FreeBSD : Python -- smtplib StartTLS stripping vulnerability (8d5368ef-40fe-11e6-b2ec-b499baebfeaf)

Medium Nessus Plugin ID 91931

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

Red Hat reports :

A vulnerability in smtplib allowing MITM attacker to perform a startTLS stripping attack. smtplib does not seem to raise an exception when the remote end (smtp server) is capable of negotiating starttls but fails to respond with 220 (ok) to an explicit call of SMTP.starttls(). This may allow a malicious MITM to perform a startTLS stripping attack if the client code does not explicitly check the response code for startTLS.

Solution

Update the affected packages.

See Also

https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-0772

http://www.nessus.org/u?630e24a8

Plugin Details

Severity: Medium

ID: 91931

File Name: freebsd_pkg_8d5368ef40fe11e6b2ecb499baebfeaf.nasl

Version: 2.6

Type: local

Published: 2016/07/05

Updated: 2019/04/11

Dependencies: 12634

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 5.8

Temporal Score: 4.5

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N

Temporal Vector: CVSS2#E:POC/RL:OF/RC:C

CVSS v3.0

Base Score: 6.5

Temporal Score: 5.9

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:python27, p-cpe:/a:freebsd:freebsd:python33, p-cpe:/a:freebsd:freebsd:python34, p-cpe:/a:freebsd:freebsd:python35, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2016/07/03

Vulnerability Publication Date: 2016/06/14

Reference Information

CVE: CVE-2016-0772