Vulnerability Name:

CVE-2010-0463 (CCN-56052)

Assigned:2010-01-23
Published:2010-01-23
Updated:2017-08-17
Summary:Horde IMP 4.3.6 and earlier does not request that the web browser avoid DNS prefetching of domain names contained in e-mail messages, which makes it easier for remote attackers to determine the network location of the webmail user by logging DNS requests.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): None
Availibility (A): None
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N)
4.0 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:U/RC:UR)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N)
4.0 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:U/RC:UR)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
Vulnerability Type:CWE-200
Vulnerability Consequences:Obtain Information
References:Source: CONFIRM
Type: Patch
http://bugs.horde.org/ticket/8836

Source: MITRE
Type: CNA
CVE-2010-0463

Source: CCN
Type: Horde Web site
IMP Webmail Client

Source: CCN
Type: OSVDB ID: 62105
Horde IMP E-mail Message DNS Prefetching Weakness

Source: XF
Type: UNKNOWN
horde-dns-info-disclosure(56052)

Source: XF
Type: UNKNOWN
horde-dns-info-disclosure(56052)

Source: MISC
Type: UNKNOWN
https://secure.grepular.com/DNS_Prefetch_Exposure_on_Thunderbird_and_Webmail

Vulnerable Configuration:Configuration 1:
  • cpe:/a:horde:imp:2.0:*:*:*:*:*:*:*
  • OR cpe:/a:horde:imp:2.2:*:*:*:*:*:*:*
  • OR cpe:/a:horde:imp:2.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:horde:imp:2.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:horde:imp:2.2.3:*:*:*:*:*:*:*
  • OR cpe:/a:horde:imp:2.2.4:*:*:*:*:*:*:*
  • OR cpe:/a:horde:imp:2.2.5:*:*:*:*:*:*:*
  • OR cpe:/a:horde:imp:2.2.6:*:*:*:*:*:*:*
  • OR cpe:/a:horde:imp:2.2.7:*:*:*:*:*:*:*
  • OR cpe:/a:horde:imp:2.2.8:*:*:*:*:*:*:*
  • OR cpe:/a:horde:imp:2.3:*:*:*:*:*:*:*
  • OR cpe:/a:horde:imp:3.0:*:*:*:*:*:*:*
  • OR cpe:/a:horde:imp:3.1:*:*:*:*:*:*:*
  • OR cpe:/a:horde:imp:3.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:horde:imp:3.2:*:*:*:*:*:*:*
  • OR cpe:/a:horde:imp:3.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:horde:imp:3.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:horde:imp:3.2.3:*:*:*:*:*:*:*
  • OR cpe:/a:horde:imp:3.2.4:*:*:*:*:*:*:*
  • OR cpe:/a:horde:imp:3.2.5:*:*:*:*:*:*:*
  • OR cpe:/a:horde:imp:3.2.6:*:*:*:*:*:*:*
  • OR cpe:/a:horde:imp:3.2.7:*:*:*:*:*:*:*
  • OR cpe:/a:horde:imp:3.2.7:rc1:*:*:*:*:*:*
  • OR cpe:/a:horde:imp:4.0:*:*:*:*:*:*:*
  • OR cpe:/a:horde:imp:4.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:horde:imp:4.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:horde:imp:4.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:horde:imp:4.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:horde:imp:4.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:horde:imp:4.1.5:*:*:*:*:*:*:*
  • OR cpe:/a:horde:imp:4.1.6:*:*:*:*:*:*:*
  • OR cpe:/a:horde:imp:4.2:*:*:*:*:*:*:*
  • OR cpe:/a:horde:imp:4.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:horde:imp:4.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:horde:imp:4.3:*:*:*:*:*:*:*
  • OR cpe:/a:horde:imp:4.3.1:*:*:*:*:*:*:*
  • OR cpe:/a:horde:imp:4.3.2:*:*:*:*:*:*:*
  • OR cpe:/a:horde:imp:4.3.3:*:*:*:*:*:*:*
  • OR cpe:/a:horde:imp:4.3.4:*:*:*:*:*:*:*
  • OR cpe:/a:horde:imp:4.3.5:*:*:*:*:*:*:*
  • OR cpe:/a:horde:imp:*:*:*:*:*:*:*:* (Version <= 4.3.6)

  • Configuration CCN 1:
  • cpe:/a:horde:imp:4.3.2:*:*:*:*:*:*:*
  • OR cpe:/a:horde:imp:4.0:*:*:*:*:*:*:*
  • OR cpe:/a:horde:imp:4.3.6:*:*:*:*:*:*:*
  • OR cpe:/a:horde:imp:4.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:horde:imp:4.2:*:*:*:*:*:*:*
  • OR cpe:/a:horde:imp:4.3:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:com.ubuntu.precise:def:20100463000
    V
    CVE-2010-0463 on Ubuntu 12.04 LTS (precise) - negligible.
    2010-01-29
    BACK
    horde imp 2.0
    horde imp 2.2
    horde imp 2.2.1
    horde imp 2.2.2
    horde imp 2.2.3
    horde imp 2.2.4
    horde imp 2.2.5
    horde imp 2.2.6
    horde imp 2.2.7
    horde imp 2.2.8
    horde imp 2.3
    horde imp 3.0
    horde imp 3.1
    horde imp 3.1.2
    horde imp 3.2
    horde imp 3.2.1
    horde imp 3.2.2
    horde imp 3.2.3
    horde imp 3.2.4
    horde imp 3.2.5
    horde imp 3.2.6
    horde imp 3.2.7
    horde imp 3.2.7 rc1
    horde imp 4.0
    horde imp 4.0.1
    horde imp 4.0.2
    horde imp 4.0.3
    horde imp 4.0.4
    horde imp 4.1.3
    horde imp 4.1.5
    horde imp 4.1.6
    horde imp 4.2
    horde imp 4.2.1
    horde imp 4.2.2
    horde imp 4.3
    horde imp 4.3.1
    horde imp 4.3.2
    horde imp 4.3.3
    horde imp 4.3.4
    horde imp 4.3.5
    horde imp *
    horde imp 4.3.2
    horde imp 4.0
    horde imp 4.3.6
    horde imp 4.1.3
    horde imp 4.2
    horde imp 4.3