First published: Wed Oct 08 2014(Updated: )
The IMAP-over-SSL implementation in getmail 4.44.0 does not verify that the server hostname matches a domain name in the subject's Common Name (CN) field of the X.509 certificate, which allows man-in-the-middle attackers to spoof IMAP servers and obtain sensitive information via a crafted certificate from a recognized Certification Authority.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
getmail | =4.44.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-7274 is considered a medium severity vulnerability due to its potential for man-in-the-middle attacks.
To fix CVE-2014-7274, it is recommended to upgrade to a version of getmail that correctly verifies server hostname in X.509 certificates.
CVE-2014-7274 exposes users to man-in-the-middle attacks by allowing attackers to spoof IMAP servers.
The affected version of getmail is 4.44.0.
CVE-2014-7274 impacts the security of email communications by potentially allowing sensitive information to be obtained through spoofed IMAP servers.