Vulnerability Details : CVE-2010-0562
The sdump function in sdump.c in fetchmail 6.3.11, 6.3.12, and 6.3.13, when running in verbose mode on platforms for which char is signed, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an SSL X.509 certificate containing non-printable characters with the high bit set, which triggers a heap-based buffer overflow during escaping.
Vulnerability category: OverflowExecute codeDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2010-0562
Probability of exploitation activity in the next 30 days: 11.56%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 94 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2010-0562
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST |
CWE ids for CVE-2010-0562
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: nvd@nist.gov (Primary)
Vendor statements for CVE-2010-0562
-
Red Hat 2010-02-09Not vulnerable. This issue did not affect the versions of fetchmail as shipped with Red Hat Enterprise Linux 3, 4, or 5.
-
http://www.securityfocus.com/bid/38088
Fetchmail SSL Certificate Printing Remote Heap Buffer Overflow Vulnerability
-
http://www.securitytracker.com/id?1023543
Fetchmail Heap Overflow When Displaying SSL Certificates in Verbose Mode May Let Remote Users Execute Arbitrary Code - SecurityTracker
-
http://www.fetchmail.info/fetchmail-SA-2010-01.txt
Vendor Advisory
-
http://mknod.org/svn/fetchmail/branches/BRANCH_6-3/fetchmail-SA-2010-01.txt
Not Found
-
http://www.vupen.com/english/advisories/2010/0296
Webmail | OVH- OVHVendor Advisory
-
http://www.mandriva.com/security/advisories?name=MDVSA-2010:037
mandriva.com
- cpe:2.3:a:fetchmail:fetchmail:6.3.11:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:6.3.12:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:6.3.13:*:*:*:*:*:*:*