Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-38084

Опубликовано: 03 авг. 2021
Источник: debian
EPSS Низкий

Описание

An issue was discovered in the POP3 component of Courier Mail Server before 1.1.5. Meddler-in-the-middle attackers can pipeline commands after the POP3 STLS command, injecting plaintext commands into an encrypted user session.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
courierfixed1.3.13-1package
courierno-dsabookwormpackage
courierno-dsabullseyepackage
courierno-dsabusterpackage
courierpostponedstretchpackage

Примечания

  • https://sourceforge.net/p/courier/mailman/courier-imap/thread/cone.1382574216.483027.8082.1000%40monster.email-scan.com/#msg31555583

  • https://sourceforge.net/p/courier/mailman/message/37329216/

  • https://sourceforge.net/p/courier/courier-libs.git/ci/97ed62b17a2616c758d09105b5a14dd1038cff6f/ (1.1.5)

EPSS

Процентиль: 66%
0.00513
Низкий

Связанные уязвимости

CVSS3: 8.1
ubuntu
больше 4 лет назад

An issue was discovered in the POP3 component of Courier Mail Server before 1.1.5. Meddler-in-the-middle attackers can pipeline commands after the POP3 STLS command, injecting plaintext commands into an encrypted user session.

CVSS3: 8.1
nvd
больше 4 лет назад

An issue was discovered in the POP3 component of Courier Mail Server before 1.1.5. Meddler-in-the-middle attackers can pipeline commands after the POP3 STLS command, injecting plaintext commands into an encrypted user session.

github
больше 3 лет назад

An issue was discovered in the POP3 component of Courier Mail Server before 1.1.5. Meddler-in-the-middle attackers can pipeline commands after the POP3 STLS command, injecting plaintext commands into an encrypted user session.

EPSS

Процентиль: 66%
0.00513
Низкий