Lucene search

K
ubuntuUbuntuUSN-405-1
HistoryJan 11, 2007 - 12:00 a.m.

fetchmail vulnerability

2007-01-1100:00:00
ubuntu.com
23

6.2 Medium

AI Score

Confidence

Low

7.8 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:C/I:N/A:N

0.131 Low

EPSS

Percentile

95.5%

Releases

  • Ubuntu 6.10
  • Ubuntu 6.06
  • Ubuntu 5.10

Details

It was discovered that fetchmail did not correctly require TLS
negotiation in certain situations. This would result in a user’s
unencrypted password being sent across the network.

If fetchmail has been configured to use the “sslproto tls1”,
“sslcertck”, or “sslfingerprint” options with a server that does not
correctly support TLS negotiation, this update may cause fetchmail to
(correctly) abort authentication.

OSVersionArchitecturePackageVersionFilename
Ubuntu6.10noarchfetchmail< 6.3.4-1ubuntu4.1UNKNOWN
Ubuntu6.06noarchfetchmail< 6.3.2-2ubuntu2.1UNKNOWN
Ubuntu5.10noarchfetchmail< 6.2.5-13ubuntu3.3UNKNOWN

6.2 Medium

AI Score

Confidence

Low

7.8 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:C/I:N/A:N

0.131 Low

EPSS

Percentile

95.5%