First published: Fri Jun 09 2006(Updated: )
Sylpheed-Claws before 2.2.2 and Sylpheed before 2.2.6 allow remote attackers to bypass the URI check functionality and makes it easier to conduct phishing attacks via a URI that begins with a space character.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sylpheed | <=2.2.5 | |
Sylpheed | =2.0 | |
Sylpheed | =2.0.1 | |
Sylpheed | =2.0.2 | |
Sylpheed | =2.0.3 | |
Sylpheed | =2.1 | |
Sylpheed | =2.1.1 | |
Sylpheed | =2.1.2 | |
Sylpheed | =2.1.3 | |
Sylpheed | =2.1.4 | |
Sylpheed | =2.1.5 | |
Claws-Mail | <=2.2.1 | |
Claws-Mail | =0.9.4 | |
Claws-Mail | =0.9.5 | |
Claws-Mail | =0.9.6 | |
Claws-Mail | =1.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-2920 is considered a medium severity vulnerability due to its ability to facilitate phishing attacks.
To mitigate CVE-2006-2920, users should upgrade to Sylpheed versions 2.2.6 or higher and Sylpheed-Claws versions 2.2.2 or higher.
CVE-2006-2920 affects Sylpheed versions before 2.2.6 and Sylpheed-Claws versions before 2.2.2.
CVE-2006-2920 can be exploited to conduct phishing attacks by bypassing URI check functionalities.
There are no reliable workarounds for CVE-2006-2920, thus upgrading is strongly recommended.