FreeBSD : Python -- smtplib StartTLS stripping vulnerability (8d5368ef-40fe-11e6-b2ec-b499baebfeaf)

Medium Nessus Plugin ID 91931


The remote FreeBSD host is missing one or more security-related updates.


Red Hat reports :

A vulnerability in smtplib allowing MITM attacker to perform a startTLS stripping attack. smtplib does not seem to raise an exception when the remote end (smtp server) is capable of negotiating starttls but fails to respond with 220 (ok) to an explicit call of SMTP.starttls(). This may allow a malicious MITM to perform a startTLS stripping attack if the client code does not explicitly check the response code for startTLS.


Update the affected packages.

See Also

Plugin Details

Severity: Medium

ID: 91931

File Name: freebsd_pkg_8d5368ef40fe11e6b2ecb499baebfeaf.nasl

Version: $Revision: 2.4 $

Type: local

Published: 2016/07/05

Modified: 2016/10/19

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 5.8

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N


Base Score: 6.5

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:python27, p-cpe:/a:freebsd:freebsd:python33, p-cpe:/a:freebsd:freebsd:python34, p-cpe:/a:freebsd:freebsd:python35, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2016/07/03

Vulnerability Publication Date: 2016/06/14

Reference Information

CVE: CVE-2016-0772