CVE-2024-34083

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-34083
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-34083.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-34083
Aliases
Related
Published
2024-05-18T19:15:49Z
Modified
2024-10-12T11:23:58.096423Z
Summary
[none]
Details

aiosmptd is a reimplementation of the Python stdlib smtpd.py based on asyncio. Prior to version 1.4.6, servers based on aiosmtpd accept extra unencrypted commands after STARTTLS, treating them as if they came from inside the encrypted connection. This could be exploited by a man-in-the-middle attack. Version 1.4.6 contains a patch for the issue.

References

Affected packages

Debian:11 / python-aiosmtpd

Package

Name
python-aiosmtpd
Purl
pkg:deb/debian/python-aiosmtpd?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.2.2-1+deb11u1

Affected versions

1.*

1.2.2-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / python-aiosmtpd

Package

Name
python-aiosmtpd
Purl
pkg:deb/debian/python-aiosmtpd?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.4.3-1.1+deb12u1

Affected versions

1.*

1.4.3-1.1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / python-aiosmtpd

Package

Name
python-aiosmtpd
Purl
pkg:deb/debian/python-aiosmtpd?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.4.6-1

Affected versions

1.*

1.4.3-1.1
1.4.4.post2-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Git / github.com/aio-libs/aiosmtpd

Affected ranges

Type
GIT
Repo
https://github.com/aio-libs/aiosmtpd
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

1.*

1.0
1.0a1
1.0a2
1.0a3
1.0a4
1.0a5
1.0b1
1.0rc1
1.1
1.2
1.2-rc
1.2.1
1.2.2
1.2.3
1.2.4
1.3.0
1.3.0a2
1.3.0a3
1.3.1
1.3.2
1.4.0
1.4.1
1.4.2
1.4.3
1.4.3rc1
1.4.3rc2
1.4.4
1.4.4.post2

v1.*

v1.4.5