Source: kmail-account-wizard
Version: 4:22.12.3-3
Severity: important
Tags: security upstream
Forwarded: https://bugs.kde.org/show_bug.cgi?id=487882
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>
Control: fixed -1 4:24.08.0-1

Hi,

The following vulnerability was published for kmail-account-wizard.

CVE-2024-50624[0]:
| ispdbservice.cpp in KDE Kmail before 6.2.0 allows man-in-the-middle
| attackers to trigger use of an attacker-controlled mail server
| because cleartext HTTP is used for a URL such as
| http://autoconfig.example.com or http://example.com/.well-
| known/autoconfig for retrieving the configuration. This is related
| to kmail-account-wizard.

Code was substantially refactored, but the issue is present as well in
older versions.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2024-50624
    https://www.cve.org/CVERecord?id=CVE-2024-50624
[1] https://bugs.kde.org/show_bug.cgi?id=487882
[2] 
https://invent.kde.org/pim/kmail-account-wizard/-/commit/9784f5ab41c3aff435d4a88afb25585180a62ee4

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to