CVE-2021-39272

Name
CVE-2021-39272
Description
Fetchmail before 6.4.22 fails to enforce STARTTLS session encryption in some circumstances, such as a certain situation with IMAP and PREAUTH.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
MISC https://nostarttls.secvuln.info/
MISC http://www.openwall.com/lists/oss-security/2021/08/27/3
MISC https://www.fetchmail.info/security.html
FEDORA https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L3XJ6XLEJCEZCAM5LGGD6XBCC522QLG4/
FEDORA https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZYCYLL73NP7ALJWSDICIVSA47ZIXWSSA/
FEDORA https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXMKSEHAQSEDCWZMAOJEGX3P3JW6QY6H/

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:fetchmail:fetchmail:*:*:*:*:*:*:*:* fetchmail >= None < 6.4.22

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
fetchmail 3.12-main 6.4.5-r0 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable
fetchmail 3.11-main 6.4.1-r1 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable
fetchmail 3.14-community 6.4.22-r0 Natanael Copa <ncopa@alpinelinux.org> fixed