1
0
mirror of https://git.FreeBSD.org/ports.git synced 2024-11-24 00:45:52 +00:00

- Update to 6.2.5.2. This fixes a denial of service vulerability introduced

in version 6.2.5.1

- Use distribution patch from fetchmail.berlios.de instead of keeping the
  security fix in CVS (-> remove patch-r1, patch-s1 which contained to
  update from 6.2.5 to 6.2.5.1).

- The above patch also contains a patch that we kept locally in
  patch-driver.c: This one has been removed, too.
This commit is contained in:
Simon Barner 2005-07-22 06:59:44 +00:00
parent 53118ae475
commit 5d0b10e19d
Notes: svn2git 2021-03-31 03:12:20 +00:00
svn path=/head/; revision=139868
5 changed files with 9 additions and 293 deletions

View File

@ -10,7 +10,7 @@
# want fetchmailconf to work, define WITH_X11
PORTNAME= fetchmail
PORTVERSION= 6.2.5.1
PORTVERSION= 6.2.5.2
CATEGORIES= mail ipv6
MASTER_SITES= http://www.catb.org/~esr/%SUBDIR%/ \
http://download.berlios.de/%SUBDIR%/ \
@ -20,6 +20,11 @@ MASTER_SITES= http://www.catb.org/~esr/%SUBDIR%/ \
MASTER_SITE_SUBDIR= fetchmail
DISTNAME= ${PORTNAME}-6.2.5
PATCH_SITES= http://download.berlios.de/%SUBDIR%/
PATCH_SITE_SUBDIR= fetchmail
PATCHFILES= ${PORTNAME}-patch-${PORTVERSION}.gz
PATCH_DIST_STRIP=-p1
MAINTAINER= barner@FreeBSD.org
COMMENT= Batch mail retrieval utility for IMAP/POP2/POP3/APOP/KPOP/ETRN/ODMR
@ -49,6 +54,7 @@ MLINKS= fetchmail.1 fetchmailconf.1
FDOC= ${PREFIX}/share/doc/fetchmail
DOCS= FAQ FEATURES NEWS NOTES README \
design-notes.html fetchmail-FAQ.html fetchmail-features.html
WRKSRC= ${WRKDIR}/${PORTNAME}-6.2.5
.if !defined(WITHOUT_NLS)
CONFIGURE_ARGS+= --enable-nls

View File

@ -1,2 +1,4 @@
MD5 (fetchmail-6.2.5.tar.gz) = 9956b30139edaa4f5f77c4d0dbd80225
SIZE (fetchmail-6.2.5.tar.gz) = 1257376
MD5 (fetchmail-patch-6.2.5.2.gz) = be18f89b94e937a22560aa452e524c4b
SIZE (fetchmail-patch-6.2.5.2.gz) = 2000

View File

@ -1,15 +0,0 @@
--- driver.c 2003-10-16 00:52:31 +0530
+++ driver.c 2003-10-17 11:24:27 +0530
@@ -429,8 +429,11 @@
/* for POP3, we can get the size of one mail only! Unfortunately, this
* protocol specific test cannot be done elsewhere as the protocol
* could be "auto". */
- if (ctl->server.protocol == P_POP3)
+ switch (ctl->server.protocol)
+ {
+ case P_POP3: case P_APOP: case P_RPOP:
fetchsizelimit = 1;
+ }
/* Time to allocate memory to store the sizes */
xalloca(msgsizes, int *, sizeof(int) * fetchsizelimit);

View File

@ -1,40 +0,0 @@
--- ./sink.c~ 2003-10-11 00:06:36.000000000 +0200
+++ ./sink.c 2005-07-20 18:26:32.000000000 +0200
@@ -724,7 +724,7 @@
/* see the ap computation under the SMTP branch */
fprintf(sinkfp,
- "MAIL FROM: %s", (msg->return_path[0]) ? msg->return_path : user);
+ "MAIL FROM:%s", (msg->return_path[0]) ? msg->return_path : user);
if (ctl->pass8bits || (ctl->mimemsg & MSG_IS_8BIT))
fputs(" BODY=8BITMIME", sinkfp);
--- ./smtp.c~ 2003-08-06 05:30:18.000000000 +0200
+++ ./smtp.c 2005-07-20 18:26:32.000000000 +0200
@@ -232,13 +232,13 @@
int ok;
char buf[MSGBUFSIZE];
- if (strchr(from, '<'))
+ if (from[0]=='<')
#ifdef HAVE_SNPRINTF
snprintf(buf, sizeof(buf),
#else
sprintf(buf,
#endif /* HAVE_SNPRINTF */
- "MAIL FROM: %s", from);
+ "MAIL FROM:%s", from);
else
#ifdef HAVE_SNPRINTF
snprintf(buf, sizeof(buf),
--- Makefile.in.orig Thu Jul 21 11:48:31 2005
+++ Makefile.in Thu Jul 21 11:49:11 2005
@@ -4,7 +4,7 @@
# So just uncomment all the lines marked QNX.
PACKAGE = fetchmail
-VERSION = 6.2.5
+VERSION = 6.2.5.1
# Ultrix 2.2 make doesn't expand the value of VPATH.
srcdir = @srcdir@

View File

@ -1,237 +0,0 @@
SECURITY FIX: truncate UIDL replies, lest malicious or compromised
POP3 servers overflow fetchmail's stack. Debian bug #212762.
This is a remote root exploit.
--- ./pop3.c~ 2003-10-15 21:22:31.000000000 +0200
+++ ./pop3.c 2005-07-20 18:33:26.000000000 +0200
@@ -16,7 +16,8 @@
#if defined(STDC_HEADERS)
#include <stdlib.h>
#endif
-
+#include <errno.h>
+
#include "fetchmail.h"
#include "socket.h"
#include "i18n.h"
@@ -590,7 +591,8 @@
return(PS_SUCCESS);
}
-static int pop3_gettopid( int sock, int num , char *id)
+#define POSIX_space "\t\n\v\f\r "
+static int pop3_gettopid(int sock, int num , char *id, size_t idsize)
{
int ok;
int got_it;
@@ -603,25 +605,51 @@
{
if (DOTLINE(buf))
break;
- if ( ! got_it && ! strncasecmp("Message-Id:", buf, 11 )) {
- got_it = 1;
- /* prevent stack overflows */
- buf[IDLEN+12] = 0;
- sscanf( buf+12, "%s", id);
+ if (!got_it && 0 == strncasecmp("Message-Id:", buf, 11)) {
+ char *p = buf + 11;
+ p += strspn(p, POSIX_space);
+ p = strtok(p, POSIX_space);
+ strlcpy(id, p, idsize);
}
}
return 0;
}
-static int pop3_getuidl( int sock, int num , char *id)
+/** Parse destructively the UID response (leading +OK must have been
+ * stripped off) in buf, store the number in gotnum, and store the ID
+ * into the caller-provided buffer "id" of size "idsize".
+ * Returns PS_SUCCESS or PS_PROTOCOL for failure. */
+static int parseuid(char *buf, unsigned long *gotnum, char *id, size_t idsize)
+{
+ char *i, *j;
+
+ i = strtok(buf, POSIX_space);
+ errno = 0;
+ *gotnum = strtoul(i, &j, 10);
+ if (*j != '\0' || j == i || errno) {
+ report(stderr, GT_("Cannot handle UIDL response from upstream server.\n"));
+ return PS_PROTOCOL;
+ }
+ i = strtok(NULL, POSIX_space);
+ strlcpy(id, i, idsize);
+ return PS_SUCCESS;
+}
+
+static int pop3_getuidl(int sock, int num , char *id, size_t idsize)
{
int ok;
char buf [POPBUFSIZE+1];
+ unsigned long gotnum;
+
gen_send(sock, "UIDL %d", num);
if ((ok = pop3_ok(sock, buf)) != 0)
return(ok);
- if (sscanf(buf, "%d %s", &num, id) != 2)
- return(PS_PROTOCOL);
+ if ((ok = parseuid(buf, &gotnum, id, idsize)))
+ return ok;
+ if (gotnum != num) {
+ report(stderr, GT_("Server responded with UID for wrong message.\n"));
+ return PS_PROTOCOL;
+ }
return(PS_SUCCESS);
}
@@ -638,7 +666,7 @@
struct idlist *new;
try_nr = (first_nr + last_nr) / 2;
- if( (ok = pop3_getuidl( sock, try_nr, id )) != 0 )
+ if ((ok = pop3_getuidl(sock, try_nr, id, sizeof(id))) != 0)
return ok;
if ((new = str_in_list(&ctl->oldsaved, id, FALSE)))
{
@@ -700,10 +728,10 @@
int first_nr, list_len, try_id, try_nr, add_id;
int num;
char id [IDLEN+1];
-
- if( (ok = pop3_gettopid( sock, 1, id )) != 0 )
+
+ if ((ok = pop3_gettopid(sock, 1, id, sizeof(id))) != 0)
return ok;
-
+
if( ( first_nr = str_nr_in_list(&ctl->oldsaved, id) ) == -1 ) {
/* the first message is unknown -> all messages are new */
*newp = *countp;
@@ -715,7 +743,7 @@
try_id = list_len - first_nr; /* -1 + 1 */
if( try_id > 1 ) {
if( try_id <= *countp ) {
- if( (ok = pop3_gettopid( sock, try_id, id )) != 0 )
+ if ((ok = pop3_gettopid(sock, try_id, id, sizeof(id))) != 0)
return ok;
try_nr = str_nr_last_in_list(&ctl->oldsaved, id);
@@ -739,7 +767,7 @@
} else
try_id += add_id;
- if( (ok = pop3_gettopid( sock, try_id, id )) != 0 )
+ if ((ok = pop3_gettopid(sock, try_id, id, sizeof(id))) != 0)
return ok;
try_nr = str_nr_in_list(&ctl->oldsaved, id);
}
@@ -801,7 +829,7 @@
/*
* Newer, RFC-1725-conformant POP servers may not have the LAST command.
- * We work as hard as possible to hide this ugliness, but it makes
+ * We work as hard as possible to hide this ugliness, but it makes
* counting new messages intrinsically quadratic in the worst case.
*/
last = 0;
@@ -839,15 +867,15 @@
}
*newp = (*countp - last);
}
- else
- {
+ else
+ {
if (dofastuidl)
return(pop3_fastuidl( sock, ctl, *countp, newp));
/* grab the mailbox's UID list */
if ((ok = gen_transact(sock, "UIDL")) != 0)
{
/* don't worry, yet! do it the slow way */
- if((ok = pop3_slowuidl( sock, ctl, countp, newp))!=0)
+ if ((ok = pop3_slowuidl(sock, ctl, countp, newp)))
{
report(stderr, GT_("protocol error while fetching UIDLs\n"));
return(PS_ERROR);
@@ -855,27 +883,32 @@
}
else
{
- int num;
+ unsigned long unum;
*newp = 0;
- while ((ok = gen_recv(sock, buf, sizeof(buf))) == 0)
+ while ((ok = gen_recv(sock, buf, sizeof(buf))) == 0)
{
- if (DOTLINE(buf))
- break;
- else if (sscanf(buf, "%d %s", &num, id) == 2)
+ if (DOTLINE(buf))
+ break;
+
+ if (parseuid(buf, &unum, id, sizeof(id)) == PS_SUCCESS)
{
- struct idlist *old, *new;
+ struct idlist *old, *new;
new = save_str(&ctl->newsaved, id, UID_UNSEEN);
- new->val.status.num = num;
+ new->val.status.num = unum;
if ((old = str_in_list(&ctl->oldsaved, id, FALSE)))
{
flag mark = old->val.status.mark;
if (mark == UID_DELETED || mark == UID_EXPUNGED)
{
+ /* XXX FIXME: switch 3 occurrences from
+ * (int)unum or (unsigned int)unum to
+ * remove the cast and use %lu - not now
+ * though, time for new release */
if (outlevel >= O_VERBOSE)
- report(stderr, GT_("id=%s (num=%d) was deleted, but is still present!\n"), id, num);
+ report(stderr, GT_("id=%s (num=%d) was deleted, but is still present!\n"), id, (int)unum);
/* just mark it as seen now! */
old->val.status.mark = mark = UID_SEEN;
}
@@ -884,25 +917,25 @@
{
(*newp)++;
if (outlevel >= O_DEBUG)
- report(stdout, GT_("%u is unseen\n"), num);
+ report(stdout, GT_("%u is unseen\n"), (unsigned int)unum);
}
}
else
{
(*newp)++;
if (outlevel >= O_DEBUG)
- report(stdout, GT_("%u is unseen\n"), num);
+ report(stdout, GT_("%u is unseen\n"), (unsigned int)unum);
/* add it to oldsaved also! In case, we do not
* swap the lists (say, due to socket error),
* the same mail will not be downloaded again.
*/
old = save_str(&ctl->oldsaved, id, UID_UNSEEN);
- old->val.status.num = num;
+ old->val.status.num = unum;
}
}
- }
- }
- }
+ }
+ }
+ }
}
return(PS_SUCCESS);
@@ -986,7 +1019,7 @@
}
/* get the uidl first! */
- if (pop3_getuidl(sock, num, id) != PS_SUCCESS)
+ if (pop3_getuidl(sock, num, id, sizeof(id)) != PS_SUCCESS)
return(TRUE);
if ((new = str_in_list(&ctl->oldsaved, id, FALSE))) {