Vulnerability Details : CVE-2006-5867
fetchmail before 6.3.6-rc4 does not properly enforce TLS and may transmit cleartext passwords over unsecured links if certain circumstances occur, which allows remote attackers to obtain sensitive information via man-in-the-middle (MITM) attacks.
Vulnerability category: Input validation
Products affected by CVE-2006-5867
- cpe:2.3:a:fetchmail:fetchmail:*:rc3:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:5.3.8:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:5.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:5.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:5.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:5.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:5.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:4.7.3:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:4.7.2:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:4.6.5:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:4.6.4:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:4.5.5:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:4.5.4:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:5.4.5:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:5.2.8:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:5.2.7:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:5.0.8:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:5.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:5.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:4.7.7:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:4.7.6:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:4.6.9:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:4.6.8:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:4.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:4.5.8:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:4.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:5.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:5.4.4:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:5.4.3:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:5.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:5.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:5.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:5.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:4.7.5:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:4.7.4:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:4.6.7:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:4.6.6:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:4.5.7:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:4.5.6:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:5.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:5.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:5.1.4:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:5.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:5.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:5.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:4.7.1:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:4.7.0:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:4.6.3:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:4.6.2:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:4.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:4.5.3:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:4.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:5.8.3:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:5.8.2:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:5.5.5:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:5.5.3:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:5.7.2:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:5.7.0:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:5.8.1:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:5.8:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:5.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:5.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:5.7.4:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:5.8.4:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:5.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:5.5.6:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:5.8.13:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:5.8.11:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:5.8.5:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:5.9.0:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:5.8.6:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:5.8.17:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:5.9.5:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:5.9.4:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:5.8.14:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:5.9.13:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:5.9.11:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:5.9.10:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:5.9.8:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:6.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:6.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:6.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:6.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:6.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:6.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:6.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:6.3.4:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:6.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:6.2.5:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:6.2.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:6.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:6.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:6.2.5.4:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:6.2.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc3:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc8:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:6.2.6:pre4:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc2:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc10:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc5:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:6.2.6:pre9:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:6.2.6:pre8:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:6.3.6:rc1:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc7:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:6.3.5:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:6.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:6.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc9:*:*:*:*:*:*
- cpe:2.3:a:fetchmail:fetchmail:6.2.9:rc4:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2006-5867
13.14%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 95 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2006-5867
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.8
|
HIGH | AV:N/AC:L/Au:N/C:C/I:N/A:N |
10.0
|
6.9
|
NIST |
CWE ids for CVE-2006-5867
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2006-5867
-
http://www.us-cert.gov/cas/techalerts/TA07-109A.html
Page Not Found | CISAUS Government Resource
-
http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.004.html
-
https://issues.rpath.com/browse/RPL-919
-
http://www.mandriva.com/security/advisories?name=MDKSA-2007:016
Mandriva
-
http://www.vupen.com/english/advisories/2007/1470
Webmail: access your OVH emails on ovhcloud.com | OVHcloud
-
http://www.ubuntu.com/usn/usn-405-1
USN-405-1: fetchmail vulnerability | Ubuntu security notices | Ubuntu
-
http://www.vupen.com/english/advisories/2007/0088
Site en construction
-
http://www.debian.org/security/2007/dsa-1259
[SECURITY] [DSA 1259-1] New fetchmail packages fix information disclosure
-
http://www.securityfocus.com/archive/1/460528/100/0/threaded
-
http://docs.info.apple.com/article.html?artnum=305391
-
http://security.gentoo.org/glsa/glsa-200701-13.xml
Fetchmail: Denial of Service and password disclosure (GLSA 200701-13) — Gentoo security
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10566
404 Not Found
-
http://www.securityfocus.com/bid/21903
Patch
-
http://www.novell.com/linux/security/advisories/2007_4_sr.html
404 Page Not Found | SUSE
-
http://securitytracker.com/id?1017478
Access Denied
-
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.517995
The Slackware Linux Project: Slackware Security Advisories
-
http://fedoranews.org/cms/node/2429
404 Not Found
-
http://www.securityfocus.com/archive/1/456115/100/0/threaded
-
http://www.redhat.com/support/errata/RHSA-2007-0018.html
Support
-
http://www.trustix.org/errata/2007/0007
Trustix | Empowering Trust and Security in the Digital Age
-
http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html
-
ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc
-
http://fetchmail.berlios.de/fetchmail-SA-2006-02.txt
Fetchmail - Kostenloser Open Source Mail Daemon
-
http://www.vupen.com/english/advisories/2007/0087
Site en construction
Jump to