Vulnerability Name: | CVE-2011-1429 (CCN-66015) | ||||||||||||||||||||
Assigned: | 2011-03-08 | ||||||||||||||||||||
Published: | 2011-03-08 | ||||||||||||||||||||
Updated: | 2017-08-17 | ||||||||||||||||||||
Summary: | Mutt does not verify that the smtps server hostname matches the domain name of the subject of an X.509 certificate, which allows man-in-the-middle attackers to spoof an SSL SMTP server via an arbitrary certificate, a different vulnerability than CVE-2009-3766. | ||||||||||||||||||||
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
| ||||||||||||||||||||
CVSS v2 Severity: | 5.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:N) 4.4 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:N/E:U/RL:W/RC:UR)
3.3 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N/E:U/RL:W/RC:UR)
3.3 Low (REDHAT Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N/E:U/RL:W/RC:UR)
| ||||||||||||||||||||
Vulnerability Type: | CWE-20 | ||||||||||||||||||||
Vulnerability Consequences: | Other | ||||||||||||||||||||
References: | Source: CCN Type: Full-Disclosure Mailing List, Mon Mar 07 2011 Mutt: failure to check server certificate in SMTP TLS connection Source: MITRE Type: CNA CVE-2011-1429 Source: FEDORA Type: UNKNOWN FEDORA-2011-7739 Source: FEDORA Type: UNKNOWN FEDORA-2011-7751 Source: FEDORA Type: UNKNOWN FEDORA-2011-7756 Source: CCN Type: RHSA-2011-0959 Moderate: mutt security update Source: FULLDISC Type: Patch 20110308 Mutt: failure to check server certificate in SMTP TLS connection Source: SECUNIA Type: UNKNOWN 44937 Source: SREASON Type: UNKNOWN 8143 Source: CCN Type: Mutt Web site The Mutt E-Mail Client Source: REDHAT Type: UNKNOWN RHSA-2011:0959 Source: BID Type: UNKNOWN 46803 Source: CCN Type: BID-46803 Mutt SMTP TLS Certificate Security Bypass Vulnerability Source: XF Type: UNKNOWN mutt-smtptls-weak-security(66015) Source: XF Type: UNKNOWN mutt-smtptls-weak-security(66015) | ||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration RedHat 1: Configuration RedHat 2: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||
| |||||||||||||||||||||
BACK |