CVE-2005-4348

N/A Unknown
Published: December 21, 2005 Modified: April 16, 2026
View on NVD

Description

fetchmail before 6.3.1 and before 6.2.5.5, when configured for multidrop mode, allows remote attackers to cause a denial of service (application crash) by sending messages without headers from upstream mail servers.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=343836
Source: cve@mitre.org
Issue Tracking Mailing List Third Party Advisory
http://secunia.com/advisories/17891
Source: cve@mitre.org
Third Party Advisory
http://secunia.com/advisories/18172
Source: cve@mitre.org
Third Party Advisory
http://secunia.com/advisories/18231
Source: cve@mitre.org
Third Party Advisory
http://secunia.com/advisories/18266
Source: cve@mitre.org
Third Party Advisory
http://secunia.com/advisories/18433
Source: cve@mitre.org
Third Party Advisory
http://secunia.com/advisories/18463
Source: cve@mitre.org
Third Party Advisory
http://secunia.com/advisories/18895
Source: cve@mitre.org
Third Party Advisory
http://secunia.com/advisories/21253
Source: cve@mitre.org
Third Party Advisory
http://secunia.com/advisories/24007
Source: cve@mitre.org
Third Party Advisory
http://secunia.com/advisories/24284
Source: cve@mitre.org
Third Party Advisory
http://securitytracker.com/id?1015383
Source: cve@mitre.org
Third Party Advisory VDB Entry
http://www.debian.org/security/2005/dsa-939
Source: cve@mitre.org
Third Party Advisory
http://www.osvdb.org/21906
Source: cve@mitre.org
Broken Link
http://www.redhat.com/support/errata/RHSA-2007-0018.html
Source: cve@mitre.org
Third Party Advisory
http://www.securityfocus.com/bid/15987
Source: cve@mitre.org
Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/19289
Source: cve@mitre.org
Third Party Advisory VDB Entry
http://www.trustix.org/errata/2006/0002/
Source: cve@mitre.org
Broken Link
http://www.vupen.com/english/advisories/2005/2996
Source: cve@mitre.org
Permissions Required Third Party Advisory
http://www.vupen.com/english/advisories/2006/3101
Source: cve@mitre.org
Permissions Required Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/23713
Source: cve@mitre.org
Third Party Advisory VDB Entry
https://usn.ubuntu.com/233-1/
Source: cve@mitre.org
ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=343836
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking Mailing List Third Party Advisory
http://fetchmail.berlios.de/fetchmail-SA-2005-03.txt
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/17891
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/18172
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/18231
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/18266
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/18433
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/18463
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/18895
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/21253
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/24007
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/24284
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://securitytracker.com/id?1015383
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.443499
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.debian.org/security/2005/dsa-939
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.novell.com/linux/security/advisories/2007_4_sr.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.osvdb.org/21906
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.redhat.com/support/errata/RHSA-2007-0018.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.securityfocus.com/archive/1/420098/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/435197/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/15987
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/19289
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://www.trustix.org/errata/2006/0002/
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.vupen.com/english/advisories/2005/2996
Source: af854a3a-2127-422b-91ae-364da2661108
Permissions Required Third Party Advisory
http://www.vupen.com/english/advisories/2006/3101
Source: af854a3a-2127-422b-91ae-364da2661108
Permissions Required Third Party Advisory
http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:236
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/23713
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9659
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://usn.ubuntu.com/233-1/
Source: af854a3a-2127-422b-91ae-364da2661108

60 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
10.0%
93th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

fetchmail