Vulnerabilities > CVE-2014-2576 - Cryptographic Issues vulnerability in multiple products
Attack vector
NETWORK Attack complexity
MEDIUM Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL Summary
plugins/rssyl/feed.c in Claws Mail before 3.10.0 disables the CURLOPT_SSL_VERIFYHOST check for CN or SAN host name fields, which makes it easier for remote attackers to spoof servers and conduct man-in-the-middle (MITM) attacks.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Common Attack Pattern Enumeration and Classification (CAPEC)
- Signature Spoofing by Key Recreation An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
Nessus
NASL family | SuSE Local Security Checks |
NASL id | OPENSUSE-2014-587.NASL |
description | - Update to version 3.10.1(bnc#870858) : + Add an account preference to allow automatically accepting unknown and changed SSL certificates, if they |
last seen | 2020-06-05 |
modified | 2014-10-15 |
plugin id | 78452 |
published | 2014-10-15 |
reporter | This script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/78452 |
title | openSUSE Security Update : claws-mail (openSUSE-SU-2014:1291-1) |