CVE-2007-1558

Source
https://nvd.nist.gov/vuln/detail/CVE-2007-1558
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2007-1558.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2007-1558
Downstream
Related
Published
2007-04-16T22:19:00Z
Modified
2025-09-21T16:00:17Z
Summary
[none]
Details

The APOP protocol allows remote attackers to guess the first 3 characters of a password via man-in-the-middle (MITM) attacks that use crafted message IDs and MD5 collisions. NOTE: this design-level issue potentially affects all products that use APOP, including (1) Thunderbird 1.x before 1.5.0.12 and 2.x before 2.0.0.4, (2) Evolution, (3) mutt, (4) fetchmail before 6.3.8, (5) SeaMonkey 1.0.x before 1.0.9 and 1.1.x before 1.1.2, (6) Balsa 2.3.16 and earlier, (7) Mailfilter before 0.8.2, and possibly other products.

References

Affected packages