Vulnerability CVE-2020-15685: Information

Description

During the plaintext phase of the STARTTLS connection setup, protocol commands could have been injected and evaluated within the encrypted session. This vulnerability affects Thunderbird < 78.7.

Severity: HIGH (8.8) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Published: Dec. 22, 2022
Modified: Jan. 4, 2023
Error type identifier: CWE-77

Fixed packages

Package name
Branch
Fixed in version
Version from repository
Errata ID
Task #
State
thunderbirdsisyphus78.7.0-alt1115.9.0-alt1ALT-PU-2021-1160-1265335Fixed
thunderbirdp1078.7.0-alt1115.9.0-alt1ALT-PU-2021-1160-1265335Fixed
thunderbirdp978.7.0-alt0.1.p9102.11.0-alt0.c9.1ALT-PU-2021-1200-1265306Fixed
thunderbirdc10f178.7.0-alt1115.9.0-alt0.c10.1ALT-PU-2021-1160-1265335Fixed
thunderbirdc9f278.7.0-alt0.1.c9102.11.0-alt0.c9.1ALT-PU-2021-1369-1264611Fixed

References to Advisories, Solutions, and Tools

Hyperlink
Resource
https://bugzilla.mozilla.org/show_bug.cgi?id=1622640
  • Exploit
  • Issue Tracking
  • Patch
  • Vendor Advisory
https://www.mozilla.org/security/advisories/mfsa2021-05/
  • Vendor Advisory
    1. Configuration 1

      cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
      End excliding
      78.7.0