CVE-2007-1558 (retired)

Priority
Description
The APOP protocol allows remote attackers to guess the first 3 characters
of a password via man-in-the-middle (MITM) attacks that use crafted message
IDs and MD5 collisions. NOTE: this design-level issue potentially affects
all products that use APOP, including (1) Thunderbird 1.x before 1.5.0.12
and 2.x before 2.0.0.4, (2) Evolution, (3) mutt, (4) fetchmail before
6.3.8, (5) SeaMonkey 1.0.x before 1.0.9 and 1.1.x before 1.1.2, (6) Balsa
2.3.16 and earlier, (7) Mailfilter before 0.8.2, and possibly other
products.
Notes
 kees> This is a partial attack, not really feasible, so it okay to ignore.
 jdstrand> possible fetchmail patch at http://www.securityfocus.com/archive/1/464477/30/0/threaded
Package
Upstream:needs-triage
Package
Upstream:needs-triage
Package
Source: im (LP Ubuntu Debian)
Upstream:needs-triage
Package
Source: mew (LP Ubuntu Debian)
Upstream:needs-triage
Package
Upstream:needs-triage
Package
Upstream:needs-triage
Package
Source: wl (LP Ubuntu Debian)
Upstream:needs-triage
Package
Upstream:needs-triage
More Information

Updated: 2019-03-26 11:39:48 UTC (commit ccdecfcf0fead22bd291e5f4ea745a46872dcb15)