Vulnerability Description
Mail Notification 4.0, when WITH_SSL is set to 0 at compile time, uses unencrypted connections for accounts configured with SSL/TLS, which allows remote attackers to obtain sensitive information by sniffing the network.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Nongnu | Mail Notification | 4.0 |
References
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=428157
- http://osvdb.org/37205
- http://secunia.com/advisories/25600Vendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/34814
- https://savannah.nongnu.org/bugs/index.php?20131
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=428157
- http://osvdb.org/37205
- http://secunia.com/advisories/25600Vendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/34814
- https://savannah.nongnu.org/bugs/index.php?20131
FAQ
What is CVE-2007-3209?
CVE-2007-3209 is a vulnerability with a CVSS score of 7.8 (HIGH). Mail Notification 4.0, when WITH_SSL is set to 0 at compile time, uses unencrypted connections for accounts configured with SSL/TLS, which allows remote attackers to obtain sensitive information by sn...
How severe is CVE-2007-3209?
CVE-2007-3209 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-3209?
Check the references section above for vendor advisories and patch information. Affected products include: Nongnu Mail Notification.