FreeBSD : Python -- smtplib StartTLS stripping vulnerability (8d5368ef-40fe-11e6-b2ec-b499baebfeaf)

medium Nessus Plugin ID 91931

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

Red Hat reports :

A vulnerability in smtplib allowing MITM attacker to perform a startTLS stripping attack. smtplib does not seem to raise an exception when the remote end (smtp server) is capable of negotiating starttls but fails to respond with 220 (ok) to an explicit call of SMTP.starttls(). This may allow a malicious MITM to perform a startTLS stripping attack if the client code does not explicitly check the response code for startTLS.

Solution

Update the affected packages.

See Also

https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-0772

http://www.nessus.org/u?630e24a8

Plugin Details

Severity: Medium

ID: 91931

File Name: freebsd_pkg_8d5368ef40fe11e6b2ecb499baebfeaf.nasl

Version: 2.7

Type: local

Published: 7/5/2016

Updated: 1/4/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.0

CVSS v2

Risk Factor: Medium

Base Score: 5.8

Temporal Score: 4.5

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N

CVSS v3

Risk Factor: Medium

Base Score: 6.5

Temporal Score: 5.9

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:python27, p-cpe:/a:freebsd:freebsd:python33, p-cpe:/a:freebsd:freebsd:python34, p-cpe:/a:freebsd:freebsd:python35, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 7/3/2016

Vulnerability Publication Date: 6/14/2016

Reference Information

CVE: CVE-2016-0772