Lucene search

K
freebsdFreeBSDF1C4D133-E6D3-11DB-99EA-0060084A00E5
HistoryApr 06, 2007 - 12:00 a.m.

fetchmail -- insecure APOP authentication

2007-04-0600:00:00
vuxml.freebsd.org
16

CVSS2

2.6

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:H/Au:N/C:P/I:N/A:N

EPSS

0.088

Percentile

94.6%

Matthias Andree reports:

The POP3 standard, currently RFC-1939, has specified an optional,
MD5-based authentication scheme called “APOP” which no longer
should be considered secure.
Additionally, fetchmail’s POP3 client implementation has been
validating the APOP challenge too lightly and accepted random
garbage as a POP3 server’s APOP challenge. This made it easier
than necessary for man-in-the-middle attackers to retrieve by
several probing and guessing the first three characters of the
APOP secret, bringing brute forcing the remaining characters well
within reach.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchfetchmail< 6.3.8UNKNOWN

CVSS2

2.6

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:H/Au:N/C:P/I:N/A:N

EPSS

0.088

Percentile

94.6%