Lucene search

K
ubuntucveUbuntu.comUB:CVE-2011-1429
HistoryMar 16, 2011 - 12:00 a.m.

CVE-2011-1429

2011-03-1600:00:00
ubuntu.com
ubuntu.com
5

5.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

0.003 Low

EPSS

Percentile

65.9%

Mutt does not verify that the smtps server hostname matches the domain name
of the subject of an X.509 certificate, which allows man-in-the-middle
attackers to spoof an SSL SMTP server via an arbitrary certificate, a
different vulnerability than CVE-2009-3766.

Bugs

Notes

Author Note
mdeslaur debian may have used an incomplete patch from the upstream bug.
tyhicks This is not specific to SMTPS. It is in the common code that uses GnuTLS, meaning that the IMAPS and POP3S protocols are also affected. Debian is carrying a fix that upstream has not applied. It doesn’t look like this issue is fixed upstream. RHEL is also carrying the same fix. The fix may be the cause of a mutt sidebar related bug (a feature patch that debian and ubuntu carry) After more investigation, the sidebar related bug was preexisting. Hardy’s version of mutt has a considerably different mutt_ssl_gnutls.c and my testing has shown that it is not affected.
OSVersionArchitecturePackageVersionFilename
ubuntu10.04noarchmutt< 1.5.20-7ubuntu1.1UNKNOWN
ubuntu10.10noarchmutt< 1.5.20-9ubuntu2.1UNKNOWN
ubuntu11.04noarchmutt< 1.5.21-2ubuntu3.1UNKNOWN

5.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

0.003 Low

EPSS

Percentile

65.9%