CVE-2013-4584

See a problem?
Source
https://nvd.nist.gov/vuln/detail/CVE-2013-4584
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2013-4584.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2013-4584
Published
2019-11-15T15:15:11Z
Modified
2024-06-30T12:01:22Z
Severity
  • 5.9 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N CVSS Calculator
Summary
[none]
Details

Perdition before 2.2 may have weak security when handling outbound connections, caused by an error in the STARTTLS IMAP and POP server. ssloutgoingciphers not being applied to STARTTLS connections

References

Affected packages

Debian:11 / perdition

Package

Name
perdition
Purl
pkg:deb/debian/perdition?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.1-1

Ecosystem specific

{
    "urgency": "low"
}

Debian:12 / perdition

Package

Name
perdition
Purl
pkg:deb/debian/perdition?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.1-1

Ecosystem specific

{
    "urgency": "low"
}

Debian:13 / perdition

Package

Name
perdition
Purl
pkg:deb/debian/perdition?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.1-1

Ecosystem specific

{
    "urgency": "low"
}