mailing list archives
SSL certificate validation problems in Ximian Evolution
From: Veit Wahlich <veit () legalized de>
Date: 03 Oct 2002 14:00:35 +0200
2002-09-08, Ximian has been informed on 2002-09-09.
medium, if SSL (IMAPS, SMTPS, POP3S) used
none, if not
Ximian Evolution 1.0.x and earlier
Due to missing SSL validation code, Evolution's camel component is
vulnerable to common SSL man-in-the-middle attacks, independent of the
SSL issues currently in discussion. Certificates accepted once are no
longer checked by camel.
The behavior described below has been verified using both self-signed
certificates as well as a regular valid Thawte-signed certificate (but
regarded invalid by camel) for the server and a self-signed certificate
for the attacker. As the valid certificate has been regarded invalid, it
is also needed to be checked out with a certificate from valid oder
According to Ximian, Evolution 1.1.x (beta of upcoming 1.2 branch) is no
longer affected, so those people who would like to trust in SSL
connections should consider upgrading.
Ximian has released Evolution 1.1.1.
Imagine e.g. an IMAP connection over SSL. After a connection breakdown,
Evolution quietly re-establishes the IMAPS connection on next access -
but it seems to not check the identity of the peer.
During the time period no connection is established, the certificate is
replaced, e.g. by a SSL m-i-t-m attack, by the attacker's self-signed
certificate, allowing him to read and even modify all data transfered.
The attacker might also setup SSL m-i-t-m filters first and then
drop/kill the connection still established.
Evolution re-establishes the connection without showing any warning
dialog. Using POP3 and SMTPS over the same certificates (and host) does
not postulate any validation as well.
// Veit Wahlich
- SSL certificate validation problems in Ximian Evolution Veit Wahlich (Oct 03)