camel/providers/imapx/camel-imapx-server.c in the IMAPx component in GNOME evolution-data-server before 3.21.2 proceeds with cleartext data containing a password if the client wishes to use STARTTLS but the server will not use STARTTLS, which makes it easier for remote attackers to obtain sensitive information by sniffing the network. The server code was intended to report an error and not proceed, but the code was written incorrectly.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-1443-1 evolution-data-server security update
EUVD EUVD EUVD-2016-1725 camel/providers/imapx/camel-imapx-server.c in the IMAPx component in GNOME evolution-data-server before 3.21.2 proceeds with cleartext data containing a password if the client wishes to use STARTTLS but the server will not use STARTTLS, which makes it easier for remote attackers to obtain sensitive information by sniffing the network. The server code was intended to report an error and not proceed, but the code was written incorrectly.
Ubuntu USN Ubuntu USN USN-3724-1 Evolution Data Server vulnerability
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-06T03:30:20.132Z

Reserved: 2018-07-19T00:00:00

Link: CVE-2016-10727

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-07-20T04:29:00.227

Modified: 2024-11-21T02:44:36.430

Link: CVE-2016-10727

cve-icon Redhat

Severity : Moderate

Publid Date: 2016-05-10T00:00:00Z

Links: CVE-2016-10727 - Bugzilla

cve-icon OpenCVE Enrichment

No data.