Bug ID | 1224467 |
---|---|
Summary | VUL-0: CVE-2024-34083: python-aiosmtpd: MiTM attack could inject extra unencrypted commands after STARTTLS |
Classification | openSUSE |
Product | openSUSE Distribution |
Version | Leap 15.6 |
Hardware | Other |
URL | https://smash.suse.de/issue/406536/ |
OS | Other |
Status | NEW |
Severity | Normal |
Priority | P5 - None |
Component | Security |
Assignee | python-maintainers@suse.com |
Reporter | smash_bz@suse.de |
QA Contact | security-team@suse.de |
CC | andrea.mattiazzo@suse.com |
Target Milestone | --- |
Found By | Security Response Team |
Blocker | --- |
aiosmptd is a reimplementation of the Python stdlib smtpd.py based on asyncio. Prior to version 1.4.6, servers based on aiosmtpd accept extra unencrypted commands after STARTTLS, treating them as if they came from inside the encrypted connection. This could be exploited by a man-in-the-middle attack. Version 1.4.6 contains a patch for the issue. References: https://nostarttls.secvuln.info http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-34083 https://www.cve.org/CVERecord?id=CVE-2024-34083 https://github.com/aio-libs/aiosmtpd/commit/b3a4a2c6ecfd228856a20d637dc383541fcdbfda https://github.com/aio-libs/aiosmtpd/security/advisories/GHSA-wgjv-9j3q-jhg8 https://bugzilla.redhat.com/show_bug.cgi?id=2281505