The APOP protocol allows remote attackers to guess the first 3 characters of a password via man-in-the-middle (MITM) attacks that use crafted message IDs and MD5 collisions. NOTE: this design-level issue potentially affects all products that use APOP, including (1) Thunderbird 1.x before 1.5.0.12 and 2.x before 2.0.0.4, (2) Evolution, (3) mutt, (4) fetchmail before 6.3.8, (5) SeaMonkey 1.0.x before 1.0.9 and 1.1.x before 1.1.2, (6) Balsa 2.3.16 and earlier, (7) Mailfilter before 0.8.2, and possibly other products.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2007-04-16T22:00:00
Updated: 2024-08-07T12:59:08.708Z
Reserved: 2007-03-20T00:00:00
Link: CVE-2007-1558
Vulnrichment
No data.
NVD
Status : Modified
Published: 2007-04-16T22:19:00.000
Modified: 2024-11-21T00:28:37.107
Link: CVE-2007-1558
Redhat