LibEtPan through 1.9.4, as used in MailCore 2 through 0.6.3 and other products, has a STARTTLS buffering issue that affects IMAP, SMTP, and POP3. When a server sends a "begin TLS" response, the client reads additional data (e.g., from a meddler-in-the-middle attacker) and evaluates it in a TLS context, aka "response injection."

Project Subscriptions

Vendors Products
Debian Linux Subscribe
Fedoraproject Subscribe
Libetpan Project Subscribe
Libetpan Subscribe
Libmailcore Subscribe
Mailcore2 Subscribe
Advisories
Source ID Title
Debian DLA Debian DLA DLA-2329-1 libetpan security update
EUVD EUVD EUVD-2020-7924 LibEtPan through 1.9.4, as used in MailCore 2 through 0.6.3 and other products, has a STARTTLS buffering issue that affects IMAP, SMTP, and POP3. When a server sends a "begin TLS" response, the client reads additional data (e.g., from a meddler-in-the-middle attacker) and evaluates it in a TLS context, aka "response injection."
Ubuntu USN Ubuntu USN USN-4598-1 LibEtPan vulnerability
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T13:30:23.456Z

Reserved: 2020-07-27T00:00:00.000Z

Link: CVE-2020-15953

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-07-27T07:15:10.910

Modified: 2024-11-21T05:06:31.700

Link: CVE-2020-15953

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses