CVE-2021-39272
NixOS vulnerability analysis and mitigation

Overview

CVE-2021-39272 is a security vulnerability discovered in Fetchmail versions before 6.4.22, where the software fails to enforce STARTTLS session encryption in specific circumstances, particularly with IMAP and PREAUTH situations. The vulnerability was discovered in August 2021 and was publicly disclosed on August 27, 2021 (Openwall Security, Fetchmail Security).

Technical details

The vulnerability occurs when Fetchmail fails to enforce TLS-encrypted transport in specific scenarios: 1) When using IMAP protocol with PREAUTH state, where IMAP RFC-3501 doesn't permit STARTTLS negotiations, 2) When dealing with POP3 servers containing @compuserve.com in the remote name and supporting non-standard 'AUTH' command with RPA mechanism, and 3) When using --auth ssh configuration. The vulnerability has a CVSS 3.1 score of 5.9 (Medium), with network vector, high complexity, no privileges required, and potential for high confidentiality impact (Ubuntu CVE).

Impact

The vulnerability allows Fetchmail to continue with an unencrypted connection, potentially exposing sensitive information during mail retrieval. This could lead to reading unauthenticated input and sending information unencrypted over the transport, making it vulnerable to man-in-the-middle attacks (Openwall Security).

Mitigation and workarounds

The primary mitigation is to upgrade to Fetchmail version 6.4.22 or newer. For cases where immediate upgrade isn't possible, users are recommended to configure their email clients to use Implicit TLS on dedicated ports: SMTP/Submission on port 465, POP3 on port 995, and IMAP on port 993. This configuration provides better security as it avoids the STARTTLS negotiation entirely (Openwall Security, No STARTTLS).

Additional resources


SourceThis report was generated using AI

Related NixOS vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-69264CRITICAL9.8
  • JavaScriptJavaScript
  • pnpm
NoYesJan 07, 2026
CVE-2025-69263HIGH8.8
  • JavaScriptJavaScript
  • pnpm
NoYesJan 07, 2026
CVE-2025-69262HIGH7.8
  • JavaScriptJavaScript
  • pnpm
NoYesJan 07, 2026
CVE-2025-20807MEDIUM6.7
  • NixOSNixOS
  • android
NoNoJan 06, 2026
CVE-2026-21885MEDIUM6.5
  • NixOSNixOS
  • miniflux
NoYesJan 08, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management