Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2011-1947

Опубликовано: 02 июн. 2011
Источник: debian
EPSS Низкий

Описание

fetchmail 5.9.9 through 6.3.19 does not properly limit the wait time after issuing a (1) STARTTLS or (2) STLS request, which allows remote servers to cause a denial of service (application hang) by acknowledging the request but not sending additional packets.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
fetchmailfixed6.3.22-1package

Примечания

  • http://www.fetchmail.info/fetchmail-SA-2011-01.txt

EPSS

Процентиль: 85%
0.02444
Низкий

Связанные уязвимости

ubuntu
почти 15 лет назад

fetchmail 5.9.9 through 6.3.19 does not properly limit the wait time after issuing a (1) STARTTLS or (2) STLS request, which allows remote servers to cause a denial of service (application hang) by acknowledging the request but not sending additional packets.

redhat
почти 15 лет назад

fetchmail 5.9.9 through 6.3.19 does not properly limit the wait time after issuing a (1) STARTTLS or (2) STLS request, which allows remote servers to cause a denial of service (application hang) by acknowledging the request but not sending additional packets.

nvd
почти 15 лет назад

fetchmail 5.9.9 through 6.3.19 does not properly limit the wait time after issuing a (1) STARTTLS or (2) STLS request, which allows remote servers to cause a denial of service (application hang) by acknowledging the request but not sending additional packets.

github
почти 4 года назад

fetchmail 5.9.9 through 6.3.19 does not properly limit the wait time after issuing a (1) STARTTLS or (2) STLS request, which allows remote servers to cause a denial of service (application hang) by acknowledging the request but not sending additional packets.

EPSS

Процентиль: 85%
0.02444
Низкий