Bug 1846556 (CVE-2020-12398) - CVE-2020-12398 Mozilla: Security downgrade with IMAP STARTTLS leads to information leakage
Summary: CVE-2020-12398 Mozilla: Security downgrade with IMAP STARTTLS leads to inform...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2020-12398
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1840095 1840096 1840097 1840098 1840099 1840100 1840101
Blocks: 1840093
TreeView+ depends on / blocked
 
Reported: 2020-06-11 22:09 UTC by msiddiqu
Modified: 2021-02-16 19:54 UTC (History)
4 users (show)

Fixed In Version: thunderbird 68.9.0
Doc Type: If docs needed, set a value
Doc Text:
The Mozilla Foundation Security Advisory describes this flaw as: If Thunderbird is configured to use STARTTLS for an IMAP server, and the server sends a PREAUTH response, then Thunderbird will continue with an unencrypted connection, causing email data to be sent without protection.
Clone Of:
Environment:
Last Closed: 2020-06-19 05:20:38 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2020:2611 0 None None None 2020-06-19 01:54:59 UTC
Red Hat Product Errata RHSA-2020:2613 0 None None None 2020-06-19 03:07:58 UTC
Red Hat Product Errata RHSA-2020:2614 0 None None None 2020-06-19 03:18:14 UTC
Red Hat Product Errata RHSA-2020:2615 0 None None None 2020-06-22 09:37:56 UTC
Red Hat Product Errata RHSA-2020:2616 0 None None None 2020-06-19 01:53:45 UTC

Description msiddiqu 2020-06-11 22:09:40 UTC
If Thunderbird is configured to use STARTTLS for an IMAP
server, and the server sends a PREAUTH response, then
Thunderbird will continue with an unencrypted connection,
causing email data to be sent without protection.



External Reference:

https://www.mozilla.org/en-US/security/advisories/mfsa2020-22/#CVE-2020-12398

Comment 1 msiddiqu 2020-06-11 22:09:45 UTC
Acknowledgments:

Name: the Mozilla project
Upstream: Damian Poddebniak

Comment 2 errata-xmlrpc 2020-06-19 01:53:43 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions

Via RHSA-2020:2616 https://access.redhat.com/errata/RHSA-2020:2616

Comment 3 errata-xmlrpc 2020-06-19 01:54:58 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.1 Extended Update Support

Via RHSA-2020:2611 https://access.redhat.com/errata/RHSA-2020:2611

Comment 4 errata-xmlrpc 2020-06-19 03:07:57 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6

Via RHSA-2020:2613 https://access.redhat.com/errata/RHSA-2020:2613

Comment 5 errata-xmlrpc 2020-06-19 03:18:12 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2020:2614 https://access.redhat.com/errata/RHSA-2020:2614

Comment 6 Product Security DevOps Team 2020-06-19 05:20:38 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2020-12398

Comment 7 errata-xmlrpc 2020-06-22 09:37:53 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2020:2615 https://access.redhat.com/errata/RHSA-2020:2615


Note You need to log in before you can comment on or make changes to this bug.