Bugzilla – Bug 1174579
VUL-0: CVE-2020-15953: libetpan: response injection via STARTTLS in IMAP
Last modified: 2021-08-09 11:40:30 UTC
CVE-2020-15953 LibEtPan through 1.9.4, as used in MailCore 2 through 0.6.3 and other products, has a STARTTLS buffering issue that affects IMAP, SMTP, and POP3. When a server sends a "begin TLS" response, the client reads additional data (e.g., from a meddler-in-the-middle attacker) and evaluates it in a TLS context, aka "response injection." Reference: https://github.com/dinhvh/libetpan/issues/386 References: https://bugzilla.redhat.com/show_bug.cgi?id=1861068 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15953 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15953 https://github.com/dinhvh/libetpan/issues/386
This is an autogenerated message for OBS integration: This bug (1174579) was mentioned in https://build.opensuse.org/request/show/826908 Factory / libetpan https://build.opensuse.org/request/show/826909 15.2 / libetpan
openSUSE-SU-2020:1454-1: An update that fixes one vulnerability is now available. Category: security (moderate) Bug References: 1174579 CVE References: CVE-2020-15953 JIRA References: Sources used: openSUSE Leap 15.2 (src): libetpan-1.9.4-lp152.3.3.1
openSUSE-SU-2020:1505-1: An update that fixes one vulnerability is now available. Category: security (moderate) Bug References: 1174579 CVE References: CVE-2020-15953 JIRA References: Sources used: openSUSE Backports SLE-15-SP2 (src): libetpan-1.9.4-bp152.4.3.1
released