Lucene search

K
freebsdFreeBSD5238AC45-9D8C-11DB-858B-0060084A00E5
HistoryJan 04, 2007 - 12:00 a.m.

fetchmail -- TLS enforcement problem/MITM attack/password exposure

2007-01-0400:00:00
vuxml.freebsd.org
11

7.8 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:C/I:N/A:N

0.131 Low

EPSS

Percentile

95.5%

Matthias Andree reports:

Fetchmail has had several longstanding password disclosure
vulnerabilities.

sslcertck/sslfingerprint options should have implied
“sslproto tls1” in order to enforce TLS negotiation,
but did not.
Even with “sslproto tls1” in the config, fetches
would go ahead in plain text if STLS/STARTTLS wasn’t available
(not advertised, or advertised but rejected).
POP3 fetches could completely ignore all TLS options
whether available or not because it didn’t reliably issue
CAPA before checking for STLS support - but CAPA is a
requisite for STLS. Whether or not CAPAbilities were probed,
depended on the “auth” option. (Fetchmail only
tried CAPA if the auth option was not set at all, was set
to gssapi, kerberos, kerberos_v4, otp, or cram-md5.)
POP3 could fall back to using plain text passwords, even
if strong authentication had been configured.
POP2 would not complain if strong authentication or TLS
had been requested.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchfetchmail< 6.3.6UNKNOWN

7.8 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:C/I:N/A:N

0.131 Low

EPSS

Percentile

95.5%