CVE-2016-10727
moderate-risk
Published 2018-07-20
camel/providers/imapx/camel-imapx-server.c in the IMAPx component in GNOME evolution-data-server before 3.21.2 proceeds with cleartext data containing a password if the client wishes to use STARTTLS but the server will not use STARTTLS, which makes it easier for remote attackers to obtain sensitive information by sniffing the network. The server code was intended to report an error and not proceed, but the code was written incorrectly.
Do I need to act?
~
1.0% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
+
Fix available
Upgrade to: 63438409a26d71152d9b4fab5efaadf7d55f80cc, 7ce2be895c50b16d3450a2d4d30eed0bd9b43f8e, f26a6f67
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Products (3)
References (10)
Third Party Advisory
https://github.com/GNOME/evolution-data-server/releases/tag/EVOLUTION_DATA_SERVE...
Third Party Advisory
https://usn.ubuntu.com/3724-1/
Third Party Advisory
https://github.com/GNOME/evolution-data-server/releases/tag/EVOLUTION_DATA_SERVE...
Third Party Advisory
https://usn.ubuntu.com/3724-1/
44
/ 100
moderate-risk
Severity
32/34 · Critical
Exploitability
3/34 · Minimal
Exposure
9/34 · Low