SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (Generic)  >   Mozilla Seamonkey Vendors:   fetchmail.berlios.de
(Mozilla Issues Fix for SeaMonkey) Fetchmail APOP Authentication Weakness May Let Remote Users Determine the APOP Secret
SecurityTracker Alert ID:  1018158
SecurityTracker URL:  http://securitytracker.com/id/1018158
CVE Reference:   CVE-2007-1558   (Links to External Site)
Date:  May 31 2007
Impact:   Disclosure of authentication information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 1.0 prior to 1.0.9, 1.1 prior to 1.1.2
Description:   A vulnerability was reported in Fetchmail. A remote user may be able to determine the APOP secret. Mozilla SeaMonkey is affected.

A remote server can send arbitrary text as an APOP challenge in response to a fetchmail POP3 client request. As a result, this may facilitate a man-in-the-middle attack to determine the APOP secret.

The vendor credits Gatan Leurent with reporting this vulnerability.

Impact:   A remote user may be able to conduct a man-in-the-middle attack to determine the APOP secret.
Solution:   Mozilla has issued a fixed version (1.0.9, 1.1.2) for SeaMonkey, which is affected by this APOP vulnerability.

The Mozilla advisory is available at:

http://www.mozilla.org/security/announce/2007/mfsa2007-15.html

Cause:   Authentication error
Underlying OS:   Linux (Any), UNIX (Any), Windows (Any)

Message History:   This archive entry is a follow-up to the message listed below.
May 7 2007 Fetchmail APOP Authentication Weakness May Let Remote Users Determine the APOP Secret



 Source Message Contents

Date:  Wed, 30 May 2007 22:41:56 -0400
Subject:  Mozilla SeaMonkey



http://www.mozilla.org/security/announce/2007/mfsa2007-15.html

CVE-2007-1558
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2014, SecurityGlobal.net LLC