Vulnerabilities > CVE-2009-3942 - Cryptographic Issues vulnerability in Martin Lambers Msmtp

047910
CVSS 6.4 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
martin-lambers
CWE-310
nessus

Summary

Martin Lambers msmtp before 1.4.19, when OpenSSL is used, does not properly handle a '\0' character in a domain name in the (1) subject's Common Name or (2) Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.

Common Weakness Enumeration (CWE)

Common Attack Pattern Enumeration and Classification (CAPEC)

  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.

Nessus

  • NASL familySuSE Local Security Checks
    NASL idSUSE_11_2_MSMTP-100117.NASL
    descriptionmsmtp did not properly handle a
    last seen2020-06-01
    modified2020-06-02
    plugin id44091
    published2010-01-20
    reporterThis script is Copyright (C) 2010-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/44091
    titleopenSUSE Security Update : msmtp (msmtp-1813)
  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-201206-34.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-201206-34 (msmtp: X.509 NULL spoofing vulnerability) A vulnerability have been discovered in msmtp. Please review the CVE identifier referenced below for details. Impact : A remote attacker might employ a specially crafted certificate to conduct man-in-the-middle attacks on SSL connections made using msmtp. Workaround : There is no known workaround at this time.
    last seen2020-06-01
    modified2020-06-02
    plugin id59707
    published2012-06-26
    reporterThis script is Copyright (C) 2012-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/59707
    titleGLSA-201206-34 : msmtp: X.509 NULL spoofing vulnerability
  • NASL familySuSE Local Security Checks
    NASL idSUSE_11_1_MSMTP-100118.NASL
    descriptionmsmtp did not properly handle a
    last seen2020-06-01
    modified2020-06-02
    plugin id44089
    published2010-01-20
    reporterThis script is Copyright (C) 2010-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/44089
    titleopenSUSE Security Update : msmtp (msmtp-1813)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_11_0_MSMTP-100118.NASL
    descriptionmsmtp did not properly handle a
    last seen2020-06-01
    modified2020-06-02
    plugin id44087
    published2010-01-20
    reporterThis script is Copyright (C) 2010-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/44087
    titleopenSUSE Security Update : msmtp (msmtp-1813)