Search for vulnerabilities
Vulnerability details: VCID-z1bh-6zcn-aaah
Vulnerability ID VCID-z1bh-6zcn-aaah
Aliases CVE-2006-0321
Summary fetchmail 6.3.0 and other versions before 6.3.2 allows remote attackers to cause a denial of service (crash) via crafted e-mail messages that cause a free of an invalid pointer when fetchmail bounces the message to the originator or local postmaster.
Status Published
Exploitability 0.5
Weighted Severity 4.5
Risk 2.2
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
epss 0.05019 https://api.first.org/data/v1/epss?cve=CVE-2006-0321
epss 0.05019 https://api.first.org/data/v1/epss?cve=CVE-2006-0321
epss 0.05019 https://api.first.org/data/v1/epss?cve=CVE-2006-0321
epss 0.05019 https://api.first.org/data/v1/epss?cve=CVE-2006-0321
epss 0.05019 https://api.first.org/data/v1/epss?cve=CVE-2006-0321
epss 0.05019 https://api.first.org/data/v1/epss?cve=CVE-2006-0321
epss 0.05019 https://api.first.org/data/v1/epss?cve=CVE-2006-0321
epss 0.05019 https://api.first.org/data/v1/epss?cve=CVE-2006-0321
epss 0.05019 https://api.first.org/data/v1/epss?cve=CVE-2006-0321
epss 0.05019 https://api.first.org/data/v1/epss?cve=CVE-2006-0321
epss 0.05019 https://api.first.org/data/v1/epss?cve=CVE-2006-0321
epss 0.05019 https://api.first.org/data/v1/epss?cve=CVE-2006-0321
epss 0.08810 https://api.first.org/data/v1/epss?cve=CVE-2006-0321
epss 0.08810 https://api.first.org/data/v1/epss?cve=CVE-2006-0321
epss 0.08810 https://api.first.org/data/v1/epss?cve=CVE-2006-0321
epss 0.11183 https://api.first.org/data/v1/epss?cve=CVE-2006-0321
epss 0.14329 https://api.first.org/data/v1/epss?cve=CVE-2006-0321
epss 0.14329 https://api.first.org/data/v1/epss?cve=CVE-2006-0321
epss 0.14329 https://api.first.org/data/v1/epss?cve=CVE-2006-0321
epss 0.14329 https://api.first.org/data/v1/epss?cve=CVE-2006-0321
epss 0.14329 https://api.first.org/data/v1/epss?cve=CVE-2006-0321
epss 0.14329 https://api.first.org/data/v1/epss?cve=CVE-2006-0321
epss 0.14329 https://api.first.org/data/v1/epss?cve=CVE-2006-0321
epss 0.14329 https://api.first.org/data/v1/epss?cve=CVE-2006-0321
epss 0.14329 https://api.first.org/data/v1/epss?cve=CVE-2006-0321
epss 0.14329 https://api.first.org/data/v1/epss?cve=CVE-2006-0321
epss 0.14329 https://api.first.org/data/v1/epss?cve=CVE-2006-0321
epss 0.14329 https://api.first.org/data/v1/epss?cve=CVE-2006-0321
epss 0.14329 https://api.first.org/data/v1/epss?cve=CVE-2006-0321
epss 0.14329 https://api.first.org/data/v1/epss?cve=CVE-2006-0321
epss 0.14329 https://api.first.org/data/v1/epss?cve=CVE-2006-0321
epss 0.14329 https://api.first.org/data/v1/epss?cve=CVE-2006-0321
epss 0.14329 https://api.first.org/data/v1/epss?cve=CVE-2006-0321
epss 0.14329 https://api.first.org/data/v1/epss?cve=CVE-2006-0321
epss 0.14329 https://api.first.org/data/v1/epss?cve=CVE-2006-0321
epss 0.14329 https://api.first.org/data/v1/epss?cve=CVE-2006-0321
epss 0.14329 https://api.first.org/data/v1/epss?cve=CVE-2006-0321
epss 0.14329 https://api.first.org/data/v1/epss?cve=CVE-2006-0321
epss 0.14329 https://api.first.org/data/v1/epss?cve=CVE-2006-0321
epss 0.14329 https://api.first.org/data/v1/epss?cve=CVE-2006-0321
epss 0.14329 https://api.first.org/data/v1/epss?cve=CVE-2006-0321
epss 0.14329 https://api.first.org/data/v1/epss?cve=CVE-2006-0321
epss 0.14329 https://api.first.org/data/v1/epss?cve=CVE-2006-0321
epss 0.14329 https://api.first.org/data/v1/epss?cve=CVE-2006-0321
epss 0.14329 https://api.first.org/data/v1/epss?cve=CVE-2006-0321
epss 0.14329 https://api.first.org/data/v1/epss?cve=CVE-2006-0321
epss 0.14329 https://api.first.org/data/v1/epss?cve=CVE-2006-0321
epss 0.14329 https://api.first.org/data/v1/epss?cve=CVE-2006-0321
epss 0.14329 https://api.first.org/data/v1/epss?cve=CVE-2006-0321
epss 0.14329 https://api.first.org/data/v1/epss?cve=CVE-2006-0321
epss 0.14329 https://api.first.org/data/v1/epss?cve=CVE-2006-0321
epss 0.14329 https://api.first.org/data/v1/epss?cve=CVE-2006-0321
epss 0.14329 https://api.first.org/data/v1/epss?cve=CVE-2006-0321
epss 0.14329 https://api.first.org/data/v1/epss?cve=CVE-2006-0321
epss 0.14329 https://api.first.org/data/v1/epss?cve=CVE-2006-0321
epss 0.14329 https://api.first.org/data/v1/epss?cve=CVE-2006-0321
epss 0.14329 https://api.first.org/data/v1/epss?cve=CVE-2006-0321
epss 0.14329 https://api.first.org/data/v1/epss?cve=CVE-2006-0321
epss 0.14329 https://api.first.org/data/v1/epss?cve=CVE-2006-0321
epss 0.14329 https://api.first.org/data/v1/epss?cve=CVE-2006-0321
epss 0.14329 https://api.first.org/data/v1/epss?cve=CVE-2006-0321
epss 0.14329 https://api.first.org/data/v1/epss?cve=CVE-2006-0321
epss 0.14329 https://api.first.org/data/v1/epss?cve=CVE-2006-0321
epss 0.14329 https://api.first.org/data/v1/epss?cve=CVE-2006-0321
epss 0.14329 https://api.first.org/data/v1/epss?cve=CVE-2006-0321
epss 0.14329 https://api.first.org/data/v1/epss?cve=CVE-2006-0321
cvssv2 5.0 https://nvd.nist.gov/vuln/detail/CVE-2006-0321
Reference id Reference type URL
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=348747
http://developer.berlios.de/project/shownotes.php?release_id=8784
http://fetchmail.berlios.de/fetchmail-SA-2006-01.txt
http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-0321.json
https://api.first.org/data/v1/epss?cve=CVE-2006-0321
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0321
http://secunia.com/advisories/18571
http://secunia.com/advisories/18895
http://secunia.com/advisories/21253
http://securitytracker.com/id?1015527
https://exchange.xforce.ibmcloud.com/vulnerabilities/24265
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.443499
http://www.osvdb.org/22691
http://www.securityfocus.com/archive/1/422936/100/0/threaded
http://www.securityfocus.com/bid/16365
http://www.securityfocus.com/bid/19289
http://www.us-cert.gov/cas/techalerts/TA06-214A.html
http://www.vupen.com/english/advisories/2006/0300
http://www.vupen.com/english/advisories/2006/3101
348747 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=348747
cpe:2.3:a:fetchmail:fetchmail:6.3.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fetchmail:fetchmail:6.3.0:*:*:*:*:*:*:*
cpe:2.3:a:fetchmail:fetchmail:6.3.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fetchmail:fetchmail:6.3.1:*:*:*:*:*:*:*
CVE-2006-0321 https://nvd.nist.gov/vuln/detail/CVE-2006-0321
No exploits are available.
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2006-0321
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.93077
EPSS Score 0.05019
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.