Lucene search

K
freebsdFreeBSDF1C4D133-E6D3-11DB-99EA-0060084A00E5
HistoryApr 06, 2007 - 12:00 a.m.

fetchmail -- insecure APOP authentication

2007-04-0600:00:00
vuxml.freebsd.org
11

2.6 Low

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:H/Au:N/C:P/I:N/A:N

0.063 Low

EPSS

Percentile

93.5%

Matthias Andree reports:

The POP3 standard, currently RFC-1939, has specified an optional,
MD5-based authentication scheme called “APOP” which no longer
should be considered secure.
Additionally, fetchmail’s POP3 client implementation has been
validating the APOP challenge too lightly and accepted random
garbage as a POP3 server’s APOP challenge. This made it easier
than necessary for man-in-the-middle attackers to retrieve by
several probing and guessing the first three characters of the
APOP secret, bringing brute forcing the remaining characters well
within reach.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchfetchmail< 6.3.8UNKNOWN

2.6 Low

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:H/Au:N/C:P/I:N/A:N

0.063 Low

EPSS

Percentile

93.5%