2.6 Low
CVSS2
Access Vector
NETWORK
Access Complexity
HIGH
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:H/Au:N/C:P/I:N/A:N
0.063 Low
EPSS
Percentile
93.5%
The APOP protocol allows remote attackers to guess the first 3 characters of a password via man-in-the-middle (MITM) attacks that use crafted message IDs and MD5 collisions. NOTE: this design-level issue potentially affects all products that use APOP, including (1) Thunderbird 1.x before 1.5.0.12 and 2.x before 2.0.0.4, (2) Evolution, (3) mutt, (4) fetchmail before 6.3.8, (5) SeaMonkey 1.0.x before 1.0.9 and 1.1.x before 1.1.2, (6) Balsa 2.3.16 and earlier, (7) Mailfilter before 0.8.2, and possibly other products.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 12 | all | balsa | < 2.3.17-1 | balsa_2.3.17-1_all.deb |
Debian | 11 | all | balsa | < 2.3.17-1 | balsa_2.3.17-1_all.deb |
Debian | 10 | all | balsa | < 2.3.17-1 | balsa_2.3.17-1_all.deb |
Debian | 999 | all | balsa | < 2.3.17-1 | balsa_2.3.17-1_all.deb |
Debian | 13 | all | balsa | < 2.3.17-1 | balsa_2.3.17-1_all.deb |
Debian | 12 | all | claws-mail | < 2.9.1-1 | claws-mail_2.9.1-1_all.deb |
Debian | 11 | all | claws-mail | < 2.9.1-1 | claws-mail_2.9.1-1_all.deb |
Debian | 10 | all | claws-mail | < 2.9.1-1 | claws-mail_2.9.1-1_all.deb |
Debian | 999 | all | claws-mail | < 2.9.1-1 | claws-mail_2.9.1-1_all.deb |
Debian | 13 | all | claws-mail | < 2.9.1-1 | claws-mail_2.9.1-1_all.deb |