Input validation error in fetchmail (Alpine package)



| Updated: 2022-11-08
Risk Medium
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2011-3389
CWE-ID CWE-20
Exploitation vector Network
Public exploit Public exploit code for vulnerability #1 is available.
Vulnerable software
fetchmail (Alpine package)
Operating systems & Components / Operating system package or component

Vendor Alpine Linux Development Team

Security Bulletin

This security bulletin contains one medium risk vulnerability.

1) Input validation error

EUVDB-ID: #VU33691

Risk: Medium

CVSSv4.0: 6.9 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:A/U:Green]

CVE-ID: CVE-2011-3389

CWE-ID: CWE-20 - Improper input validation

Exploit availability: Yes

Description

The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.

The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a "BEAST" attack.

Mitigation

Install update from vendor's website.

Vulnerable software versions

fetchmail (Alpine package): 6.3.18-r0 - 6.3.21-r1

CPE2.3 External links

https://git.alpinelinux.org/aports/commit/?id=3d01b184506a3714f0202b4020148fd2de3f0f64
https://git.alpinelinux.org/aports/commit/?id=b076929b3824eea308b0129e459fc69ca15e4eb4
https://git.alpinelinux.org/aports/commit/?id=e6d18144dbf1e37f8aec69ae51cc07571b38cf18
https://git.alpinelinux.org/aports/commit/?id=6e5c47e2e08e17d1a42d9f3865eec2d6a0a941fd
https://git.alpinelinux.org/aports/commit/?id=76b7efcfd70b565bb63160dca4268c99f6d0770c
https://git.alpinelinux.org/aports/commit/?id=8fdf25f4310c5206bb1aac5d052d642b65c7bced
https://git.alpinelinux.org/aports/commit/?id=c1e754dce2c72cab5a8db18929109f882b73a6e3
https://git.alpinelinux.org/aports/commit/?id=5f9a8b27d38d5fd20f3a0c28812129376475de8b
https://git.alpinelinux.org/aports/commit/?id=6f50fc870d684eb2247b563a2719b4b444918778


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###