FreeBSD : Python -- smtplib StartTLS stripping vulnerability (8d5368ef-40fe-11e6-b2ec-b499baebfeaf)

This script is Copyright (C) 2016 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing one or more security-related
updates.

Description :

Red Hat reports :

A vulnerability in smtplib allowing MITM attacker to perform a
startTLS stripping attack. smtplib does not seem to raise an exception
when the remote end (smtp server) is capable of negotiating starttls
but fails to respond with 220 (ok) to an explicit call of
SMTP.starttls(). This may allow a malicious MITM to perform a startTLS
stripping attack if the client code does not explicitly check the
response code for startTLS.

See also :

https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-0772
http://www.nessus.org/u?b53189ca

Solution :

Update the affected packages.

Risk factor :

Medium / CVSS Base Score : 5.8
(CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 91931 ()

Bugtraq ID:

CVE ID: CVE-2016-0772

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now