putmail.py in Putmail before 1.4 does not detect when a user attempts to use TLS with a server that does not support it, which causes putmail.py to send the username and password in plaintext while the user believes encryption is in use, and allows remote attackers to obtain sensitive information.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:27
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/33764 - | |
References | () http://putmail.sourceforge.net/home.html - | |
References | () http://secunia.com/advisories/24266 - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/22718 - | |
References | () http://www.vupen.com/english/advisories/2007/0753 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/32689 - |
Information
Published : 2007-03-02 21:18
Updated : 2024-11-21 00:27
NVD link : CVE-2007-1137
Mitre link : CVE-2007-1137
CVE.ORG link : CVE-2007-1137
JSON object : View
Products Affected
sourceforge
- putmail
CWE