FreeBSD : fetchmail -- insecure APOP authentication (f1c4d133-e6d3-11db-99ea-0060084a00e5)

Low Nessus Plugin ID 25018

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

Matthias Andree reports :

The POP3 standard, currently RFC-1939, has specified an optional, MD5-based authentication scheme called 'APOP' which no longer should be considered secure.

Additionally, fetchmail's POP3 client implementation has been validating the APOP challenge too lightly and accepted random garbage as a POP3 server's APOP challenge. This made it easier than necessary for man-in-the-middle attackers to retrieve by several probing and guessing the first three characters of the APOP secret, bringing brute forcing the remaining characters well within reach.

Solution

Update the affected package.

See Also

http://www.fetchmail.info/fetchmail-SA-2007-01.txt

http://www.nessus.org/u?7bbfca17

Plugin Details

Severity: Low

ID: 25018

File Name: freebsd_pkg_f1c4d133e6d311db99ea0060084a00e5.nasl

Version: 1.12

Type: local

Published: 2007/04/10

Updated: 2019/08/02

Dependencies: 12634

Risk Information

Risk Factor: Low

CVSS v2.0

Base Score: 2.6

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:N/A:N

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:fetchmail, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2007/04/09

Vulnerability Publication Date: 2007/04/06

Reference Information

CVE: CVE-2007-1558