Lucene search

K
mozillaMozilla FoundationMFSA2007-15
HistoryMay 30, 2007 - 12:00 a.m.

Security Vulnerability in APOP Authentication — Mozilla

2007-05-3000:00:00
Mozilla Foundation
www.mozilla.org
29

CVSS2

2.6

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:H/Au:N/C:P/I:N/A:N

EPSS

0.088

Percentile

94.6%

Gaëtan Leurent informed us of a weakness in APOP authentication that could allow an attacker to recover the first part of your mail password if the attacker could interpose a malicious mail server on your network masquerading as your legitimate mail server. With normal settings it could take several hours for the attacker to gather enough data to recover just a few characters of the password. This result was presented at the Fast Software Encryption 2007 conference.

Affected configurations

Vulners
Node
mozillaseamonkeyRange<1.0.9
OR
mozillaseamonkeyRange<1.1.2
OR
mozillathunderbirdRange<1.5.0.12
OR
mozillathunderbirdRange<2.0.0.4
VendorProductVersionCPE
mozillaseamonkey*cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
mozillathunderbird*cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*

CVSS2

2.6

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:H/Au:N/C:P/I:N/A:N

EPSS

0.088

Percentile

94.6%