Lucene search

K
debianDebianDEBIAN:DLA-106-1:8027E
HistoryDec 12, 2014 - 1:51 p.m.

[SECURITY] [DLA 106-1] getmail4 security update

2014-12-1213:51:17
lists.debian.org
6

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.001 Low

EPSS

Percentile

37.8%

Package : getmail4
Version : 4.46.0-1~deb6u1
CVE ID : CVE-2014-7273 CVE-2014-7274 CVE-2014-7275
Debian Bug : 766670

Several vulnerabilities have been discovered in getmail4, a mail retriever
with support for POP3, IMAP4 and SDPS, that could allow man-in-the-middle
attacks.

CVE-2014-7273

The IMAP-over-SSL implementation in getmail 4.0.0 through 4.43.0 does
not verify X.509 certificates from SSL servers, which allows
man-in-the-middle attackers to spoof IMAP servers and obtain sensitive
information via a crafted certificate.

CVE-2014-7274

The IMAP-over-SSL implementation in getmail 4.44.0 does not verify
that the server hostname matches a domain name in the subject's Common
Name (CN) field of the X.509 certificate, which allows
man-in-the-middle attackers to spoof IMAP servers and obtain sensitive
information via a crafted certificate from a recognized Certification
Authority.

CVE-2014-7275

The POP3-over-SSL implementation in getmail 4.0.0 through 4.44.0 does
not verify X.509 certificates from SSL servers, which allows
man-in-the-middle attackers to spoof POP3 servers and obtain sensitive
information via a crafted certificate.

For the squeeze distribution, those problems have been fixed by importing
a new upstream version: 4.46.0-1~deb6u1. The updated package has been
prepared by Osamu Aoki.

–
RaphaΓ«l Hertzog β—ˆ Debian Developer

Support Debian LTS: http://www.freexian.com/services/debian-lts.html
Learn to master Debian: http://debian-handbook.info/get/

OSVersionArchitecturePackageVersionFilename
Debian6allgetmail4<Β 4.46.0-1~deb6u1getmail4_4.46.0-1~deb6u1_all.deb

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.001 Low

EPSS

Percentile

37.8%