Vulnerability Name:

CVE-2004-2642 (CCN-17692)

Assigned:2004-10-12
Published:2004-10-12
Updated:2017-07-20
Summary:Yeemp 0.9.9 and earlier does not properly encrypt inbound files, which allows remote attackers to spoof the identity of the sender.
CVSS v3 Severity:6.5 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:6.4 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): None
6.4 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-Other
Vulnerability Consequences:Bypass Security
References:Source: MITRE
Type: CNA
CVE-2004-2642

Source: CCN
Type: Deekoo Security Advisory - Yeemp
Yeemp Encrypted Messaging Program

Source: CONFIRM
Type: Patch
http://deekoo.net/technocracy/yeemp/#advisory

Source: CONFIRM
Type: UNKNOWN
http://deekoo.net/technocracy/yeemp/changes.html

Source: CCN
Type: SA12795
Yeemp Spoofed Sender File Transfer Vulnerability

Source: SECUNIA
Type: Patch, Vendor Advisory
12795

Source: CCN
Type: SECTRACK ID: 1011586
Yeemp Encryption Error Lets Remote Users Send Files With Spoofed Identity

Source: SECTRACK
Type: Patch
1011586

Source: OSVDB
Type: Patch
10671

Source: CCN
Type: OSVDB ID: 10671
Yeemp Unencrypted File Send Arbitrary Code Execution

Source: CCN
Type: OSVDB ID: 10683
yeemp Unencrypted Key Exchange Spoofing Weakness

Source: BID
Type: Patch
11353

Source: CCN
Type: BID-11353
Nathaniel Bray Yeemp File Transfer Public Key Verification Bypass Vulnerability

Source: XF
Type: UNKNOWN
yeemp-message-spoofing(17692)

Source: XF
Type: UNKNOWN
yeemp-message-spoofing(17692)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:nathaniel_bray:yeemp:0.5.1:*:*:*:*:*:*:*
  • OR cpe:/a:nathaniel_bray:yeemp:0.6:*:*:*:*:*:*:*
  • OR cpe:/a:nathaniel_bray:yeemp:0.6.1:*:*:*:*:*:*:*
  • OR cpe:/a:nathaniel_bray:yeemp:0.6.2:*:*:*:*:*:*:*
  • OR cpe:/a:nathaniel_bray:yeemp:0.7:*:*:*:*:*:*:*
  • OR cpe:/a:nathaniel_bray:yeemp:0.7.1:*:*:*:*:*:*:*
  • OR cpe:/a:nathaniel_bray:yeemp:0.7.2:*:*:*:*:*:*:*
  • OR cpe:/a:nathaniel_bray:yeemp:0.8:*:*:*:*:*:*:*
  • OR cpe:/a:nathaniel_bray:yeemp:0.9:*:*:*:*:*:*:*
  • OR cpe:/a:nathaniel_bray:yeemp:0.9.1:*:*:*:*:*:*:*
  • OR cpe:/a:nathaniel_bray:yeemp:0.9.2:*:*:*:*:*:*:*
  • OR cpe:/a:nathaniel_bray:yeemp:0.9.2pre2:*:*:*:*:*:*:*
  • OR cpe:/a:nathaniel_bray:yeemp:0.9.4:*:*:*:*:*:*:*
  • OR cpe:/a:nathaniel_bray:yeemp:0.9.6:*:*:*:*:*:*:*
  • OR cpe:/a:nathaniel_bray:yeemp:0.9.7:*:*:*:*:*:*:*
  • OR cpe:/a:nathaniel_bray:yeemp:0.9.8:*:*:*:*:*:*:*
  • OR cpe:/a:nathaniel_bray:yeemp:0.9.9:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:freebsd:freebsd:*:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    nathaniel_bray yeemp 0.5.1
    nathaniel_bray yeemp 0.6
    nathaniel_bray yeemp 0.6.1
    nathaniel_bray yeemp 0.6.2
    nathaniel_bray yeemp 0.7
    nathaniel_bray yeemp 0.7.1
    nathaniel_bray yeemp 0.7.2
    nathaniel_bray yeemp 0.8
    nathaniel_bray yeemp 0.9
    nathaniel_bray yeemp 0.9.1
    nathaniel_bray yeemp 0.9.2
    nathaniel_bray yeemp 0.9.2pre2
    nathaniel_bray yeemp 0.9.4
    nathaniel_bray yeemp 0.9.6
    nathaniel_bray yeemp 0.9.7
    nathaniel_bray yeemp 0.9.8
    nathaniel_bray yeemp 0.9.9
    freebsd freebsd *