FreeBSD : fetchmail -- insecure APOP authentication (f1c4d133-e6d3-11db-99ea-0060084a00e5)

Low Nessus Plugin ID 25018


The remote FreeBSD host is missing a security-related update.


Matthias Andree reports :

The POP3 standard, currently RFC-1939, has specified an optional, MD5-based authentication scheme called 'APOP' which no longer should be considered secure.

Additionally, fetchmail's POP3 client implementation has been validating the APOP challenge too lightly and accepted random garbage as a POP3 server's APOP challenge. This made it easier than necessary for man-in-the-middle attackers to retrieve by several probing and guessing the first three characters of the APOP secret, bringing brute forcing the remaining characters well within reach.


Update the affected package.

See Also

Plugin Details

Severity: Low

ID: 25018

File Name: freebsd_pkg_f1c4d133e6d311db99ea0060084a00e5.nasl

Version: $Revision: 1.10 $

Type: local

Published: 2007/04/10

Modified: 2013/06/22

Dependencies: 12634

Risk Information

Risk Factor: Low


Base Score: 2.6

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:N/A:N

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:fetchmail, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2007/04/09

Vulnerability Publication Date: 2007/04/06

Reference Information

CVE: CVE-2007-1558