4ef4e820ca569e63e6b6043
 
IA-64:
fetchmail-6.2.5-6.0.1.el4.ia64.rpm
File outdated by:  RHSA-2009:1427
    MD5: f3684335eb952d359ac12db780fb48f2
 
x86_64:
fetchmail-6.2.5-6.0.1.el4.x86_64.rpm
File outdated by:  RHSA-2009:1427
    MD5: 42938e325c512f22a0385168a64d0a02
 
Red Hat Enterprise Linux ES (v. 4.5.z)

SRPMS:
fetchmail-6.2.5-6.0.1.el4.src.rpm
File outdated by:  RHSA-2009:1427
    MD5: 3e44a39b1953a94a0d0bc5d9350c3f19
 
IA-32:
fetchmail-6.2.5-6.0.1.el4.i386.rpm     MD5: 6857913fd4ef4e820ca569e63e6b6043
 
IA-64:
fetchmail-6.2.5-6.0.1.el4.ia64.rpm     MD5: f3684335eb952d359ac12db780fb48f2
 
x86_64:
fetchmail-6.2.5-6.0.1.el4.x86_64.rpm     MD5: 42938e325c512f22a0385168a64d0a02
 
Red Hat Enterprise Linux WS (v. 2.1)

SRPMS:
fetchmail-5.9.0-21.7.3.el2.1.6.src.rpm     MD5: 117edccd5352db96a61b676bcaa01ae6
 
IA-32:
fetchmail-5.9.0-21.7.3.el2.1.6.i386.rpm     MD5: 728c7b146503801d0fc808c897987e94
fetchmailconf-5.9.0-21.7.3.el2.1.6.i386.rpm     MD5: 1522beaa934b30cdc4bdad88e7bbe050
 
Red Hat Enterprise Linux WS (v. 3)

SRPMS:
fetchmail-6.2.0-3.el3.4.src.rpm
File outdated by:  RHSA-2009:1427
    MD5: e4049e8c0c6ea283c381316505f68c75
 
IA-32:
fetchmail-6.2.0-3.el3.4.i386.rpm
File outdated by:  RHSA-2009:1427
    MD5: cd26bbf307cb7536e9174bbb7ff41b71
 
IA-64:
fetchmail-6.2.0-3.el3.4.ia64.rpm
File outdated by:  RHSA-2009:1427
    MD5: 593597ab7bc9c98d4cd77791ce22b885
 
x86_64:
fetchmail-6.2.0-3.el3.4.x86_64.rpm
File outdated by:  RHSA-2009:1427
    MD5: ec359701cb914c721eb657cf95281e4d
 
Red Hat Enterprise Linux WS (v. 4)

SRPMS:
fetchmail-6.2.5-6.0.1.el4.src.rpm
File outdated by:  RHSA-2009:1427
    MD5: 3e44a39b1953a94a0d0bc5d9350c3f19
 
IA-32:
fetchmail-6.2.5-6.0.1.el4.i386.rpm
File outdated by:  RHSA-2009:1427
    MD5: 6857913fd4ef4e820ca569e63e6b6043
 
IA-64:
fetchmail-6.2.5-6.0.1.el4.ia64.rpm
File outdated by:  RHSA-2009:1427
    MD5: f3684335eb952d359ac12db780fb48f2
 
x86_64:
fetchmail-6.2.5-6.0.1.el4.x86_64.rpm
File outdated by:  RHSA-2009:1427
    MD5: 42938e325c512f22a0385168a64d0a02
 
Red Hat Linux Advanced Workstation 2.1 for the Itanium Processor

SRPMS:
fetchmail-5.9.0-21.7.3.el2.1.6.src.rpm     MD5: 117edccd5352db96a61b676bcaa01ae6
 
IA-64:
fetchmail-5.9.0-21.7.3.el2.1.6.ia64.rpm     MD5: 533657a336cf0e823c72027154f4617d
fetchmailconf-5.9.0-21.7.3.el2.1.6.ia64.rpm     MD5: e6b8e4a0bbc86888b81abb9621c64ea4
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

241191 - CVE-2007-1558 fetchmail, mutt: APOP vulnerability


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/