--===============0524258488532916560== Content-Type: multipart/alternative; boundary=089e0149ced62aea4304fc21ceb9 --089e0149ced62aea4304fc21ceb9 Content-Type: text/plain; charset=ISO-8859-1 KDE Project Security Advisory ============================= Title: KMail/KIO POP3 SSL MITM Flaw Risk Rating: Medium CVE: CVE-2014-3494 Platforms: All Versions: kdelibs 4.10.95 to 4.13.2 Author: Richard J. Moore Date: 17 June 2014 Overview ======== The POP3 kioslave used by kmail will accept invalid certificates without presenting a dialog to the user due a bug that leads to an inability to display the dialog combined with an error in the way the result is checked. Impact ====== This flaw allows an active attacker to perform MITM attacks against the ioslave which could result in the leakage of sensitive data such as the authentication details and the contents of emails. Workaround ========== None Solution ======== Upgrade to version 4.13.3 or apply the patch at http://quickgit.kde.org/?p=kdelibs.git&a=commitdiff&h=bbae87dc1be3ae063796a582774bd5642cacdd5d&hp=1ccdb43ed3b32a7798eec6d39bb3c83a6e40228f Credits ======= Thanks to Jim Scadden for reporting this issue and writing the initial fix, and to David Faure for reviewing and improving the fix. --089e0149ced62aea4304fc21ceb9 Content-Type: text/html; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable
KDE Project Security Advisory
=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

Title: = =A0 =A0 =A0 =A0 =A0KMail/KIO POP3 SSL MITM Flaw
Risk Rating: =A0 =A0Medi= um
CVE: =A0 =A0 =A0 =A0 =A0 =A0CVE-2014-3494
Platforms: =A0 =A0 =A0All
<= /div>Versions: = =A0 =A0 =A0 kdelibs 4.10.95 to 4.13.2
Aut= hor: =A0 =A0 =A0 =A0 Richard J. Moore <r= ich@kde.org>
Date: =A0 =A0 =A0 =A0 =A0 17 June 2014

Overvi= ew
=3D=3D=3D=3D=3D=3D=3D=3D

The POP3 kioslave used by kmail will accept invalid certificates withoutpresenting a dialog to the user due a bug that leads to an inability todisplay the dialog combined with an error in the way the result is checked= .

Impact
=3D=3D=3D=3D=3D=3D

This flaw allows an active attacker= to perform MITM attacks against the
ioslave which could result in the l= eakage of sensitive data such as the
authentication details and the cont= ents of emails.

Workaround
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

None

Solutio= n
=3D=3D=3D=3D=3D=3D=3D=3D

Upgrade to version 4.13.3 or apply the patch at=
http://quickgit.kde.org/?p=3Dkdelibs.git&a=3Dcommitdi= ff&h=3Dbbae87dc1be3ae063796a582774bd5642cacdd5d&hp=3D1ccdb43ed3b32a= 7798eec6d39bb3c83a6e40228f
Credits
=3D=3D=3D=3D=3D=3D=3D

Thanks to Jim Scadden for reportin= g this issue and writing the initial fix,
and to David Faure for reviewing and im= proving the fix.
--089e0149ced62aea4304fc21ceb9-- --===============0524258488532916560== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline _______________________________________________ kde-announce mailing list kde-announce@kde.org https://mail.kde.org/mailman/listinfo/kde-announce --===============0524258488532916560==--