Vulnerabilities > CVE-2014-2576 - Cryptographic Issues vulnerability in multiple products
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
plugins/rssyl/feed.c in Claws Mail before 3.10.0 disables the CURLOPT_SSL_VERIFYHOST check for CN or SAN host name fields, which makes it easier for remote attackers to spoof servers and conduct man-in-the-middle (MITM) attacks.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Common Attack Pattern Enumeration and Classification (CAPEC)
- Signature Spoofing by Key Recreation An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
Nessus
NASL family | SuSE Local Security Checks |
NASL id | OPENSUSE-2014-587.NASL |
description | - Update to version 3.10.1(bnc#870858) : + Add an account preference to allow automatically accepting unknown and changed SSL certificates, if they |
last seen | 2020-06-05 |
modified | 2014-10-15 |
plugin id | 78452 |
published | 2014-10-15 |
reporter | This script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/78452 |
title | openSUSE Security Update : claws-mail (openSUSE-SU-2014:1291-1) |
References
- http://lists.opensuse.org/opensuse-updates/2014-10/msg00015.html
- http://lists.opensuse.org/opensuse-updates/2014-10/msg00015.html
- http://seclists.org/oss-sec/2014/q1/636
- http://seclists.org/oss-sec/2014/q1/636
- http://secunia.com/advisories/60422
- http://secunia.com/advisories/60422
- http://sourceforge.net/p/claws-mail/news/2014/05/claws-mail-3100-unleashed/
- http://sourceforge.net/p/claws-mail/news/2014/05/claws-mail-3100-unleashed/
- http://www.thewildbeast.co.uk/claws-mail/bugzilla/show_bug.cgi?id=3106
- http://www.thewildbeast.co.uk/claws-mail/bugzilla/show_bug.cgi?id=3106