Vulnerability Name: | CVE-2014-7274 (CCN-96895) | ||||||||||||||||||||||||||||
Assigned: | 2014-10-07 | ||||||||||||||||||||||||||||
Published: | 2014-10-07 | ||||||||||||||||||||||||||||
Updated: | 2014-12-22 | ||||||||||||||||||||||||||||
Summary: | The IMAP-over-SSL implementation in getmail 4.44.0 does not verify that the server hostname matches a domain name in the subject's Common Name (CN) field of the X.509 certificate, which allows man-in-the-middle attackers to spoof IMAP servers and obtain sensitive information via a crafted certificate from a recognized Certification Authority. | ||||||||||||||||||||||||||||
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
| ||||||||||||||||||||||||||||
CVSS v2 Severity: | 5.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:N) 4.3 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:N/E:U/RL:OF/RC:C)
3.2 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C)
| ||||||||||||||||||||||||||||
Vulnerability Type: | CWE-310 | ||||||||||||||||||||||||||||
Vulnerability Consequences: | Bypass Security | ||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2014-7274 Source: SUSE Type: UNKNOWN openSUSE-SU-2014:1315 Source: MLIST Type: UNKNOWN [oss-security] 20141007 Re: CVE Request(s): Getmail 4 Source: CCN Type: Pyropus Web site Getmail Source: CONFIRM Type: UNKNOWN http://pyropus.ca/software/getmail/CHANGELOG Source: CCN Type: oss-security Mailing List, Tue, 7 Oct 2014 13:45:25 -0400 (EDT) Re: CVE Request(s): Getmail 4 Source: SECUNIA Type: UNKNOWN 61229 Source: DEBIAN Type: UNKNOWN DSA-3091 Source: CCN Type: BID-70281 Getmail CVE-2014-7274 SSL Certificate Security Bypass Vulnerability Source: CCN Type: Red Hat Bugzilla Bug 1149728 (CVE-2014-7273, CVE-2014-7274, CVE-2014-7275) CVE-2014-7273 CVE-2014-7274 CVE-2014-7275 getmail: various flaws related to IMAP4-over-SSL certificate validation Source: XF Type: UNKNOWN getmail-cve20147274-sec-bypass(96895) | ||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1:![]() | ||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||
BACK |