Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2007-0344

Опубликовано: 26 июн. 2007
Источник: oracle-oval
Платформа: Oracle Linux 5

Описание

ELSA-2007-0344: Moderate: evolution-data-server security update (MODERATE)

[1.8.0-15.0.3.el5]

  • Add patch for RH bug #235289 (APOP authentication vulnerability).

[1.8.0-15.0.2.el5]

  • Remove Makefile.in changes that accidentally slipped into the patch.

[1.8.0-15.0.1.el5]

  • Add patch for RH bug #229707 (timezone updates).

Обновленные пакеты

Oracle Linux 5

Oracle Linux x86_64

evolution-data-server

1.8.0-15.0.3.el5

evolution-data-server-devel

1.8.0-15.0.3.el5

Oracle Linux i386

evolution-data-server

1.8.0-15.0.3.el5

evolution-data-server-devel

1.8.0-15.0.3.el5

Связанные CVE

Связанные уязвимости

ubuntu
больше 18 лет назад

The APOP protocol allows remote attackers to guess the first 3 characters of a password via man-in-the-middle (MITM) attacks that use crafted message IDs and MD5 collisions. NOTE: this design-level issue potentially affects all products that use APOP, including (1) Thunderbird 1.x before 1.5.0.12 and 2.x before 2.0.0.4, (2) Evolution, (3) mutt, (4) fetchmail before 6.3.8, (5) SeaMonkey 1.0.x before 1.0.9 and 1.1.x before 1.1.2, (6) Balsa 2.3.16 and earlier, (7) Mailfilter before 0.8.2, and possibly other products.

redhat
больше 18 лет назад

The APOP protocol allows remote attackers to guess the first 3 characters of a password via man-in-the-middle (MITM) attacks that use crafted message IDs and MD5 collisions. NOTE: this design-level issue potentially affects all products that use APOP, including (1) Thunderbird 1.x before 1.5.0.12 and 2.x before 2.0.0.4, (2) Evolution, (3) mutt, (4) fetchmail before 6.3.8, (5) SeaMonkey 1.0.x before 1.0.9 and 1.1.x before 1.1.2, (6) Balsa 2.3.16 and earlier, (7) Mailfilter before 0.8.2, and possibly other products.

nvd
больше 18 лет назад

The APOP protocol allows remote attackers to guess the first 3 characters of a password via man-in-the-middle (MITM) attacks that use crafted message IDs and MD5 collisions. NOTE: this design-level issue potentially affects all products that use APOP, including (1) Thunderbird 1.x before 1.5.0.12 and 2.x before 2.0.0.4, (2) Evolution, (3) mutt, (4) fetchmail before 6.3.8, (5) SeaMonkey 1.0.x before 1.0.9 and 1.1.x before 1.1.2, (6) Balsa 2.3.16 and earlier, (7) Mailfilter before 0.8.2, and possibly other products.

debian
больше 18 лет назад

The APOP protocol allows remote attackers to guess the first 3 charact ...

github
больше 3 лет назад

The APOP protocol allows remote attackers to guess the first 3 characters of a password via man-in-the-middle (MITM) attacks that use crafted message IDs and MD5 collisions. NOTE: this design-level issue potentially affects all products that use APOP, including (1) Thunderbird 1.x before 1.5.0.12 and 2.x before 2.0.0.4, (2) Evolution, (3) mutt, (4) fetchmail before 6.3.8, (5) SeaMonkey 1.0.x before 1.0.9 and 1.1.x before 1.1.2, (6) Balsa 2.3.16 and earlier, (7) Mailfilter before 0.8.2, and possibly other products.