Research > Zero-Day Tracker > 20140311
Claws Mail Plugins Certificate Verification Vulnerabilities
Patch Not Yet Available
Claws Mail 3.9.3 and possibly earlier versions
Claws Mail contains two vulnerabilities whereby an attacker may be permitted to perform spoofing attacks, allowing for man-in-the-middle interception of potentially sensitive information. These issues are caused by plugins within Claws Mail, vCalendar and RSSyl, that do not properly verify SSL certificates.
Security Feature Bypass
Because two plugins within Claws Mail do not properly verify SSL certificates, a remote attacker may spoof a mail server or similar server asset which Claws Mail is communicating with. By not verifying the SSL certificate properly, Claws Mail will continue to communicate with the spoofed server, possibly disclosing sensitive information to the attacker.
There are no mitigations currently available. Avoid using Claws Mail plugins vCalendar and RSSyl, if possible.
BeyondTrust's Retina® Network Security Scanner scans devices to detect for this vulnerability.
33367 - Claws Mail 3.9.3 and Prior SSL Verification Issue (Zero-Day) - Windows
33368 - Claws Mail 3.9.3 and Prior SSL Verification Issue (Zero-Day) - Windows x86
33369 - Claws Mail 3.9.3 and Prior SSL Verification Issue (Zero-Day) - UNIX/Linux
3/11/2014 - Original advisory released.
Copyright ©1998-2011 eEye Digital Security
Permission is hereby granted for the redistribution of this alert electronically. It is not to be edited in any way without express consent of eEye. If you wish to reprint the whole or any part of this alert in any other medium excluding electronic medium, please email alert@eEye.com for permission.
The information within this paper may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are no warranties, implied or express, with regard to this information. In no event shall the author be liable for any direct or indirect damages whatsoever arising out of or in connection with the use or spread of this information. Any use of this information is at the user's own risk.