Bug 1921543 (CVE-2020-15685) - CVE-2020-15685 Mozilla: IMAP Response Injection when using STARTTLS
Summary: CVE-2020-15685 Mozilla: IMAP Response Injection when using STARTTLS
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2020-15685
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1920635 1920636 1920637 1920638 1920640
Blocks: 1920633
TreeView+ depends on / blocked
 
Reported: 2021-01-28 07:00 UTC by Doran Moppert
Modified: 2023-01-30 14:03 UTC (History)
6 users (show)

Fixed In Version: thunderbird 78.7
Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in Mozilla. The Mozilla Foundation Security Advisory describes that during the plaintext phase of the STARTTLS connection setup, protocol commands could have been injected and evaluated within the encrypted session.
Clone Of:
Environment:
Last Closed: 2021-01-28 20:41:38 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2021:0297 0 None None None 2021-01-28 16:10:17 UTC
Red Hat Product Errata RHSA-2021:0298 0 None None None 2021-01-28 16:30:06 UTC
Red Hat Product Errata RHSA-2021:0299 0 None None None 2021-01-28 16:35:40 UTC
Red Hat Product Errata RHSA-2021:0397 0 None None None 2021-02-03 10:43:17 UTC

Description Doran Moppert 2021-01-28 07:00:19 UTC
During the plaintext phase of the STARTTLS connection setup, protocol commands could have been injected and evaluated within the encrypted session.



External Reference:

https://www.mozilla.org/en-US/security/advisories/mfsa2021-05/#CVE-2020-15685

Comment 1 Doran Moppert 2021-01-28 07:00:24 UTC
Acknowledgments:

Name: the Mozilla project
Upstream: Damian Poddebniak

Comment 2 errata-xmlrpc 2021-01-28 16:10:15 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2021:0297 https://access.redhat.com/errata/RHSA-2021:0297

Comment 3 errata-xmlrpc 2021-01-28 16:30:47 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2021:0298 https://access.redhat.com/errata/RHSA-2021:0298

Comment 4 errata-xmlrpc 2021-01-28 16:35:39 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.2 Extended Update Support

Via RHSA-2021:0299 https://access.redhat.com/errata/RHSA-2021:0299

Comment 5 Product Security DevOps Team 2021-01-28 20:41:38 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2020-15685

Comment 6 errata-xmlrpc 2021-02-03 10:43:14 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.1 Extended Update Support

Via RHSA-2021:0397 https://access.redhat.com/errata/RHSA-2021:0397


Note You need to log in before you can comment on or make changes to this bug.