Vulnerability CVE-2020-15685: Information
Description
During the plaintext phase of the STARTTLS connection setup, protocol commands could have been injected and evaluated within the encrypted session. This vulnerability affects Thunderbird < 78.7.
Severity: HIGH (8.8) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Fixed packages
Package name | Branch | Fixed in version | Version from repository | Errata ID | Task # | State |
---|---|---|---|---|---|---|
thunderbird | sisyphus | 78.7.0-alt1 | 115.9.0-alt1 | ALT-PU-2021-1160-1 | 265335 | Fixed |
thunderbird | p10 | 78.7.0-alt1 | 115.9.0-alt1 | ALT-PU-2021-1160-1 | 265335 | Fixed |
thunderbird | p9 | 78.7.0-alt0.1.p9 | 102.11.0-alt0.c9.1 | ALT-PU-2021-1200-1 | 265306 | Fixed |
thunderbird | c10f1 | 78.7.0-alt1 | 115.9.0-alt0.c10.1 | ALT-PU-2021-1160-1 | 265335 | Fixed |
thunderbird | c9f2 | 78.7.0-alt0.1.c9 | 102.11.0-alt0.c9.1 | ALT-PU-2021-1369-1 | 264611 | Fixed |
References to Advisories, Solutions, and Tools
Hyperlink | Resource |
---|---|
https://bugzilla.mozilla.org/show_bug.cgi?id=1622640 |
|
https://www.mozilla.org/security/advisories/mfsa2021-05/ |
|