Name | CVE-2024-50624 |
Description | ispdbservice.cpp in KDE Kmail before 6.2.0 allows man-in-the-middle attackers to trigger use of an attacker-controlled mail server because cleartext HTTP is used for a URL such as http://autoconfig.example.com or http://example.com/.well-known/autoconfig for retrieving the configuration. This is related to kmail-account-wizard. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 1086198 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
kmail-account-wizard (PTS) | buster | 4:18.08.3-1 | vulnerable |
| bullseye | 4:20.08.3-1 | vulnerable |
| bookworm | 4:22.12.3-1 | vulnerable |
| sid, trixie | 4:22.12.3-3 | vulnerable |
The information below is based on the following data on fixed versions.
Notes
[bookworm] - kmail-account-wizard <no-dsa> (Minor issue)
https://bugs.kde.org/show_bug.cgi?id=487882
https://invent.kde.org/pim/kmail-account-wizard/-/commit/9784f5ab41c3aff435d4a88afb25585180a62ee4 (v24.07.80)
Vulnerable code in src/ispdb/ispdb.cpp