FreeBSD : fetchmail -- insecure APOP authentication (f1c4d133-e6d3-11db-99ea-0060084a00e5)

low Nessus Plugin ID 25018

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

Matthias Andree reports :

The POP3 standard, currently RFC-1939, has specified an optional, MD5-based authentication scheme called 'APOP' which no longer should be considered secure.

Additionally, fetchmail's POP3 client implementation has been validating the APOP challenge too lightly and accepted random garbage as a POP3 server's APOP challenge. This made it easier than necessary for man-in-the-middle attackers to retrieve by several probing and guessing the first three characters of the APOP secret, bringing brute forcing the remaining characters well within reach.

Solution

Update the affected package.

See Also

http://www.fetchmail.info/fetchmail-SA-2007-01.txt

http://www.nessus.org/u?7bbfca17

Plugin Details

Severity: Low

ID: 25018

File Name: freebsd_pkg_f1c4d133e6d311db99ea0060084a00e5.nasl

Version: 1.13

Type: local

Published: 4/10/2007

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Low

Base Score: 2.6

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:N/A:N

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:fetchmail, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 4/9/2007

Vulnerability Publication Date: 4/6/2007

Reference Information

CVE: CVE-2007-1558