CVE-2021-39272Cleartext Transmission of Sensitive Info in Fetchmail

Severity
5.9MEDIUMNVD
EPSS
0.2%
top 60.35%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 30
Latest updateMay 24

Description

Fetchmail before 6.4.22 fails to enforce STARTTLS session encryption in some circumstances, such as a certain situation with IMAP and PREAUTH.

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 2.2 | Impact: 3.6

Affected Packages4 packages

debiandebian/fetchmail< fetchmail 6.4.22-1 (bookworm)
NVDfetchmail/fetchmail< 6.4.22
Debianfetchmail/fetchmail< 6.4.22-1+1

Also affects: Fedora 33, 34, 35

🔴Vulnerability Details

2
GHSA
GHSA-x8j8-pwr7-frjw: Fetchmail before 62022-05-24
OSV
CVE-2021-39272: Fetchmail before 62021-08-30

📋Vendor Advisories

3
Microsoft
Fetchmail before 6.4.22 fails to enforce STARTTLS session encryption in some circumstances such as a certain situation with IMAP and PREAUTH.2021-08-10
Red Hat
fetchmail: STARTTLS session encryption bypassing2021-08-10
Debian
CVE-2021-39272: fetchmail - Fetchmail before 6.4.22 fails to enforce STARTTLS session encryption in some cir...2021
CVE-2021-39272 — Fetchmail vulnerability | cvebase