summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--security/vuxml/vuln.xml36
1 files changed, 35 insertions, 1 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 07759c986cd3..4e17c2977341 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -51,6 +51,40 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="18ce9a90-f269-11e1-be53-080027ef73ec">
+ <topic>fetchmail -- chosen plaintext attack against SSL CBC initialization vectors</topic>
+ <affects>
+ <package>
+ <name>fetchmail</name>
+ <range><ge>6.3.9</ge><lt>6.3.22</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Matthias Andree reports:</p>
+ <blockquote cite="http://www.fetchmail.info/fetchmail-SA-2012-01.txt">
+ <p>Fetchmail version 6.3.9 enabled "all SSL workarounds" (SSL_OP_ALL) which
+ contains a switch to disable a countermeasure against certain attacks
+ against block ciphers that permit guessing the initialization vectors,
+ providing that an attacker can make the application (fetchmail) encrypt
+ some data for him -- which is not easily the case.
+
+ Stream ciphers (such as RC4) are unaffected.
+ </p><p>
+ Credits to Apple Product Security for reporting this.
+ </p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2011-3389</cvename>
+ </references>
+ <dates>
+ <discovery>2012-01-19</discovery>
+ <entry>2012-08-30</entry>
+ </dates>
+ </vuln>
+
<vuln vid="c906e0a4-efa6-11e1-8fbf-001b77d09812">
<topic>roundcube -- cross-site scripting in HTML email messages</topic>
<affects>
@@ -617,7 +651,7 @@ Note: Please add new entries to the beginning of this file.
<description>
<body xmlns="http://www.w3.org/1999/xhtml">
<p>Matthias Andree reports:</p>
- <blockquote cite="http://gitorious.org/fetchmail/fetchmail/blobs/raw/legacy_63/fetchmail-SA-2012-02.txt">
+ <blockquote cite="http://www.fetchmail.info/fetchmail-SA-2012-02.txt">
<p>With NTLM support enabled, fetchmail might mistake a server-side
error message during NTLM protocol exchange for protocol data,
leading to a SIGSEGV.</p>