Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2011-3389 |
CWE-ID | CWE-20 |
Exploitation vector | Network |
Public exploit | Public exploit code for vulnerability #1 is available. |
Vulnerable software |
fetchmail (Alpine package) Operating systems & Components / Operating system package or component |
Vendor | Alpine Linux Development Team |
Security Bulletin
This security bulletin contains one medium risk vulnerability.
EUVDB-ID: #VU33691
Risk: Medium
CVSSv4.0: 6.9 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:A/U:Green]
CVE-ID: CVE-2011-3389
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: Yes
DescriptionThe vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.
The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a "BEAST" attack.
MitigationInstall update from vendor's website.
Vulnerable software versionsfetchmail (Alpine package): 6.3.18-r0 - 6.3.21-r1
CPE2.3https://git.alpinelinux.org/aports/commit/?id=3d01b184506a3714f0202b4020148fd2de3f0f64
https://git.alpinelinux.org/aports/commit/?id=b076929b3824eea308b0129e459fc69ca15e4eb4
https://git.alpinelinux.org/aports/commit/?id=e6d18144dbf1e37f8aec69ae51cc07571b38cf18
https://git.alpinelinux.org/aports/commit/?id=6e5c47e2e08e17d1a42d9f3865eec2d6a0a941fd
https://git.alpinelinux.org/aports/commit/?id=76b7efcfd70b565bb63160dca4268c99f6d0770c
https://git.alpinelinux.org/aports/commit/?id=8fdf25f4310c5206bb1aac5d052d642b65c7bced
https://git.alpinelinux.org/aports/commit/?id=c1e754dce2c72cab5a8db18929109f882b73a6e3
https://git.alpinelinux.org/aports/commit/?id=5f9a8b27d38d5fd20f3a0c28812129376475de8b
https://git.alpinelinux.org/aports/commit/?id=6f50fc870d684eb2247b563a2719b4b444918778
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.