Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 30 Oct 2005 20:50:07 +0100
From:      Simon Barner <barner@FreeBSD.org>
To:        doc@FreeBSD.org
Subject:   Please review: New vuln.xml entry for ports/mail/fetchmail
Message-ID:  <20051030195007.GB1451@zi025.glhnet.mhn.de>

next in thread | raw e-mail | index | archive | help

--T7mxYSe680VjQnyC
Content-Type: multipart/mixed; boundary="z4+8/lEcDcG5Ke9S"
Content-Disposition: inline


--z4+8/lEcDcG5Ke9S
Content-Type: text/plain; charset=iso-8859-1
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

Dear doc@,

could you please review the attached patch?

--=20
Best regards / Viele Gr=FC=DFe,                             barner@FreeBSD.=
org
 Simon Barner                                                barner@gmx.de

--z4+8/lEcDcG5Ke9S
Content-Type: text/plain; charset=us-ascii
Content-Disposition: attachment; filename="vuln.xml.diff-fetchmailconf"
Content-Transfer-Encoding: quoted-printable

Index: vuln.xml
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
RCS file: /home/ncvs/ports/security/vuxml/vuln.xml,v
retrieving revision 1.868
diff -u -r1.868 vuln.xml
--- vuln.xml	27 Oct 2005 19:40:24 -0000	1.868
+++ vuln.xml	30 Oct 2005 19:47:37 -0000
@@ -34,6 +34,36 @@
=20
 -->
 <vuxml xmlns=3D"http://www.vuxml.org/apps/vuxml-1">;
+  <vuln vid=3D"baf74e0b-497a-11da-a4f4-0060084a00e5">
+    <topic>fetchmailconf -- password exposure through insecure file creati=
on</topic>
+    <affects>
+      <package>
+	<name>fetchmail</name>
+	<range><lt>6.2.5.2_1</lt></range>
+      </package>
+    </affects>
+    <description>=20
+      <body xmlns=3D"http://www.w3.org/1999/xhtml">;
+	<p>From the fetchmail home page:</p>
+	<blockquote cite=3D"http://fetchmail.berlios.de/fetchmail-SA-2005-02.txt">;
+	  <p>The fetchmailconf program before and excluding version 1.49 opened t=
he
+	    run control file, wrote the configuration to it, and only then changed
+	    the mode to 0600 (rw-------). Writing the file, which usually contains
+	    passwords, before making it unreadable to other users, can expose
+	    sensitive password information.</p>
+        </blockquote>
+      </body>
+    </description>
+    <references>
+      <cvename>CVE-2005-3088</cvename>
+      <url>http://fetchmail.berlios.de/fetchmail-SA-2005-02.txt</url>;
+    </references>
+    <dates>
+      <discovery>2005-10-21</discovery>
+      <entry>2005-10-30</entry>
+    </dates>
+  </vuln>
+ =20
   <vuln vid=3D"1daea60a-4719-11da-b5c6-0004614cc33d">
     <topic>ruby -- vulnerability in the safe level settings</topic>
     <affects>

--z4+8/lEcDcG5Ke9S--

--T7mxYSe680VjQnyC
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (FreeBSD)

iD8DBQFDZSPvCkn+/eutqCoRAq1hAKDyYlEQjGhDnb1lQ3U9+Zg3IE+gfwCg4cQv
5F0rEeQhzusIIvGMKOYB/AQ=
=3GQE
-----END PGP SIGNATURE-----

--T7mxYSe680VjQnyC--



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20051030195007.GB1451>