Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2007-1558

Опубликовано: 16 апр. 2007
Источник: ubuntu
Приоритет: untriaged
EPSS Низкий
CVSS2: 2.6

Описание

The APOP protocol allows remote attackers to guess the first 3 characters of a password via man-in-the-middle (MITM) attacks that use crafted message IDs and MD5 collisions. NOTE: this design-level issue potentially affects all products that use APOP, including (1) Thunderbird 1.x before 1.5.0.12 and 2.x before 2.0.0.4, (2) Evolution, (3) mutt, (4) fetchmail before 6.3.8, (5) SeaMonkey 1.0.x before 1.0.9 and 1.1.x before 1.1.2, (6) Balsa 2.3.16 and earlier, (7) Mailfilter before 0.8.2, and possibly other products.

РелизСтатусПримечание
dapper

released

6.3.2-2ubuntu2.2
devel

released

6.3.8-8ubuntu1
edgy

released

6.3.4-1ubuntu4.2
feisty

released

6.3.6-1ubuntu2.1
upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

released

1.1.4-1ubuntu2
edgy

DNE

feisty

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

ignored

devel

released

149-2
edgy

ignored

feisty

ignored

upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

ignored

devel

released

5.2-2
edgy

ignored

feisty

ignored

upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

ignored

devel

released

5.2.50~0.20070620-1
edgy

ignored

feisty

ignored

upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

released

1.5.0.13-0ubuntu0.6.06
devel

DNE

edgy

released

1.5.0.13-0ubuntu0.6.10
feisty

released

1.5.0.13-0ubuntu0.7.04
upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

ignored

devel

released

2.14.0-7
edgy

ignored

feisty

ignored

upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

ignored

devel

released

2.15.5+0.20070424-2
edgy

ignored

feisty

ignored

upstream

needs-triage

Показывать по

EPSS

Процентиль: 87%
0.03612
Низкий

2.6 Low

CVSS2

Связанные уязвимости

redhat
около 18 лет назад

The APOP protocol allows remote attackers to guess the first 3 characters of a password via man-in-the-middle (MITM) attacks that use crafted message IDs and MD5 collisions. NOTE: this design-level issue potentially affects all products that use APOP, including (1) Thunderbird 1.x before 1.5.0.12 and 2.x before 2.0.0.4, (2) Evolution, (3) mutt, (4) fetchmail before 6.3.8, (5) SeaMonkey 1.0.x before 1.0.9 and 1.1.x before 1.1.2, (6) Balsa 2.3.16 and earlier, (7) Mailfilter before 0.8.2, and possibly other products.

nvd
около 18 лет назад

The APOP protocol allows remote attackers to guess the first 3 characters of a password via man-in-the-middle (MITM) attacks that use crafted message IDs and MD5 collisions. NOTE: this design-level issue potentially affects all products that use APOP, including (1) Thunderbird 1.x before 1.5.0.12 and 2.x before 2.0.0.4, (2) Evolution, (3) mutt, (4) fetchmail before 6.3.8, (5) SeaMonkey 1.0.x before 1.0.9 and 1.1.x before 1.1.2, (6) Balsa 2.3.16 and earlier, (7) Mailfilter before 0.8.2, and possibly other products.

debian
около 18 лет назад

The APOP protocol allows remote attackers to guess the first 3 charact ...

github
около 3 лет назад

The APOP protocol allows remote attackers to guess the first 3 characters of a password via man-in-the-middle (MITM) attacks that use crafted message IDs and MD5 collisions. NOTE: this design-level issue potentially affects all products that use APOP, including (1) Thunderbird 1.x before 1.5.0.12 and 2.x before 2.0.0.4, (2) Evolution, (3) mutt, (4) fetchmail before 6.3.8, (5) SeaMonkey 1.0.x before 1.0.9 and 1.1.x before 1.1.2, (6) Balsa 2.3.16 and earlier, (7) Mailfilter before 0.8.2, and possibly other products.

oracle-oval
около 18 лет назад

ELSA-2007-0385: Moderate: fetchmail security update (MODERATE)

EPSS

Процентиль: 87%
0.03612
Низкий

2.6 Low

CVSS2

Уязвимость CVE-2007-1558