Debian DSA-3091-1 : getmail4 - security update

medium Nessus Plugin ID 79805

Synopsis

The remote Debian host is missing a security-related update.

Description

Several vulnerabilities have been discovered in getmail4, a mail retriever with support for POP3, IMAP4 and SDPS, that could allow man-in-the-middle attacks.

- CVE-2014-7273 The IMAP-over-SSL implementation in getmail 4.0.0 through 4.43.0 does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof IMAP servers and obtain sensitive information via a crafted certificate.

- CVE-2014-7274 The IMAP-over-SSL implementation in getmail 4.44.0 does not verify that the server hostname matches a domain name in the subject's Common Name (CN) field of the X.509 certificate, which allows man-in-the-middle attackers to spoof IMAP servers and obtain sensitive information via a crafted certificate from a recognized Certification Authority.

- CVE-2014-7275 The POP3-over-SSL implementation in getmail 4.0.0 through 4.44.0 does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof POP3 servers and obtain sensitive information via a crafted certificate.

Solution

Upgrade the getmail4 packages.

For the stable distribution (wheezy), these problems have been fixed in version 4.46.0-1~deb7u1.

For the upcoming stable distribution (jessie), these problems have been fixed in version 4.46.0-1.

See Also

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=766670

https://security-tracker.debian.org/tracker/CVE-2014-7273

https://security-tracker.debian.org/tracker/CVE-2014-7274

https://security-tracker.debian.org/tracker/CVE-2014-7275

https://packages.debian.org/source/wheezy/getmail4

https://www.debian.org/security/2014/dsa-3091

Plugin Details

Severity: Medium

ID: 79805

File Name: debian_DSA-3091.nasl

Version: 1.6

Type: local

Agent: unix

Published: 12/9/2014

Updated: 1/11/2021

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.8

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:getmail4, cpe:/o:debian:debian_linux:7.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Ease: No known exploits are available

Patch Publication Date: 12/7/2014

Reference Information

CVE: CVE-2014-7273, CVE-2014-7274, CVE-2014-7275

BID: 70280, 70281, 70282

DSA: 3091