openSUSE Security Update : getmail (openSUSE-SU-2014:1315-1)

medium Nessus Plugin ID 78635

Synopsis

The remote openSUSE host is missing a security update.

Description

- getmail 4.46.0 [bnc#900217] This release fixes several similar vulnerabilities that could allow a man-in-the-middle attacker to read encrypted traffic due to pack of certificate verification against the hostname.

- fix --idle checking Python version incorrectly, resulting in incorrect warning about running with Python < 2.5

- add missing support for SSL certificate checking in POP3 which broke POP retrieval in v4.45.0 [CVE-2014-7275]

- includes changes from 4.45.0 :

- perform hostname-vs-certificate matching of SSL certificate if validating the certifcate [CVE-2014-7274]

- fix missing plaintext versions of documentation

- includes changes from 4.44.0 :

- add extended SSL options for IMAP retrievers, allowing certificate verification and other features [CVE-2014-7273]

- fix missing plaintext versions of documentation

- fix 'Header instance has no attribute 'strip'' error which cropped up in some configurations

Solution

Update the affected getmail package.

See Also

https://bugzilla.opensuse.org/show_bug.cgi?id=900217

https://lists.opensuse.org/opensuse-updates/2014-10/msg00029.html

Plugin Details

Severity: Medium

ID: 78635

File Name: openSUSE-2014-598.nasl

Version: 1.4

Type: local

Agent: unix

Published: 10/23/2014

Updated: 1/19/2021

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.8

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:getmail, cpe:/o:novell:opensuse:12.3, cpe:/o:novell:opensuse:13.1

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list

Patch Publication Date: 10/14/2014

Reference Information

CVE: CVE-2014-7273, CVE-2014-7274, CVE-2014-7275