First published: Fri Jul 20 2018(Updated: )
camel/providers/imapx/camel-imapx-server.c in the IMAPx component in GNOME evolution-data-server before 3.21.2 proceeds with cleartext data containing a password if the client wishes to use STARTTLS but the server will not use STARTTLS, which makes it easier for remote attackers to obtain sensitive information by sniffing the network. The server code was intended to report an error and not proceed, but the code was written incorrectly.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
GNOME Evolution | <3.21.2 | |
ubuntu/evolution-data-server | <3.10.4-0ubuntu1.6 | 3.10.4-0ubuntu1.6 |
ubuntu/evolution-data-server | <3.21.2 | 3.21.2 |
ubuntu/evolution-data-server | <3.18.5-1ubuntu1.1 | 3.18.5-1ubuntu1.1 |
debian/evolution-data-server | 3.38.3-1+deb11u2 3.46.4-2 3.53.2-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-10727 is a critical vulnerability in GNOME evolution-data-server that allows remote attackers to obtain sensitive information.
CVE-2016-10727 affects evolution-data-server versions before 3.21.2.
CVE-2016-10727 has a severity rating of 9.8 (Critical).
To fix CVE-2016-10727, you should update evolution-data-server to version 3.21.2 or higher.
You can find more information about CVE-2016-10727 in the references provided: [link 1], [link 2], [link 3].