mirror of
https://git.FreeBSD.org/ports.git
synced 2024-12-18 03:46:03 +00:00
- Add entry for claws-mail - APOP vulnerability
This commit is contained in:
parent
edc9ea33b8
commit
c2497cc8f8
Notes:
svn2git
2021-03-31 03:12:20 +00:00
svn path=/head/; revision=190338
@ -34,6 +34,35 @@ Note: Please add new entries to the beginning of this file.
|
||||
|
||||
-->
|
||||
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
|
||||
<vuln vid="c389d06d-ee57-11db-bd51-0016179b2dd5">
|
||||
<topic>claws-mail -- APOP vulnerability</topic>
|
||||
<affects>
|
||||
<package>
|
||||
<name>claws-mail</name>
|
||||
<range><lt>2.9.0</lt></range>
|
||||
</package>
|
||||
</affects>
|
||||
<description>
|
||||
<body xmlns="http://www.w3.org/1999/xhtml">
|
||||
<p>CVE reports:</p>
|
||||
<blockquote cite="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1558">
|
||||
<p>The APOP protocol allows remote attackers to guess the first 3
|
||||
characters of a password via man-in-the-middle (MITM) attacks
|
||||
that use crafted message IDs and MD5 collisions.
|
||||
</p>
|
||||
</blockquote>
|
||||
</body>
|
||||
</description>
|
||||
<references>
|
||||
<cvename>CVE-2007-1558</cvename>
|
||||
<url>http://www.claws-mail.org/news.php</url>
|
||||
</references>
|
||||
<dates>
|
||||
<discovery>2007-04-02</discovery>
|
||||
<entry>2007-04-19</entry>
|
||||
</dates>
|
||||
</vuln>
|
||||
|
||||
<vuln vid="5678da43-ea99-11db-a802-000fea2763ce">
|
||||
<topic>lighttpd -- DOS when access files with mtime 0</topic>
|
||||
<affects>
|
||||
|
Loading…
Reference in New Issue
Block a user