Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2021-39272 (GCVE-0-2021-39272)
Vulnerability from cvelistv5 – Published: 2021-08-30 05:05 – Updated: 2024-08-04 02:06- n/a
| URL | Tags |
|---|---|
| https://www.fetchmail.info/security.html | x_refsource_MISC |
| https://nostarttls.secvuln.info/ | x_refsource_MISC |
| http://www.openwall.com/lists/oss-security/2021/08/27/3 | x_refsource_MISC |
| https://lists.fedoraproject.org/archives/list/pac… | vendor-advisoryx_refsource_FEDORA |
| https://lists.fedoraproject.org/archives/list/pac… | vendor-advisoryx_refsource_FEDORA |
| https://lists.fedoraproject.org/archives/list/pac… | vendor-advisoryx_refsource_FEDORA |
| https://security.gentoo.org/glsa/202209-14 | vendor-advisoryx_refsource_GENTOO |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T02:06:41.615Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.fetchmail.info/security.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://nostarttls.secvuln.info/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2021/08/27/3"
},
{
"name": "FEDORA-2021-ddefbdbb46",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3XJ6XLEJCEZCAM5LGGD6XBCC522QLG4/"
},
{
"name": "FEDORA-2021-9998719311",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZYCYLL73NP7ALJWSDICIVSA47ZIXWSSA/"
},
{
"name": "FEDORA-2021-e61a978fef",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VXMKSEHAQSEDCWZMAOJEGX3P3JW6QY6H/"
},
{
"name": "GLSA-202209-14",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/202209-14"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Fetchmail before 6.4.22 fails to enforce STARTTLS session encryption in some circumstances, such as a certain situation with IMAP and PREAUTH."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-09-25T15:07:04.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.fetchmail.info/security.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://nostarttls.secvuln.info/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.openwall.com/lists/oss-security/2021/08/27/3"
},
{
"name": "FEDORA-2021-ddefbdbb46",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3XJ6XLEJCEZCAM5LGGD6XBCC522QLG4/"
},
{
"name": "FEDORA-2021-9998719311",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZYCYLL73NP7ALJWSDICIVSA47ZIXWSSA/"
},
{
"name": "FEDORA-2021-e61a978fef",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VXMKSEHAQSEDCWZMAOJEGX3P3JW6QY6H/"
},
{
"name": "GLSA-202209-14",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "https://security.gentoo.org/glsa/202209-14"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-39272",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Fetchmail before 6.4.22 fails to enforce STARTTLS session encryption in some circumstances, such as a certain situation with IMAP and PREAUTH."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.fetchmail.info/security.html",
"refsource": "MISC",
"url": "https://www.fetchmail.info/security.html"
},
{
"name": "https://nostarttls.secvuln.info/",
"refsource": "MISC",
"url": "https://nostarttls.secvuln.info/"
},
{
"name": "http://www.openwall.com/lists/oss-security/2021/08/27/3",
"refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2021/08/27/3"
},
{
"name": "FEDORA-2021-ddefbdbb46",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L3XJ6XLEJCEZCAM5LGGD6XBCC522QLG4/"
},
{
"name": "FEDORA-2021-9998719311",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZYCYLL73NP7ALJWSDICIVSA47ZIXWSSA/"
},
{
"name": "FEDORA-2021-e61a978fef",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXMKSEHAQSEDCWZMAOJEGX3P3JW6QY6H/"
},
{
"name": "GLSA-202209-14",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/202209-14"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2021-39272",
"datePublished": "2021-08-30T05:05:26.000Z",
"dateReserved": "2021-08-18T00:00:00.000Z",
"dateUpdated": "2024-08-04T02:06:41.615Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2021-39272",
"date": "2026-05-24",
"epss": "0.00182",
"percentile": "0.39584"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fetchmail:fetchmail:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"6.4.22\", \"matchCriteriaId\": \"4AD13C43-606A-433C-98D9-1A24397CD739\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E460AA51-FCDA-46B9-AE97-E6676AA5E194\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A930E247-0B43-43CB-98FF-6CE7B8189835\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"80E516C0-98A4-4ADE-B69F-66A772E2BAAA\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Fetchmail before 6.4.22 fails to enforce STARTTLS session encryption in some circumstances, such as a certain situation with IMAP and PREAUTH.\"}, {\"lang\": \"es\", \"value\": \"Fetchmail versiones anteriores a 6.4.22, no puede aplicar el cifrado de sesi\\u00f3n STARTTLS en determinadas circunstancias, como una situaci\\u00f3n con IMAP y PREAUTH.\"}]",
"id": "CVE-2021-39272",
"lastModified": "2024-11-21T06:19:05.287",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N\", \"baseScore\": 5.9, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 2.2, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:P/I:N/A:N\", \"baseScore\": 4.3, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2021-08-30T06:15:06.450",
"references": "[{\"url\": \"http://www.openwall.com/lists/oss-security/2021/08/27/3\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3XJ6XLEJCEZCAM5LGGD6XBCC522QLG4/\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VXMKSEHAQSEDCWZMAOJEGX3P3JW6QY6H/\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZYCYLL73NP7ALJWSDICIVSA47ZIXWSSA/\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://nostarttls.secvuln.info/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://security.gentoo.org/glsa/202209-14\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.fetchmail.info/security.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2021/08/27/3\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3XJ6XLEJCEZCAM5LGGD6XBCC522QLG4/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VXMKSEHAQSEDCWZMAOJEGX3P3JW6QY6H/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZYCYLL73NP7ALJWSDICIVSA47ZIXWSSA/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://nostarttls.secvuln.info/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://security.gentoo.org/glsa/202209-14\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.fetchmail.info/security.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-319\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2021-39272\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2021-08-30T06:15:06.450\",\"lastModified\":\"2024-11-21T06:19:05.287\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Fetchmail before 6.4.22 fails to enforce STARTTLS session encryption in some circumstances, such as a certain situation with IMAP and PREAUTH.\"},{\"lang\":\"es\",\"value\":\"Fetchmail versiones anteriores a 6.4.22, no puede aplicar el cifrado de sesi\u00f3n STARTTLS en determinadas circunstancias, como una situaci\u00f3n con IMAP y PREAUTH.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":5.9,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.2,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:N/A:N\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-319\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fetchmail:fetchmail:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.4.22\",\"matchCriteriaId\":\"4AD13C43-606A-433C-98D9-1A24397CD739\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E460AA51-FCDA-46B9-AE97-E6676AA5E194\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A930E247-0B43-43CB-98FF-6CE7B8189835\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80E516C0-98A4-4ADE-B69F-66A772E2BAAA\"}]}]}],\"references\":[{\"url\":\"http://www.openwall.com/lists/oss-security/2021/08/27/3\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3XJ6XLEJCEZCAM5LGGD6XBCC522QLG4/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VXMKSEHAQSEDCWZMAOJEGX3P3JW6QY6H/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZYCYLL73NP7ALJWSDICIVSA47ZIXWSSA/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://nostarttls.secvuln.info/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/202209-14\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.fetchmail.info/security.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2021/08/27/3\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3XJ6XLEJCEZCAM5LGGD6XBCC522QLG4/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VXMKSEHAQSEDCWZMAOJEGX3P3JW6QY6H/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZYCYLL73NP7ALJWSDICIVSA47ZIXWSSA/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://nostarttls.secvuln.info/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/202209-14\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.fetchmail.info/security.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
}
}
alsa-2022:1964
Vulnerability from osv_almalinux
Fetchmail is a remote mail retrieval and forwarding utility intended for use over on-demand TCP/IP links, like SLIP or PPP connections. Fetchmail supports every remote-mail protocol currently in use on the Internet (POP2, POP3, RPOP, APOP, KPOP, all IMAPs, ESMTP ETRN, IPv6, and IPSEC) for retrieval. Then Fetchmail forwards the mail through SMTP so the user can read it through their favorite mail client.
Security Fix(es):
-
fetchmail: DoS or information disclosure when logging long messages (CVE-2021-36386)
-
fetchmail: STARTTLS session encryption bypassing (CVE-2021-39272)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.
| URL | Type | |
|---|---|---|
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fetchmail"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "6.4.24-1.el8"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "Fetchmail is a remote mail retrieval and forwarding utility intended for use over on-demand TCP/IP links, like SLIP or PPP connections. Fetchmail supports every remote-mail protocol currently in use on the Internet (POP2, POP3, RPOP, APOP, KPOP, all IMAPs, ESMTP ETRN, IPv6, and IPSEC) for retrieval. Then Fetchmail forwards the mail through SMTP so the user can read it through their favorite mail client.\n\nSecurity Fix(es):\n\n* fetchmail: DoS or information disclosure when logging long messages (CVE-2021-36386)\n\n* fetchmail: STARTTLS session encryption bypassing (CVE-2021-39272)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.",
"id": "ALSA-2022:1964",
"modified": "2022-05-10T08:09:49Z",
"published": "2022-05-10T06:41:48Z",
"references": [
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/8/ALSA-2022-1964.html"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-36386"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-39272"
}
],
"related": [
"CVE-2021-36386",
"CVE-2021-39272"
],
"summary": "Moderate: fetchmail security update"
}
FKIE_CVE-2021-39272
Vulnerability from fkie_nvd - Published: 2021-08-30 06:15 - Updated: 2024-11-21 06:19| Vendor | Product | Version | |
|---|---|---|---|
| fetchmail | fetchmail | * | |
| fedoraproject | fedora | 33 | |
| fedoraproject | fedora | 34 | |
| fedoraproject | fedora | 35 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fetchmail:fetchmail:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4AD13C43-606A-433C-98D9-1A24397CD739",
"versionEndExcluding": "6.4.22",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Fetchmail before 6.4.22 fails to enforce STARTTLS session encryption in some circumstances, such as a certain situation with IMAP and PREAUTH."
},
{
"lang": "es",
"value": "Fetchmail versiones anteriores a 6.4.22, no puede aplicar el cifrado de sesi\u00f3n STARTTLS en determinadas circunstancias, como una situaci\u00f3n con IMAP y PREAUTH."
}
],
"id": "CVE-2021-39272",
"lastModified": "2024-11-21T06:19:05.287",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-08-30T06:15:06.450",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2021/08/27/3"
},
{
"source": "cve@mitre.org",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3XJ6XLEJCEZCAM5LGGD6XBCC522QLG4/"
},
{
"source": "cve@mitre.org",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VXMKSEHAQSEDCWZMAOJEGX3P3JW6QY6H/"
},
{
"source": "cve@mitre.org",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZYCYLL73NP7ALJWSDICIVSA47ZIXWSSA/"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://nostarttls.secvuln.info/"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202209-14"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://www.fetchmail.info/security.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2021/08/27/3"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3XJ6XLEJCEZCAM5LGGD6XBCC522QLG4/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VXMKSEHAQSEDCWZMAOJEGX3P3JW6QY6H/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZYCYLL73NP7ALJWSDICIVSA47ZIXWSSA/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://nostarttls.secvuln.info/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202209-14"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.fetchmail.info/security.html"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-319"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-X8J8-PWR7-FRJW
Vulnerability from github – Published: 2022-05-24 19:12 – Updated: 2022-07-13 00:01Fetchmail before 6.4.22 fails to enforce STARTTLS session encryption in some circumstances, such as a certain situation with IMAP and PREAUTH.
{
"affected": [],
"aliases": [
"CVE-2021-39272"
],
"database_specific": {
"cwe_ids": [
"CWE-319",
"CWE-326"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2021-08-30T06:15:00Z",
"severity": "MODERATE"
},
"details": "Fetchmail before 6.4.22 fails to enforce STARTTLS session encryption in some circumstances, such as a certain situation with IMAP and PREAUTH.",
"id": "GHSA-x8j8-pwr7-frjw",
"modified": "2022-07-13T00:01:36Z",
"published": "2022-05-24T19:12:32Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-39272"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L3XJ6XLEJCEZCAM5LGGD6XBCC522QLG4"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXMKSEHAQSEDCWZMAOJEGX3P3JW6QY6H"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZYCYLL73NP7ALJWSDICIVSA47ZIXWSSA"
},
{
"type": "WEB",
"url": "https://nostarttls.secvuln.info"
},
{
"type": "WEB",
"url": "https://security.gentoo.org/glsa/202209-14"
},
{
"type": "WEB",
"url": "https://www.fetchmail.info/security.html"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2021/08/27/3"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
]
}
GSD-2021-39272
Vulnerability from gsd - Updated: 2023-12-13 01:23{
"GSD": {
"alias": "CVE-2021-39272",
"description": "Fetchmail before 6.4.22 fails to enforce STARTTLS session encryption in some circumstances, such as a certain situation with IMAP and PREAUTH.",
"id": "GSD-2021-39272",
"references": [
"https://www.suse.com/security/cve/CVE-2021-39272.html",
"https://advisories.mageia.org/CVE-2021-39272.html",
"https://security.archlinux.org/CVE-2021-39272",
"https://linux.oracle.com/cve/CVE-2021-39272.html",
"https://access.redhat.com/errata/RHSA-2022:1964"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2021-39272"
],
"details": "Fetchmail before 6.4.22 fails to enforce STARTTLS session encryption in some circumstances, such as a certain situation with IMAP and PREAUTH.",
"id": "GSD-2021-39272",
"modified": "2023-12-13T01:23:15.576658Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-39272",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Fetchmail before 6.4.22 fails to enforce STARTTLS session encryption in some circumstances, such as a certain situation with IMAP and PREAUTH."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.fetchmail.info/security.html",
"refsource": "MISC",
"url": "https://www.fetchmail.info/security.html"
},
{
"name": "https://nostarttls.secvuln.info/",
"refsource": "MISC",
"url": "https://nostarttls.secvuln.info/"
},
{
"name": "http://www.openwall.com/lists/oss-security/2021/08/27/3",
"refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2021/08/27/3"
},
{
"name": "FEDORA-2021-ddefbdbb46",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L3XJ6XLEJCEZCAM5LGGD6XBCC522QLG4/"
},
{
"name": "FEDORA-2021-9998719311",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZYCYLL73NP7ALJWSDICIVSA47ZIXWSSA/"
},
{
"name": "FEDORA-2021-e61a978fef",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXMKSEHAQSEDCWZMAOJEGX3P3JW6QY6H/"
},
{
"name": "GLSA-202209-14",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/202209-14"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:fetchmail:fetchmail:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "6.4.22",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-39272"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Fetchmail before 6.4.22 fails to enforce STARTTLS session encryption in some circumstances, such as a certain situation with IMAP and PREAUTH."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-319"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://nostarttls.secvuln.info/",
"refsource": "MISC",
"tags": [
"Third Party Advisory"
],
"url": "https://nostarttls.secvuln.info/"
},
{
"name": "http://www.openwall.com/lists/oss-security/2021/08/27/3",
"refsource": "MISC",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2021/08/27/3"
},
{
"name": "https://www.fetchmail.info/security.html",
"refsource": "MISC",
"tags": [
"Vendor Advisory"
],
"url": "https://www.fetchmail.info/security.html"
},
{
"name": "FEDORA-2021-ddefbdbb46",
"refsource": "FEDORA",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L3XJ6XLEJCEZCAM5LGGD6XBCC522QLG4/"
},
{
"name": "FEDORA-2021-9998719311",
"refsource": "FEDORA",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZYCYLL73NP7ALJWSDICIVSA47ZIXWSSA/"
},
{
"name": "FEDORA-2021-e61a978fef",
"refsource": "FEDORA",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXMKSEHAQSEDCWZMAOJEGX3P3JW6QY6H/"
},
{
"name": "GLSA-202209-14",
"refsource": "GENTOO",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202209-14"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
}
},
"lastModifiedDate": "2022-10-28T13:18Z",
"publishedDate": "2021-08-30T06:15Z"
}
}
}
MSRC_CVE-2021-39272
Vulnerability from csaf_microsoft - Published: 2021-08-02 00:00 - Updated: 2022-01-19 00:00| URL | Category |
|---|---|
| https://msrc.microsoft.com/csaf/vex/2021/msrc_cve… | self |
| https://support.microsoft.com/lifecycle | external |
| https://www.first.org/cvss | external |
| https://msrc.microsoft.com/csaf/vex/2021/msrc_cve… | self |
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2021-39272 Fetchmail before 6.4.22 fails to enforce STARTTLS session encryption in some circumstances such as a certain situation with IMAP and PREAUTH. - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2021/msrc_cve-2021-39272.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "Fetchmail before 6.4.22 fails to enforce STARTTLS session encryption in some circumstances such as a certain situation with IMAP and PREAUTH.",
"tracking": {
"current_release_date": "2022-01-19T00:00:00.000Z",
"generator": {
"date": "2025-10-19T22:09:27.536Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2021-39272",
"initial_release_date": "2021-08-02T00:00:00.000Z",
"revision_history": [
{
"date": "2022-01-19T00:00:00.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "2.0",
"product": {
"name": "CBL Mariner 2.0",
"product_id": "17086"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003ccbl2 fetchmail 6.4.22-1",
"product": {
"name": "\u003ccbl2 fetchmail 6.4.22-1",
"product_id": "1"
}
},
{
"category": "product_version",
"name": "cbl2 fetchmail 6.4.22-1",
"product": {
"name": "cbl2 fetchmail 6.4.22-1",
"product_id": "19480"
}
}
],
"category": "product_name",
"name": "fetchmail"
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 fetchmail 6.4.22-1 as a component of CBL Mariner 2.0",
"product_id": "17086-1"
},
"product_reference": "1",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 fetchmail 6.4.22-1 as a component of CBL Mariner 2.0",
"product_id": "19480-17086"
},
"product_reference": "19480",
"relates_to_product_reference": "17086"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-39272",
"cwe": {
"id": "CWE-319",
"name": "Cleartext Transmission of Sensitive Information"
},
"notes": [
{
"category": "general",
"text": "mitre",
"title": "Assigning CNA"
}
],
"product_status": {
"fixed": [
"19480-17086"
],
"known_affected": [
"17086-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-39272 Fetchmail before 6.4.22 fails to enforce STARTTLS session encryption in some circumstances such as a certain situation with IMAP and PREAUTH. - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2021/msrc_cve-2021-39272.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"date": "2022-01-19T00:00:00.000Z",
"details": "6.4.22-1:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17086-1"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"environmentalsScore": 0.0,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 5.9,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"17086-1"
]
}
],
"title": "Fetchmail before 6.4.22 fails to enforce STARTTLS session encryption in some circumstances such as a certain situation with IMAP and PREAUTH."
}
]
}
OPENSUSE-SU-2021:1416-1
Vulnerability from csaf_opensuse - Published: 2021-10-31 15:07 - Updated: 2021-10-31 15:07| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.2:fetchmail-6.3.26-lp152.6.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:fetchmailconf-6.3.26-lp152.6.9.1.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for fetchmail",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for fetchmail fixes the following issues:\n\n- CVE-2021-39272: Fix failure to enforce STARTTLS session encryption in some circumstances, such as a certain situation with IMAP and PREAUTH. (bsc#1190069)\n\nThis update was imported from the SUSE:SLE-15:Update update project.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2021-1416",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_1416-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2021:1416-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GKBTMGZAXDA7DYFMUAFILOUSIZ5RNGMY/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2021:1416-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GKBTMGZAXDA7DYFMUAFILOUSIZ5RNGMY/"
},
{
"category": "self",
"summary": "SUSE Bug 1190069",
"url": "https://bugzilla.suse.com/1190069"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-39272 page",
"url": "https://www.suse.com/security/cve/CVE-2021-39272/"
}
],
"title": "Security update for fetchmail",
"tracking": {
"current_release_date": "2021-10-31T15:07:46Z",
"generator": {
"date": "2021-10-31T15:07:46Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2021:1416-1",
"initial_release_date": "2021-10-31T15:07:46Z",
"revision_history": [
{
"date": "2021-10-31T15:07:46Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "fetchmail-6.3.26-lp152.6.9.1.x86_64",
"product": {
"name": "fetchmail-6.3.26-lp152.6.9.1.x86_64",
"product_id": "fetchmail-6.3.26-lp152.6.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "fetchmailconf-6.3.26-lp152.6.9.1.x86_64",
"product": {
"name": "fetchmailconf-6.3.26-lp152.6.9.1.x86_64",
"product_id": "fetchmailconf-6.3.26-lp152.6.9.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.2",
"product": {
"name": "openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-6.3.26-lp152.6.9.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:fetchmail-6.3.26-lp152.6.9.1.x86_64"
},
"product_reference": "fetchmail-6.3.26-lp152.6.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmailconf-6.3.26-lp152.6.9.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:fetchmailconf-6.3.26-lp152.6.9.1.x86_64"
},
"product_reference": "fetchmailconf-6.3.26-lp152.6.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-39272",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-39272"
}
],
"notes": [
{
"category": "general",
"text": "Fetchmail before 6.4.22 fails to enforce STARTTLS session encryption in some circumstances, such as a certain situation with IMAP and PREAUTH.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:fetchmail-6.3.26-lp152.6.9.1.x86_64",
"openSUSE Leap 15.2:fetchmailconf-6.3.26-lp152.6.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-39272",
"url": "https://www.suse.com/security/cve/CVE-2021-39272"
},
{
"category": "external",
"summary": "SUSE Bug 1190069 for CVE-2021-39272",
"url": "https://bugzilla.suse.com/1190069"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:fetchmail-6.3.26-lp152.6.9.1.x86_64",
"openSUSE Leap 15.2:fetchmailconf-6.3.26-lp152.6.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:fetchmail-6.3.26-lp152.6.9.1.x86_64",
"openSUSE Leap 15.2:fetchmailconf-6.3.26-lp152.6.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-10-31T15:07:46Z",
"details": "moderate"
}
],
"title": "CVE-2021-39272"
}
]
}
OPENSUSE-SU-2021:1591-1
Vulnerability from csaf_opensuse - Published: 2021-12-17 11:06 - Updated: 2021-12-17 11:06| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.2:fetchmail-6.4.22-lp152.6.12.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:fetchmailconf-6.4.22-lp152.6.12.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.2:fetchmail-6.4.22-lp152.6.12.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:fetchmailconf-6.4.22-lp152.6.12.1.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for fetchmail",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for fetchmail fixes the following issues:\n\n- CVE-2021-36386: Fixed DoS or information disclosure in some configurations (bsc#1188875).\n- CVE-2021-39272: Fixed STARTTLS session encryption bypassing (fetchmail-SA-2021-02) (bsc#1190069).\n\n- Update to 6.4.22 (bsc#1152964, jsc#SLE-18159, jsc#SLE-17903, jsc#SLE-18059)\n- Remove all python2 dependencies (bsc#1190896).\n- De-hardcode /usr/lib path for launch executable (bsc#1174075).\n- Added hardening to systemd service(s) (bsc#1181400).\n \nThis update was imported from the SUSE:SLE-15:Update update project.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2021-1591",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_1591-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2021:1591-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2MQSBOFKUN3D2SAYKHGH2NQW7UGR6J7P/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2021:1591-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2MQSBOFKUN3D2SAYKHGH2NQW7UGR6J7P/"
},
{
"category": "self",
"summary": "SUSE Bug 1152964",
"url": "https://bugzilla.suse.com/1152964"
},
{
"category": "self",
"summary": "SUSE Bug 1174075",
"url": "https://bugzilla.suse.com/1174075"
},
{
"category": "self",
"summary": "SUSE Bug 1181400",
"url": "https://bugzilla.suse.com/1181400"
},
{
"category": "self",
"summary": "SUSE Bug 1188875",
"url": "https://bugzilla.suse.com/1188875"
},
{
"category": "self",
"summary": "SUSE Bug 1190069",
"url": "https://bugzilla.suse.com/1190069"
},
{
"category": "self",
"summary": "SUSE Bug 1190896",
"url": "https://bugzilla.suse.com/1190896"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-36386 page",
"url": "https://www.suse.com/security/cve/CVE-2021-36386/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-39272 page",
"url": "https://www.suse.com/security/cve/CVE-2021-39272/"
}
],
"title": "Security update for fetchmail",
"tracking": {
"current_release_date": "2021-12-17T11:06:33Z",
"generator": {
"date": "2021-12-17T11:06:33Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2021:1591-1",
"initial_release_date": "2021-12-17T11:06:33Z",
"revision_history": [
{
"date": "2021-12-17T11:06:33Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "fetchmail-6.4.22-lp152.6.12.1.x86_64",
"product": {
"name": "fetchmail-6.4.22-lp152.6.12.1.x86_64",
"product_id": "fetchmail-6.4.22-lp152.6.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "fetchmailconf-6.4.22-lp152.6.12.1.x86_64",
"product": {
"name": "fetchmailconf-6.4.22-lp152.6.12.1.x86_64",
"product_id": "fetchmailconf-6.4.22-lp152.6.12.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.2",
"product": {
"name": "openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-6.4.22-lp152.6.12.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:fetchmail-6.4.22-lp152.6.12.1.x86_64"
},
"product_reference": "fetchmail-6.4.22-lp152.6.12.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmailconf-6.4.22-lp152.6.12.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:fetchmailconf-6.4.22-lp152.6.12.1.x86_64"
},
"product_reference": "fetchmailconf-6.4.22-lp152.6.12.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-36386",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-36386"
}
],
"notes": [
{
"category": "general",
"text": "report_vbuild in report.c in Fetchmail before 6.4.20 sometimes omits initialization of the vsnprintf va_list argument, which might allow mail servers to cause a denial of service or possibly have unspecified other impact via long error messages. NOTE: it is unclear whether use of Fetchmail on any realistic platform results in an impact beyond an inconvenience to the client user.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:fetchmail-6.4.22-lp152.6.12.1.x86_64",
"openSUSE Leap 15.2:fetchmailconf-6.4.22-lp152.6.12.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-36386",
"url": "https://www.suse.com/security/cve/CVE-2021-36386"
},
{
"category": "external",
"summary": "SUSE Bug 1188875 for CVE-2021-36386",
"url": "https://bugzilla.suse.com/1188875"
},
{
"category": "external",
"summary": "SUSE Bug 1224188 for CVE-2021-36386",
"url": "https://bugzilla.suse.com/1224188"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:fetchmail-6.4.22-lp152.6.12.1.x86_64",
"openSUSE Leap 15.2:fetchmailconf-6.4.22-lp152.6.12.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:fetchmail-6.4.22-lp152.6.12.1.x86_64",
"openSUSE Leap 15.2:fetchmailconf-6.4.22-lp152.6.12.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-17T11:06:33Z",
"details": "moderate"
}
],
"title": "CVE-2021-36386"
},
{
"cve": "CVE-2021-39272",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-39272"
}
],
"notes": [
{
"category": "general",
"text": "Fetchmail before 6.4.22 fails to enforce STARTTLS session encryption in some circumstances, such as a certain situation with IMAP and PREAUTH.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:fetchmail-6.4.22-lp152.6.12.1.x86_64",
"openSUSE Leap 15.2:fetchmailconf-6.4.22-lp152.6.12.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-39272",
"url": "https://www.suse.com/security/cve/CVE-2021-39272"
},
{
"category": "external",
"summary": "SUSE Bug 1190069 for CVE-2021-39272",
"url": "https://bugzilla.suse.com/1190069"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:fetchmail-6.4.22-lp152.6.12.1.x86_64",
"openSUSE Leap 15.2:fetchmailconf-6.4.22-lp152.6.12.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:fetchmail-6.4.22-lp152.6.12.1.x86_64",
"openSUSE Leap 15.2:fetchmailconf-6.4.22-lp152.6.12.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-17T11:06:33Z",
"details": "moderate"
}
],
"title": "CVE-2021-39272"
}
]
}
OPENSUSE-SU-2021:3493-1
Vulnerability from csaf_opensuse - Published: 2021-10-20 14:38 - Updated: 2021-10-20 14:38| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:fetchmail-6.3.26-20.17.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:fetchmail-6.3.26-20.17.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:fetchmail-6.3.26-20.17.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:fetchmail-6.3.26-20.17.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:fetchmailconf-6.3.26-20.17.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:fetchmailconf-6.3.26-20.17.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:fetchmailconf-6.3.26-20.17.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:fetchmailconf-6.3.26-20.17.1.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for fetchmail",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for fetchmail fixes the following issues:\n\n- CVE-2021-39272: Fix failure to enforce STARTTLS session encryption in some circumstances, such as a certain situation with IMAP and PREAUTH. (bsc#1190069)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-SLE-15.3-2021-3493",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_3493-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2021:3493-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YSSYZRBZ642QLUIU2C7RUKT5PKPXQPKZ/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2021:3493-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YSSYZRBZ642QLUIU2C7RUKT5PKPXQPKZ/"
},
{
"category": "self",
"summary": "SUSE Bug 1190069",
"url": "https://bugzilla.suse.com/1190069"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-39272 page",
"url": "https://www.suse.com/security/cve/CVE-2021-39272/"
}
],
"title": "Security update for fetchmail",
"tracking": {
"current_release_date": "2021-10-20T14:38:04Z",
"generator": {
"date": "2021-10-20T14:38:04Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2021:3493-1",
"initial_release_date": "2021-10-20T14:38:04Z",
"revision_history": [
{
"date": "2021-10-20T14:38:04Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "fetchmail-6.3.26-20.17.1.aarch64",
"product": {
"name": "fetchmail-6.3.26-20.17.1.aarch64",
"product_id": "fetchmail-6.3.26-20.17.1.aarch64"
}
},
{
"category": "product_version",
"name": "fetchmailconf-6.3.26-20.17.1.aarch64",
"product": {
"name": "fetchmailconf-6.3.26-20.17.1.aarch64",
"product_id": "fetchmailconf-6.3.26-20.17.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "fetchmail-6.3.26-20.17.1.ppc64le",
"product": {
"name": "fetchmail-6.3.26-20.17.1.ppc64le",
"product_id": "fetchmail-6.3.26-20.17.1.ppc64le"
}
},
{
"category": "product_version",
"name": "fetchmailconf-6.3.26-20.17.1.ppc64le",
"product": {
"name": "fetchmailconf-6.3.26-20.17.1.ppc64le",
"product_id": "fetchmailconf-6.3.26-20.17.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "fetchmail-6.3.26-20.17.1.s390x",
"product": {
"name": "fetchmail-6.3.26-20.17.1.s390x",
"product_id": "fetchmail-6.3.26-20.17.1.s390x"
}
},
{
"category": "product_version",
"name": "fetchmailconf-6.3.26-20.17.1.s390x",
"product": {
"name": "fetchmailconf-6.3.26-20.17.1.s390x",
"product_id": "fetchmailconf-6.3.26-20.17.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "fetchmail-6.3.26-20.17.1.x86_64",
"product": {
"name": "fetchmail-6.3.26-20.17.1.x86_64",
"product_id": "fetchmail-6.3.26-20.17.1.x86_64"
}
},
{
"category": "product_version",
"name": "fetchmailconf-6.3.26-20.17.1.x86_64",
"product": {
"name": "fetchmailconf-6.3.26-20.17.1.x86_64",
"product_id": "fetchmailconf-6.3.26-20.17.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.3",
"product": {
"name": "openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-6.3.26-20.17.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:fetchmail-6.3.26-20.17.1.aarch64"
},
"product_reference": "fetchmail-6.3.26-20.17.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-6.3.26-20.17.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:fetchmail-6.3.26-20.17.1.ppc64le"
},
"product_reference": "fetchmail-6.3.26-20.17.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-6.3.26-20.17.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:fetchmail-6.3.26-20.17.1.s390x"
},
"product_reference": "fetchmail-6.3.26-20.17.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-6.3.26-20.17.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:fetchmail-6.3.26-20.17.1.x86_64"
},
"product_reference": "fetchmail-6.3.26-20.17.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmailconf-6.3.26-20.17.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:fetchmailconf-6.3.26-20.17.1.aarch64"
},
"product_reference": "fetchmailconf-6.3.26-20.17.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmailconf-6.3.26-20.17.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:fetchmailconf-6.3.26-20.17.1.ppc64le"
},
"product_reference": "fetchmailconf-6.3.26-20.17.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmailconf-6.3.26-20.17.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:fetchmailconf-6.3.26-20.17.1.s390x"
},
"product_reference": "fetchmailconf-6.3.26-20.17.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmailconf-6.3.26-20.17.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:fetchmailconf-6.3.26-20.17.1.x86_64"
},
"product_reference": "fetchmailconf-6.3.26-20.17.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-39272",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-39272"
}
],
"notes": [
{
"category": "general",
"text": "Fetchmail before 6.4.22 fails to enforce STARTTLS session encryption in some circumstances, such as a certain situation with IMAP and PREAUTH.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:fetchmail-6.3.26-20.17.1.aarch64",
"openSUSE Leap 15.3:fetchmail-6.3.26-20.17.1.ppc64le",
"openSUSE Leap 15.3:fetchmail-6.3.26-20.17.1.s390x",
"openSUSE Leap 15.3:fetchmail-6.3.26-20.17.1.x86_64",
"openSUSE Leap 15.3:fetchmailconf-6.3.26-20.17.1.aarch64",
"openSUSE Leap 15.3:fetchmailconf-6.3.26-20.17.1.ppc64le",
"openSUSE Leap 15.3:fetchmailconf-6.3.26-20.17.1.s390x",
"openSUSE Leap 15.3:fetchmailconf-6.3.26-20.17.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-39272",
"url": "https://www.suse.com/security/cve/CVE-2021-39272"
},
{
"category": "external",
"summary": "SUSE Bug 1190069 for CVE-2021-39272",
"url": "https://bugzilla.suse.com/1190069"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:fetchmail-6.3.26-20.17.1.aarch64",
"openSUSE Leap 15.3:fetchmail-6.3.26-20.17.1.ppc64le",
"openSUSE Leap 15.3:fetchmail-6.3.26-20.17.1.s390x",
"openSUSE Leap 15.3:fetchmail-6.3.26-20.17.1.x86_64",
"openSUSE Leap 15.3:fetchmailconf-6.3.26-20.17.1.aarch64",
"openSUSE Leap 15.3:fetchmailconf-6.3.26-20.17.1.ppc64le",
"openSUSE Leap 15.3:fetchmailconf-6.3.26-20.17.1.s390x",
"openSUSE Leap 15.3:fetchmailconf-6.3.26-20.17.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:fetchmail-6.3.26-20.17.1.aarch64",
"openSUSE Leap 15.3:fetchmail-6.3.26-20.17.1.ppc64le",
"openSUSE Leap 15.3:fetchmail-6.3.26-20.17.1.s390x",
"openSUSE Leap 15.3:fetchmail-6.3.26-20.17.1.x86_64",
"openSUSE Leap 15.3:fetchmailconf-6.3.26-20.17.1.aarch64",
"openSUSE Leap 15.3:fetchmailconf-6.3.26-20.17.1.ppc64le",
"openSUSE Leap 15.3:fetchmailconf-6.3.26-20.17.1.s390x",
"openSUSE Leap 15.3:fetchmailconf-6.3.26-20.17.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-10-20T14:38:04Z",
"details": "moderate"
}
],
"title": "CVE-2021-39272"
}
]
}
OPENSUSE-SU-2021:4018-1
Vulnerability from csaf_opensuse - Published: 2021-12-14 07:58 - Updated: 2021-12-14 07:58| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:fetchmail-6.4.22-20.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:fetchmail-6.4.22-20.20.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:fetchmail-6.4.22-20.20.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:fetchmail-6.4.22-20.20.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:fetchmailconf-6.4.22-20.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:fetchmailconf-6.4.22-20.20.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:fetchmailconf-6.4.22-20.20.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:fetchmailconf-6.4.22-20.20.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:fetchmail-6.4.22-20.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:fetchmail-6.4.22-20.20.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:fetchmail-6.4.22-20.20.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:fetchmail-6.4.22-20.20.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:fetchmailconf-6.4.22-20.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:fetchmailconf-6.4.22-20.20.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:fetchmailconf-6.4.22-20.20.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:fetchmailconf-6.4.22-20.20.1.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for fetchmail",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for fetchmail fixes the following issues:\n\n- CVE-2021-36386: Fixed DoS or information disclosure in some configurations (bsc#1188875).\n- CVE-2021-39272: Fixed STARTTLS session encryption bypassing (fetchmail-SA-2021-02) (bsc#1190069).\n\n- Update to 6.4.22 (bsc#1152964, jsc#SLE-18159, jsc#SLE-17903, jsc#SLE-18059)\n- Remove all python2 dependencies (bsc#1190896).\n- De-hardcode /usr/lib path for launch executable (bsc#1174075).\n- Added hardening to systemd service(s) (bsc#1181400).\n ",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-SLE-15.3-2021-4018",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_4018-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2021:4018-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZEYREAP5E4PNL4UXB7R6OYSFSQ5VNFHB/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2021:4018-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZEYREAP5E4PNL4UXB7R6OYSFSQ5VNFHB/"
},
{
"category": "self",
"summary": "SUSE Bug 1152964",
"url": "https://bugzilla.suse.com/1152964"
},
{
"category": "self",
"summary": "SUSE Bug 1174075",
"url": "https://bugzilla.suse.com/1174075"
},
{
"category": "self",
"summary": "SUSE Bug 1181400",
"url": "https://bugzilla.suse.com/1181400"
},
{
"category": "self",
"summary": "SUSE Bug 1188875",
"url": "https://bugzilla.suse.com/1188875"
},
{
"category": "self",
"summary": "SUSE Bug 1190069",
"url": "https://bugzilla.suse.com/1190069"
},
{
"category": "self",
"summary": "SUSE Bug 1190896",
"url": "https://bugzilla.suse.com/1190896"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-36386 page",
"url": "https://www.suse.com/security/cve/CVE-2021-36386/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-39272 page",
"url": "https://www.suse.com/security/cve/CVE-2021-39272/"
}
],
"title": "Security update for fetchmail",
"tracking": {
"current_release_date": "2021-12-14T07:58:47Z",
"generator": {
"date": "2021-12-14T07:58:47Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2021:4018-1",
"initial_release_date": "2021-12-14T07:58:47Z",
"revision_history": [
{
"date": "2021-12-14T07:58:47Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "fetchmail-6.4.22-20.20.1.aarch64",
"product": {
"name": "fetchmail-6.4.22-20.20.1.aarch64",
"product_id": "fetchmail-6.4.22-20.20.1.aarch64"
}
},
{
"category": "product_version",
"name": "fetchmailconf-6.4.22-20.20.1.aarch64",
"product": {
"name": "fetchmailconf-6.4.22-20.20.1.aarch64",
"product_id": "fetchmailconf-6.4.22-20.20.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "fetchmail-6.4.22-20.20.1.ppc64le",
"product": {
"name": "fetchmail-6.4.22-20.20.1.ppc64le",
"product_id": "fetchmail-6.4.22-20.20.1.ppc64le"
}
},
{
"category": "product_version",
"name": "fetchmailconf-6.4.22-20.20.1.ppc64le",
"product": {
"name": "fetchmailconf-6.4.22-20.20.1.ppc64le",
"product_id": "fetchmailconf-6.4.22-20.20.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "fetchmail-6.4.22-20.20.1.s390x",
"product": {
"name": "fetchmail-6.4.22-20.20.1.s390x",
"product_id": "fetchmail-6.4.22-20.20.1.s390x"
}
},
{
"category": "product_version",
"name": "fetchmailconf-6.4.22-20.20.1.s390x",
"product": {
"name": "fetchmailconf-6.4.22-20.20.1.s390x",
"product_id": "fetchmailconf-6.4.22-20.20.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "fetchmail-6.4.22-20.20.1.x86_64",
"product": {
"name": "fetchmail-6.4.22-20.20.1.x86_64",
"product_id": "fetchmail-6.4.22-20.20.1.x86_64"
}
},
{
"category": "product_version",
"name": "fetchmailconf-6.4.22-20.20.1.x86_64",
"product": {
"name": "fetchmailconf-6.4.22-20.20.1.x86_64",
"product_id": "fetchmailconf-6.4.22-20.20.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.3",
"product": {
"name": "openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-6.4.22-20.20.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:fetchmail-6.4.22-20.20.1.aarch64"
},
"product_reference": "fetchmail-6.4.22-20.20.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-6.4.22-20.20.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:fetchmail-6.4.22-20.20.1.ppc64le"
},
"product_reference": "fetchmail-6.4.22-20.20.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-6.4.22-20.20.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:fetchmail-6.4.22-20.20.1.s390x"
},
"product_reference": "fetchmail-6.4.22-20.20.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-6.4.22-20.20.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:fetchmail-6.4.22-20.20.1.x86_64"
},
"product_reference": "fetchmail-6.4.22-20.20.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmailconf-6.4.22-20.20.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:fetchmailconf-6.4.22-20.20.1.aarch64"
},
"product_reference": "fetchmailconf-6.4.22-20.20.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmailconf-6.4.22-20.20.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:fetchmailconf-6.4.22-20.20.1.ppc64le"
},
"product_reference": "fetchmailconf-6.4.22-20.20.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmailconf-6.4.22-20.20.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:fetchmailconf-6.4.22-20.20.1.s390x"
},
"product_reference": "fetchmailconf-6.4.22-20.20.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmailconf-6.4.22-20.20.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:fetchmailconf-6.4.22-20.20.1.x86_64"
},
"product_reference": "fetchmailconf-6.4.22-20.20.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-36386",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-36386"
}
],
"notes": [
{
"category": "general",
"text": "report_vbuild in report.c in Fetchmail before 6.4.20 sometimes omits initialization of the vsnprintf va_list argument, which might allow mail servers to cause a denial of service or possibly have unspecified other impact via long error messages. NOTE: it is unclear whether use of Fetchmail on any realistic platform results in an impact beyond an inconvenience to the client user.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:fetchmail-6.4.22-20.20.1.aarch64",
"openSUSE Leap 15.3:fetchmail-6.4.22-20.20.1.ppc64le",
"openSUSE Leap 15.3:fetchmail-6.4.22-20.20.1.s390x",
"openSUSE Leap 15.3:fetchmail-6.4.22-20.20.1.x86_64",
"openSUSE Leap 15.3:fetchmailconf-6.4.22-20.20.1.aarch64",
"openSUSE Leap 15.3:fetchmailconf-6.4.22-20.20.1.ppc64le",
"openSUSE Leap 15.3:fetchmailconf-6.4.22-20.20.1.s390x",
"openSUSE Leap 15.3:fetchmailconf-6.4.22-20.20.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-36386",
"url": "https://www.suse.com/security/cve/CVE-2021-36386"
},
{
"category": "external",
"summary": "SUSE Bug 1188875 for CVE-2021-36386",
"url": "https://bugzilla.suse.com/1188875"
},
{
"category": "external",
"summary": "SUSE Bug 1224188 for CVE-2021-36386",
"url": "https://bugzilla.suse.com/1224188"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:fetchmail-6.4.22-20.20.1.aarch64",
"openSUSE Leap 15.3:fetchmail-6.4.22-20.20.1.ppc64le",
"openSUSE Leap 15.3:fetchmail-6.4.22-20.20.1.s390x",
"openSUSE Leap 15.3:fetchmail-6.4.22-20.20.1.x86_64",
"openSUSE Leap 15.3:fetchmailconf-6.4.22-20.20.1.aarch64",
"openSUSE Leap 15.3:fetchmailconf-6.4.22-20.20.1.ppc64le",
"openSUSE Leap 15.3:fetchmailconf-6.4.22-20.20.1.s390x",
"openSUSE Leap 15.3:fetchmailconf-6.4.22-20.20.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:fetchmail-6.4.22-20.20.1.aarch64",
"openSUSE Leap 15.3:fetchmail-6.4.22-20.20.1.ppc64le",
"openSUSE Leap 15.3:fetchmail-6.4.22-20.20.1.s390x",
"openSUSE Leap 15.3:fetchmail-6.4.22-20.20.1.x86_64",
"openSUSE Leap 15.3:fetchmailconf-6.4.22-20.20.1.aarch64",
"openSUSE Leap 15.3:fetchmailconf-6.4.22-20.20.1.ppc64le",
"openSUSE Leap 15.3:fetchmailconf-6.4.22-20.20.1.s390x",
"openSUSE Leap 15.3:fetchmailconf-6.4.22-20.20.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-14T07:58:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-36386"
},
{
"cve": "CVE-2021-39272",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-39272"
}
],
"notes": [
{
"category": "general",
"text": "Fetchmail before 6.4.22 fails to enforce STARTTLS session encryption in some circumstances, such as a certain situation with IMAP and PREAUTH.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:fetchmail-6.4.22-20.20.1.aarch64",
"openSUSE Leap 15.3:fetchmail-6.4.22-20.20.1.ppc64le",
"openSUSE Leap 15.3:fetchmail-6.4.22-20.20.1.s390x",
"openSUSE Leap 15.3:fetchmail-6.4.22-20.20.1.x86_64",
"openSUSE Leap 15.3:fetchmailconf-6.4.22-20.20.1.aarch64",
"openSUSE Leap 15.3:fetchmailconf-6.4.22-20.20.1.ppc64le",
"openSUSE Leap 15.3:fetchmailconf-6.4.22-20.20.1.s390x",
"openSUSE Leap 15.3:fetchmailconf-6.4.22-20.20.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-39272",
"url": "https://www.suse.com/security/cve/CVE-2021-39272"
},
{
"category": "external",
"summary": "SUSE Bug 1190069 for CVE-2021-39272",
"url": "https://bugzilla.suse.com/1190069"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:fetchmail-6.4.22-20.20.1.aarch64",
"openSUSE Leap 15.3:fetchmail-6.4.22-20.20.1.ppc64le",
"openSUSE Leap 15.3:fetchmail-6.4.22-20.20.1.s390x",
"openSUSE Leap 15.3:fetchmail-6.4.22-20.20.1.x86_64",
"openSUSE Leap 15.3:fetchmailconf-6.4.22-20.20.1.aarch64",
"openSUSE Leap 15.3:fetchmailconf-6.4.22-20.20.1.ppc64le",
"openSUSE Leap 15.3:fetchmailconf-6.4.22-20.20.1.s390x",
"openSUSE Leap 15.3:fetchmailconf-6.4.22-20.20.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:fetchmail-6.4.22-20.20.1.aarch64",
"openSUSE Leap 15.3:fetchmail-6.4.22-20.20.1.ppc64le",
"openSUSE Leap 15.3:fetchmail-6.4.22-20.20.1.s390x",
"openSUSE Leap 15.3:fetchmail-6.4.22-20.20.1.x86_64",
"openSUSE Leap 15.3:fetchmailconf-6.4.22-20.20.1.aarch64",
"openSUSE Leap 15.3:fetchmailconf-6.4.22-20.20.1.ppc64le",
"openSUSE Leap 15.3:fetchmailconf-6.4.22-20.20.1.s390x",
"openSUSE Leap 15.3:fetchmailconf-6.4.22-20.20.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-14T07:58:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-39272"
}
]
}
OPENSUSE-SU-2024:11573-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:fetchmail-6.4.22-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:fetchmail-6.4.22-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:fetchmail-6.4.22-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:fetchmail-6.4.22-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:fetchmailconf-6.4.22-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:fetchmailconf-6.4.22-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:fetchmailconf-6.4.22-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:fetchmailconf-6.4.22-1.1.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "fetchmail-6.4.22-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the fetchmail-6.4.22-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-11573",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11573-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-39272 page",
"url": "https://www.suse.com/security/cve/CVE-2021-39272/"
}
],
"title": "fetchmail-6.4.22-1.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:11573-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "fetchmail-6.4.22-1.1.aarch64",
"product": {
"name": "fetchmail-6.4.22-1.1.aarch64",
"product_id": "fetchmail-6.4.22-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "fetchmailconf-6.4.22-1.1.aarch64",
"product": {
"name": "fetchmailconf-6.4.22-1.1.aarch64",
"product_id": "fetchmailconf-6.4.22-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "fetchmail-6.4.22-1.1.ppc64le",
"product": {
"name": "fetchmail-6.4.22-1.1.ppc64le",
"product_id": "fetchmail-6.4.22-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "fetchmailconf-6.4.22-1.1.ppc64le",
"product": {
"name": "fetchmailconf-6.4.22-1.1.ppc64le",
"product_id": "fetchmailconf-6.4.22-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "fetchmail-6.4.22-1.1.s390x",
"product": {
"name": "fetchmail-6.4.22-1.1.s390x",
"product_id": "fetchmail-6.4.22-1.1.s390x"
}
},
{
"category": "product_version",
"name": "fetchmailconf-6.4.22-1.1.s390x",
"product": {
"name": "fetchmailconf-6.4.22-1.1.s390x",
"product_id": "fetchmailconf-6.4.22-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "fetchmail-6.4.22-1.1.x86_64",
"product": {
"name": "fetchmail-6.4.22-1.1.x86_64",
"product_id": "fetchmail-6.4.22-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "fetchmailconf-6.4.22-1.1.x86_64",
"product": {
"name": "fetchmailconf-6.4.22-1.1.x86_64",
"product_id": "fetchmailconf-6.4.22-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-6.4.22-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:fetchmail-6.4.22-1.1.aarch64"
},
"product_reference": "fetchmail-6.4.22-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-6.4.22-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:fetchmail-6.4.22-1.1.ppc64le"
},
"product_reference": "fetchmail-6.4.22-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-6.4.22-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:fetchmail-6.4.22-1.1.s390x"
},
"product_reference": "fetchmail-6.4.22-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-6.4.22-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:fetchmail-6.4.22-1.1.x86_64"
},
"product_reference": "fetchmail-6.4.22-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmailconf-6.4.22-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:fetchmailconf-6.4.22-1.1.aarch64"
},
"product_reference": "fetchmailconf-6.4.22-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmailconf-6.4.22-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:fetchmailconf-6.4.22-1.1.ppc64le"
},
"product_reference": "fetchmailconf-6.4.22-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmailconf-6.4.22-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:fetchmailconf-6.4.22-1.1.s390x"
},
"product_reference": "fetchmailconf-6.4.22-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmailconf-6.4.22-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:fetchmailconf-6.4.22-1.1.x86_64"
},
"product_reference": "fetchmailconf-6.4.22-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-39272",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-39272"
}
],
"notes": [
{
"category": "general",
"text": "Fetchmail before 6.4.22 fails to enforce STARTTLS session encryption in some circumstances, such as a certain situation with IMAP and PREAUTH.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:fetchmail-6.4.22-1.1.aarch64",
"openSUSE Tumbleweed:fetchmail-6.4.22-1.1.ppc64le",
"openSUSE Tumbleweed:fetchmail-6.4.22-1.1.s390x",
"openSUSE Tumbleweed:fetchmail-6.4.22-1.1.x86_64",
"openSUSE Tumbleweed:fetchmailconf-6.4.22-1.1.aarch64",
"openSUSE Tumbleweed:fetchmailconf-6.4.22-1.1.ppc64le",
"openSUSE Tumbleweed:fetchmailconf-6.4.22-1.1.s390x",
"openSUSE Tumbleweed:fetchmailconf-6.4.22-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-39272",
"url": "https://www.suse.com/security/cve/CVE-2021-39272"
},
{
"category": "external",
"summary": "SUSE Bug 1190069 for CVE-2021-39272",
"url": "https://bugzilla.suse.com/1190069"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:fetchmail-6.4.22-1.1.aarch64",
"openSUSE Tumbleweed:fetchmail-6.4.22-1.1.ppc64le",
"openSUSE Tumbleweed:fetchmail-6.4.22-1.1.s390x",
"openSUSE Tumbleweed:fetchmail-6.4.22-1.1.x86_64",
"openSUSE Tumbleweed:fetchmailconf-6.4.22-1.1.aarch64",
"openSUSE Tumbleweed:fetchmailconf-6.4.22-1.1.ppc64le",
"openSUSE Tumbleweed:fetchmailconf-6.4.22-1.1.s390x",
"openSUSE Tumbleweed:fetchmailconf-6.4.22-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:fetchmail-6.4.22-1.1.aarch64",
"openSUSE Tumbleweed:fetchmail-6.4.22-1.1.ppc64le",
"openSUSE Tumbleweed:fetchmail-6.4.22-1.1.s390x",
"openSUSE Tumbleweed:fetchmail-6.4.22-1.1.x86_64",
"openSUSE Tumbleweed:fetchmailconf-6.4.22-1.1.aarch64",
"openSUSE Tumbleweed:fetchmailconf-6.4.22-1.1.ppc64le",
"openSUSE Tumbleweed:fetchmailconf-6.4.22-1.1.s390x",
"openSUSE Tumbleweed:fetchmailconf-6.4.22-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-39272"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.