Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2007-0344

Опубликовано: 26 июн. 2007
Источник: oracle-oval
Платформа: Oracle Linux 5

Описание

ELSA-2007-0344: Moderate: evolution-data-server security update (MODERATE)

[1.8.0-15.0.3.el5]

  • Add patch for RH bug #235289 (APOP authentication vulnerability).

[1.8.0-15.0.2.el5]

  • Remove Makefile.in changes that accidentally slipped into the patch.

[1.8.0-15.0.1.el5]

  • Add patch for RH bug #229707 (timezone updates).

Обновленные пакеты

Oracle Linux 5

Oracle Linux x86_64

evolution-data-server

1.8.0-15.0.3.el5

evolution-data-server-devel

1.8.0-15.0.3.el5

Oracle Linux i386

evolution-data-server

1.8.0-15.0.3.el5

evolution-data-server-devel

1.8.0-15.0.3.el5

Связанные CVE

Связанные уязвимости

ubuntu
около 18 лет назад

The APOP protocol allows remote attackers to guess the first 3 characters of a password via man-in-the-middle (MITM) attacks that use crafted message IDs and MD5 collisions. NOTE: this design-level issue potentially affects all products that use APOP, including (1) Thunderbird 1.x before 1.5.0.12 and 2.x before 2.0.0.4, (2) Evolution, (3) mutt, (4) fetchmail before 6.3.8, (5) SeaMonkey 1.0.x before 1.0.9 and 1.1.x before 1.1.2, (6) Balsa 2.3.16 and earlier, (7) Mailfilter before 0.8.2, and possibly other products.

redhat
около 18 лет назад

The APOP protocol allows remote attackers to guess the first 3 characters of a password via man-in-the-middle (MITM) attacks that use crafted message IDs and MD5 collisions. NOTE: this design-level issue potentially affects all products that use APOP, including (1) Thunderbird 1.x before 1.5.0.12 and 2.x before 2.0.0.4, (2) Evolution, (3) mutt, (4) fetchmail before 6.3.8, (5) SeaMonkey 1.0.x before 1.0.9 and 1.1.x before 1.1.2, (6) Balsa 2.3.16 and earlier, (7) Mailfilter before 0.8.2, and possibly other products.

nvd
около 18 лет назад

The APOP protocol allows remote attackers to guess the first 3 characters of a password via man-in-the-middle (MITM) attacks that use crafted message IDs and MD5 collisions. NOTE: this design-level issue potentially affects all products that use APOP, including (1) Thunderbird 1.x before 1.5.0.12 and 2.x before 2.0.0.4, (2) Evolution, (3) mutt, (4) fetchmail before 6.3.8, (5) SeaMonkey 1.0.x before 1.0.9 and 1.1.x before 1.1.2, (6) Balsa 2.3.16 and earlier, (7) Mailfilter before 0.8.2, and possibly other products.

debian
около 18 лет назад

The APOP protocol allows remote attackers to guess the first 3 charact ...

github
около 3 лет назад

The APOP protocol allows remote attackers to guess the first 3 characters of a password via man-in-the-middle (MITM) attacks that use crafted message IDs and MD5 collisions. NOTE: this design-level issue potentially affects all products that use APOP, including (1) Thunderbird 1.x before 1.5.0.12 and 2.x before 2.0.0.4, (2) Evolution, (3) mutt, (4) fetchmail before 6.3.8, (5) SeaMonkey 1.0.x before 1.0.9 and 1.1.x before 1.1.2, (6) Balsa 2.3.16 and earlier, (7) Mailfilter before 0.8.2, and possibly other products.