CVE-2024-50624

NameCVE-2024-50624
Descriptionispdbservice.cpp in KDE Kmail before 6.2.0 allows man-in-the-middle attackers to trigger use of an attacker-controlled mail server because cleartext HTTP is used for a URL such as http://autoconfig.example.com or http://example.com/.well-known/autoconfig for retrieving the configuration. This is related to kmail-account-wizard.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1086198

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
kmail-account-wizard (PTS)buster4:18.08.3-1vulnerable
bullseye4:20.08.3-1vulnerable
bookworm4:22.12.3-1vulnerable
sid, trixie4:22.12.3-3vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
kmail-account-wizardsourceexperimental4:24.08.0-1
kmail-account-wizardsource(unstable)(unfixed)1086198

Notes

[bookworm] - kmail-account-wizard <no-dsa> (Minor issue)
[bullseye] - kmail-account-wizard <postponed> (Minor issue)
https://bugs.kde.org/show_bug.cgi?id=487882
https://invent.kde.org/pim/kmail-account-wizard/-/commit/9784f5ab41c3aff435d4a88afb25585180a62ee4 (v24.07.80)
Vulnerable code in src/ispdb/ispdb.cpp

Search for package or bug name: Reporting problems