First published: Wed Oct 15 2014(Updated: )
plugins/rssyl/feed.c in Claws Mail before 3.10.0 disables the CURLOPT_SSL_VERIFYHOST check for CN or SAN host name fields, which makes it easier for remote attackers to spoof servers and conduct man-in-the-middle (MITM) attacks.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mambo CMS | <=3.9.3 | |
SUSE Linux | =12.3 | |
SUSE Linux | =13.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-2576 is considered a medium severity vulnerability due to its potential for enabling man-in-the-middle attacks.
To fix CVE-2014-2576, upgrade Claws Mail to version 3.10.0 or later, where the vulnerability has been patched.
CVE-2014-2576 affects all versions of Claws Mail prior to 3.10.0.
CVE-2014-2576 can facilitate man-in-the-middle (MITM) attacks due to the disabled SSL host verification.
CVE-2014-2576 impacts openSUSE versions 12.3 and 13.1 when using the affected Claws Mail versions.