CVE-2024-34083

Published at:
2024-05-18T19:15:49.190

Global infos:

aiosmptd is a reimplementation of the Python stdlib smtpd.py based on asyncio. Prior to version 1.4.6, servers based on aiosmtpd accept extra unencrypted commands after STARTTLS, treating them as if they came from inside the encrypted connection. This could be exploited by a man-in-the-middle attack. Version 1.4.6 contains a patch for the issue.

CVE Status: Awaiting Analysis

References:

  • [email protected]
  • [email protected]
  • [email protected]
  • af854a3a-2127-422b-91ae-364da2661108
  • af854a3a-2127-422b-91ae-364da2661108
  • af854a3a-2127-422b-91ae-364da2661108
  • Metrics:

    AttributeValue
    Attack ComplexityLOW
    Attack VectorADJACENT_NETWORK
    Availability ImpactNONE
    Base Score5.4
    Base SeverityMEDIUM
    Confidentiality ImpactLOW
    Integrity ImpactLOW
    Privileges RequiredNONE
    ScopeUNCHANGED
    User InteractionNONE
    Vector StringCVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
    Exploitability Score2.8
    Impact Score2.5
    Source[email protected]
    TypeSecondary

    Links:

    Exploit-db
    Github