Upstream information

CVE-2006-5867 at MITRE

Description

fetchmail before 6.3.6-rc4 does not properly enforce TLS and may transmit cleartext passwords over unsecured links if certain circumstances occur, which allows remote attackers to obtain sensitive information via man-in-the-middle (MITM) attacks.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having important severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 7.8
Vector AV:N/AC:L/Au:N/C:C/I:N/A:N
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact Complete
Integrity Impact None
Availability Impact None
SUSE Bugzilla entry: 223507 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SUSE Linux Enterprise Server 11 SP1
  • fetchmail >= 6.3.8.90-13.16.1
  • fetchmailconf >= 6.3.8.90-13.16.1
Patchnames:
SUSE Linux Enterprise Server 11 SP1 GA fetchmail-6.3.8.90-13.16.1
SUSE Linux Enterprise Server 11 SP2
  • fetchmail >= 6.3.8.90-13.20.19.1
  • fetchmailconf >= 6.3.8.90-13.20.19.1
Patchnames:
SUSE Linux Enterprise Server 11 SP2 GA fetchmail-6.3.8.90-13.20.19.1
SUSE Linux Enterprise Server 11 SP3
  • fetchmail >= 6.3.8.90-13.20.19.1
  • fetchmailconf >= 6.3.8.90-13.20.19.1
Patchnames:
SUSE Linux Enterprise Server 11 SP3 GA fetchmail-6.3.8.90-13.20.19.1
SUSE Linux Enterprise Server 11 SP4
  • fetchmail >= 6.3.8.90-13.20.19.1
  • fetchmailconf >= 6.3.8.90-13.20.19.1
Patchnames:
SUSE Linux Enterprise Server 11 SP4 GA fetchmail-6.3.8.90-13.20.19.1
openSUSE Tumbleweed
  • fetchmail >= 6.4.21-2.1
  • fetchmailconf >= 6.4.21-2.1
Patchnames:
openSUSE Tumbleweed GA fetchmail-6.4.21-2.1


SUSE Timeline for this CVE

CVE page created: Fri Jun 28 05:16:58 2013
CVE page last modified: Fri Dec 8 16:18:28 2023