Lucene search

K
nvd[email protected]NVD:CVE-2007-1558
HistoryApr 16, 2007 - 10:19 p.m.

CVE-2007-1558

2007-04-1622:19:00
web.nvd.nist.gov
5

CVSS2

2.6

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:H/Au:N/C:P/I:N/A:N

AI Score

6.7

Confidence

Low

EPSS

0.088

Percentile

94.6%

The APOP protocol allows remote attackers to guess the first 3 characters of a password via man-in-the-middle (MITM) attacks that use crafted message IDs and MD5 collisions. NOTE: this design-level issue potentially affects all products that use APOP, including (1) Thunderbird 1.x before 1.5.0.12 and 2.x before 2.0.0.4, (2) Evolution, (3) mutt, (4) fetchmail before 6.3.8, (5) SeaMonkey 1.0.x before 1.0.9 and 1.1.x before 1.1.2, (6) Balsa 2.3.16 and earlier, (7) Mailfilter before 0.8.2, and possibly other products.

Affected configurations

Nvd
Node
apop_protocolapop_protocol
VendorProductVersionCPE
apop_protocolapop_protocol*cpe:2.3:a:apop_protocol:apop_protocol:*:*:*:*:*:*:*:*

References

CVSS2

2.6

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:H/Au:N/C:P/I:N/A:N

AI Score

6.7

Confidence

Low

EPSS

0.088

Percentile

94.6%