Lucene search

K
ubuntucveUbuntu.comUB:CVE-2011-1429
HistoryMar 16, 2011 - 12:00 a.m.

CVE-2011-1429

2011-03-1600:00:00
ubuntu.com
ubuntu.com
8

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

EPSS

0.003

Percentile

66.2%

Mutt does not verify that the smtps server hostname matches the domain name
of the subject of an X.509 certificate, which allows man-in-the-middle
attackers to spoof an SSL SMTP server via an arbitrary certificate, a
different vulnerability than CVE-2009-3766.

Bugs

Notes

Author Note
mdeslaur debian may have used an incomplete patch from the upstream bug.
tyhicks This is not specific to SMTPS. It is in the common code that uses GnuTLS, meaning that the IMAPS and POP3S protocols are also affected. Debian is carrying a fix that upstream has not applied. It doesn’t look like this issue is fixed upstream. RHEL is also carrying the same fix. The fix may be the cause of a mutt sidebar related bug (a feature patch that debian and ubuntu carry) After more investigation, the sidebar related bug was preexisting. Hardy’s version of mutt has a considerably different mutt_ssl_gnutls.c and my testing has shown that it is not affected.
OSVersionArchitecturePackageVersionFilename
ubuntu10.04noarchmutt< 1.5.20-7ubuntu1.1UNKNOWN
ubuntu10.10noarchmutt< 1.5.20-9ubuntu2.1UNKNOWN
ubuntu11.04noarchmutt< 1.5.21-2ubuntu3.1UNKNOWN

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

EPSS

0.003

Percentile

66.2%