1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
|
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
fetchmail-SA-2006-02: TLS enforcement problem/MITM attack/password exposure
Topics: fetchmail cannot enforce TLS
Author: Matthias Andree
Version: 1.1
Announced: 2007-01-04
Type: secret information disclosure
Impact: fetchmail can expose cleartext password over unsecure link
fetchmail may not detect man in the middle attacks
Danger: medium
Credits: Isaac Wilcox (bug report, testing, collaboration on fix)
CVE Name: CVE-2006-5867
URL: http://fetchmail.sourceforge.net/fetchmail-SA-2006-02.txt
Project URL: http://fetchmail.sourceforge.net/
Affects: fetchmail releases <= 6.3.5
fetchmail release candidates 6.3.6-rc1, -rc2, -rc3
Not affected: fetchmail release candidates 6.3.6-rc4, -rc5
fetchmail release 6.3.6
fetchmail release 6.3.7
Corrected: 2006-11-26 fetchmail 6.3.6-rc4
0. Release history
==================
2006-11-16 v0.01 internal review draft
2006-11-26 v0.02 revise failure cases, workaround, add acknowledgments
2006-11-27 v0.03 add more vulnerabilities
2007-01-04 v1.0 ready for release
2007-02-18 v1.1 mention 6.3.7 that fixes two regressions
1. Background
=============
fetchmail is a software package to retrieve mail from remote POP2, POP3,
IMAP, ETRN or ODMR servers and forward it to local SMTP, LMTP servers or
message delivery agents.
fetchmail ships with a graphical, Python/Tkinter based configuration
utility named "fetchmailconf" to help the user create configuration (run
control) files for fetchmail.
2. Problem description and Impact
=================================
Fetchmail has had several nasty password disclosure vulnerabilities for
a long time. It was only recently that these have been found.
V1. sslcertck/sslfingerprint options should have implied "sslproto tls1"
in order to enforce TLS negotiation, but did not.
V2. Even with "sslproto tls1" in the config, fetches would go ahead
in plain text if STLS/STARTTLS wasn't available (not advertised,
or advertised but rejected).
V3. POP3 fetches could completely ignore all TLS options whether
available or not because it didn't reliably issue CAPA before
checking for STLS support - but CAPA is a requisite for STLS.
Whether or not CAPAbilities were probed, depended on the "auth"
option. (Fetchmail only tried CAPA if the auth option was not set at
all, was set to gssapi, kerberos, kerberos_v4, otp, or cram-md5.)
V4. POP3 could fall back to using plain text passwords, even if strong
authentication had been configured.
V5. POP2 would not complain if strong authentication or TLS had been
requested.
This can cause eavesdroppers to obtain the password, depending on the
authentication scheme that is configured or auto-selected, and
subsequently impersonate somebody else when logging into the upstream
server.
3. Workaround
=============
If your upstream offers SSLv3-wrapped service on a dedicated port,
use fetchmail --ssl --sslcertck --sslproto ssl3 on the command line,
or equivalent in the run control file. This encrypts the whole session.
4. Solution
===========
The earlier recommendation to install 6.3.6 is hereby updated, since
version 6.3.6 introduced two new regressions fixed in 6.3.7: one broke
KPOP altogether and one broke the automatic POP3 retries without TLS
if a server advertised TLS but then closed the connection and TLS
wasn't enforced.
Download and install fetchmail 6.3.7 or a newer stable release from
fetchmail's project site at
<http://sourceforge.net/projects/fetchmail/files/>.
5. Acknowledgments
==================
Isaac Wilcox has been a great help with testing the fixes and getting
them right.
A. Copyright, License and Warranty
==================================
(C) Copyright 2007 by Matthias Andree, <matthias.andree@gmx.de>.
Some rights reserved.
This work is licensed under the
Creative Commons Attribution-NoDerivs 3.0 Germany License (CC BY-ND 3.0).
To view a copy of this license, visit
http://creativecommons.org/licenses/by-nd/3.0/de/deed.en
or send a letter to:
Creative Commons
444 Castro Street
Suite 900
MOUNTAIN VIEW, CALIFORNIA 94041
USA
THIS WORK IS PROVIDED FREE OF CHARGE AND WITHOUT ANY WARRANTIES.
Use the information herein at your own risk.
END OF fetchmail-SA-2006-02.txt
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
iEYEARECAAYFAlN9DK0ACgkQvmGDOQUufZU41wCfaHJrbV3wTOWIYY6ExBcmboy1
BC8AoOphRY3GVah+xgHg+mOjIPQ4eXeO
=wjDV
-----END PGP SIGNATURE-----
|