Bug#1086198: kmail-account-wizard: CVE-2024-50624
Source: kmail-account-wizard
Version: 4:22.12.3-3
Severity: important
Tags: security upstream
Forwarded: https://bugs.kde.org/show_bug.cgi?id=487882
X-Debbugs-Cc: carnil@debian.org, Debian Security Team <team@security.debian.org>
Control: fixed -1 4:24.08.0-1
Hi,
The following vulnerability was published for kmail-account-wizard.
CVE-2024-50624[0]:
| ispdbservice.cpp in KDE Kmail before 6.2.0 allows man-in-the-middle
| attackers to trigger use of an attacker-controlled mail server
| because cleartext HTTP is used for a URL such as
| http://autoconfig.example.com or http://example.com/.well-
| known/autoconfig for retrieving the configuration. This is related
| to kmail-account-wizard.
Code was substantially refactored, but the issue is present as well in
older versions.
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2024-50624
https://www.cve.org/CVERecord?id=CVE-2024-50624
[1] https://bugs.kde.org/show_bug.cgi?id=487882
[2] https://invent.kde.org/pim/kmail-account-wizard/-/commit/9784f5ab41c3aff435d4a88afb25585180a62ee4
Please adjust the affected versions in the BTS as needed.
Regards,
Salvatore
Reply to: