Martin Lambers mpop before 1.0.19, when OpenSSL is used, does not properly handle a '\0' character in a domain name in the (1) subject's Common Name or (2) Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408. Reference: CONFIRM:http://mpop.sourceforge.net/news.html Reference: URL:http://secunia.com/advisories/37312 Reference: URL:http://www.vupen.com/english/advisories/2009/3225
Created mpop tracking bugs for this issue CVE-2009-3941 Affects: F10 [bug #537928] CVE-2009-3941 Affects: F11 [bug #537929] CVE-2009-3941 Affects: F12 [bug #537930] CVE-2009-3941 Affects: Fdevel [bug #537931]
mpop-1.0.19-1.fc11 has been submitted as an update for Fedora 11. http://admin.fedoraproject.org/updates/mpop-1.0.19-1.fc11
mpop-1.0.19-1.fc12 has been submitted as an update for Fedora 12. http://admin.fedoraproject.org/updates/mpop-1.0.19-1.fc12
(In reply to comment #0) > Martin Lambers mpop before 1.0.19, when OpenSSL is used Fedora mpop and msmtp packages are using GnuTLS, hence should not need this fix. My tests with --serverinfo always result in "the certificate owner does not match hostname" error. Ok to close:notabug and change update requests to bugfix / enhancement?