CVE Vulnerabilities

CVE-2019-16791

Selection of Less-Secure Algorithm During Negotiation ('Algorithm Downgrade')

Published: Jan 22, 2020 | Modified: Nov 21, 2024
CVSS 3.x
5.9
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
4.3 MEDIUM
AV:N/AC:M/Au:N/C:N/I:N/A:P
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

In postfix-mta-sts-resolver before 0.5.1, All users can receive incorrect response from daemon under rare conditions, rendering downgrade of effective STS policy.

Weakness

A protocol or its implementation supports interaction between multiple actors and allows those actors to negotiate which algorithm should be used as a protection mechanism such as encryption or authentication, but it does not select the strongest algorithm that is available to both parties.

Affected Software

NameVendorStart VersionEnd Version
Postfix-mta-sts-resolverPostfix-mta-sts-resolver_project*0.5.1 (excluding)
Postfix-mta-sts-resolverUbuntufocal*
Postfix-mta-sts-resolverUbuntugroovy*
Postfix-mta-sts-resolverUbuntuhirsute*
Postfix-mta-sts-resolverUbuntuimpish*
Postfix-mta-sts-resolverUbuntukinetic*
Postfix-mta-sts-resolverUbuntulunar*
Postfix-mta-sts-resolverUbuntumantic*
Postfix-mta-sts-resolverUbuntuoracular*
Postfix-mta-sts-resolverUbuntuplucky*
Postfix-mta-sts-resolverUbuntutrusty*

References