Description
The APOP protocol allows remote attackers to guess the first 3 characters of a password via man-in-the-middle (MITM) attacks that use crafted message IDs and MD5 collisions. NOTE: this design-level issue potentially affects all products that use APOP, including (1) Thunderbird 1.x before 1.5.0.12 and 2.x before 2.0.0.4, (2) Evolution, (3) mutt, (4) fetchmail before 6.3.8, (5) SeaMonkey 1.0.x before 1.0.9 and 1.1.x before 1.1.2, (6) Balsa 2.3.16 and earlier, (7) Mailfilter before 0.8.2, and possibly other products.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1300-1 | New iceape packages fix several vulnerabilities |
Debian DSA |
DSA-1305-1 | New icedove packages fix several vulnerabilities |
EUVD |
EUVD-2007-1552 | The APOP protocol allows remote attackers to guess the first 3 characters of a password via man-in-the-middle (MITM) attacks that use crafted message IDs and MD5 collisions. NOTE: this design-level issue potentially affects all products that use APOP, including (1) Thunderbird 1.x before 1.5.0.12 and 2.x before 2.0.0.4, (2) Evolution, (3) mutt, (4) fetchmail before 6.3.8, (5) SeaMonkey 1.0.x before 1.0.9 and 1.1.x before 1.1.2, (6) Balsa 2.3.16 and earlier, (7) Mailfilter before 0.8.2, and possibly other products. |
Ubuntu USN |
USN-469-1 | Thunderbird vulnerabilities |
Ubuntu USN |
USN-520-1 | fetchmail vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T12:59:08.708Z
Reserved: 2007-03-20T00:00:00.000Z
Link: CVE-2007-1558
No data.
Status : Deferred
Published: 2007-04-16T22:19:00.000
Modified: 2025-04-09T00:30:58.490
Link: CVE-2007-1558
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD
Ubuntu USN