First published: Thu Jul 26 2018(Updated: )
Jon Kristensen discovered that Evolution Data Server would automatically downgrade a connection to an IMAP server if the IMAP server did not support SSL. This would result in the user's password being unexpectedly sent in clear text, even though the user had requested to use SSL.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/evolution-data-server | <3.18.5-1ubuntu1.1 | 3.18.5-1ubuntu1.1 |
=16.04 | ||
All of | ||
ubuntu/evolution-data-server-common | <3.18.5-1ubuntu1.1 | 3.18.5-1ubuntu1.1 |
=16.04 | ||
All of | ||
ubuntu/libcamel-1.2-54 | <3.18.5-1ubuntu1.1 | 3.18.5-1ubuntu1.1 |
=16.04 | ||
All of | ||
ubuntu/libebackend-1.2-10 | <3.18.5-1ubuntu1.1 | 3.18.5-1ubuntu1.1 |
=16.04 | ||
All of | ||
ubuntu/libedataserver-1.2-21 | <3.18.5-1ubuntu1.1 | 3.18.5-1ubuntu1.1 |
=16.04 | ||
All of | ||
ubuntu/evolution-data-server | <3.10.4-0ubuntu1.6 | 3.10.4-0ubuntu1.6 |
=14.04 | ||
All of | ||
ubuntu/evolution-data-server-common | <3.10.4-0ubuntu1.6 | 3.10.4-0ubuntu1.6 |
=14.04 | ||
All of | ||
ubuntu/libcamel-1.2-45 | <3.10.4-0ubuntu1.6 | 3.10.4-0ubuntu1.6 |
=14.04 | ||
All of | ||
ubuntu/libebackend-1.2-7 | <3.10.4-0ubuntu1.6 | 3.10.4-0ubuntu1.6 |
=14.04 | ||
All of | ||
ubuntu/libedataserver-1.2-18 | <3.10.4-0ubuntu1.6 | 3.10.4-0ubuntu1.6 |
=14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Evolution Data Server vulnerability is USN-3724-1.
This vulnerability was discovered by Jon Kristensen.
The impact of this vulnerability is that the user's password may be sent in clear text, even if SSL was requested.
The affected software versions are 3.18.5-1ubuntu1.1 and 3.10.4-0ubuntu1.6.
To fix this vulnerability, update Evolution Data Server to version 3.18.5-1ubuntu1.1 or 3.10.4-0ubuntu1.6.