Description
camel/providers/imapx/camel-imapx-server.c in the IMAPx component in GNOME evolution-data-server before 3.21.2 proceeds with cleartext data containing a password if the client wishes to use STARTTLS but the server will not use STARTTLS, which makes it easier for remote attackers to obtain sensitive information by sniffing the network. The server code was intended to report an error and not proceed, but the code was written incorrectly.
Published: 2018-07-20
Score: 9.8 Critical
EPSS: 1.0% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-1443-1 evolution-data-server security update
EUVD EUVD EUVD-2016-1725 camel/providers/imapx/camel-imapx-server.c in the IMAPx component in GNOME evolution-data-server before 3.21.2 proceeds with cleartext data containing a password if the client wishes to use STARTTLS but the server will not use STARTTLS, which makes it easier for remote attackers to obtain sensitive information by sniffing the network. The server code was intended to report an error and not proceed, but the code was written incorrectly.
Ubuntu USN Ubuntu USN USN-3724-1 Evolution Data Server vulnerability
History

No history.

Subscriptions

Canonical Ubuntu Linux
Gnome Evolution
Redhat Enterprise Linux
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-06T03:30:20.132Z

Reserved: 2018-07-19T00:00:00.000Z

Link: CVE-2016-10727

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-07-20T04:29:00.227

Modified: 2024-11-21T02:44:36.430

Link: CVE-2016-10727

cve-icon Redhat

Severity : Moderate

Publid Date: 2016-05-10T00:00:00Z

Links: CVE-2016-10727 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses