Vulnerability Description
The APOP protocol allows remote attackers to guess the first 3 characters of a password via man-in-the-middle (MITM) attacks that use crafted message IDs and MD5 collisions. NOTE: this design-level issue potentially affects all products that use APOP, including (1) Thunderbird 1.x before 1.5.0.12 and 2.x before 2.0.0.4, (2) Evolution, (3) mutt, (4) fetchmail before 6.3.8, (5) SeaMonkey 1.0.x before 1.0.9 and 1.1.x before 1.1.2, (6) Balsa 2.3.16 and earlier, (7) Mailfilter before 0.8.2, and possibly other products.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apop Protocol | Apop Protocol | All versions |
References
- ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc
- http://balsa.gnome.org/download.html
- http://docs.info.apple.com/article.html?artnum=305530
- http://fetchmail.berlios.de/fetchmail-SA-2007-01.txt
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00774579
- http://lists.apple.com/archives/security-announce/2007/May/msg00004.html
- http://mail.gnome.org/archives/balsa-list/2007-July/msg00000.html
- http://secunia.com/advisories/25353
- http://secunia.com/advisories/25402Vendor Advisory
- http://secunia.com/advisories/25476
- http://secunia.com/advisories/25496Vendor Advisory
- http://secunia.com/advisories/25529Vendor Advisory
- http://secunia.com/advisories/25534
- http://secunia.com/advisories/25546Vendor Advisory
FAQ
What is CVE-2007-1558?
CVE-2007-1558 is a vulnerability with a CVSS score of 2.6 (LOW). The APOP protocol allows remote attackers to guess the first 3 characters of a password via man-in-the-middle (MITM) attacks that use crafted message IDs and MD5 collisions. NOTE: this design-level i...
How severe is CVE-2007-1558?
CVE-2007-1558 has been rated LOW with a CVSS base score of 2.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-1558?
Check the references section above for vendor advisories and patch information. Affected products include: Apop Protocol Apop Protocol.