4.3
CVSSv2

CVE-2021-39272

Published: 30/08/2021 Updated: 07/11/2023
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 5.9 | Impact Score: 3.6 | Exploitability Score: 2.2
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

Fetchmail prior to 6.4.22 fails to enforce STARTTLS session encryption in some circumstances, such as a certain situation with IMAP and PREAUTH.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

fetchmail fetchmail

fedoraproject fedora 33

fedoraproject fedora 34

fedoraproject fedora 35

Vendor Advisories

Debian Bug report logs - #993163 fetchmail: CVE-2021-39272 Package: src:fetchmail; Maintainer for src:fetchmail is Laszlo Boszormenyi (GCS) <gcs@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sat, 28 Aug 2021 08:27:01 UTC Severity: important Tags: security, upstream Found in versions fetchm ...
Fetchmail before 6422 fails to enforce STARTTLS session encryption in some circumstances, such as a certain situation with IMAP and PREAUTH ...
Severity Unknown Remote Unknown Type Unknown Description AVG-2326 fetchmail 6421-1 Unknown Vulnerable ...

Mailing Lists

<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> ANNOUNCE: fetchmail security announcement 2021-02 (CVE-2021-39272) - TLS bypass vulnerabilities ("NO STARTTLS") <!--X-Subject- ...