evolution-data-server (eds) through 3.36.3 has a STARTTLS buffering issue that affects SMTP and POP3. When a server sends a "begin TLS" response, eds reads additional data and evaluates it in a TLS context, aka "response injection."
References
Link | Resource |
---|---|
https://bugzilla.suse.com/show_bug.cgi?id=1173910 | Issue Tracking Patch Third Party Advisory |
https://gitlab.gnome.org/GNOME//evolution-data-server/commit/ba82be72cfd427b5d72ff21f929b3a6d8529c4df | Patch Third Party Advisory |
https://gitlab.gnome.org/GNOME/evolution-data-server/-/commit/f404f33fb01b23903c2bbb16791c7907e457fbac | Patch Third Party Advisory |
https://gitlab.gnome.org/GNOME/evolution-data-server/-/issues/226 | Exploit Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2020/07/msg00012.html | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QMBEZWA22EAYAZQWUX4KPEBER726KSIG/ | |
https://security-tracker.debian.org/tracker/DLA-2281-1 | Third Party Advisory |
https://security-tracker.debian.org/tracker/DSA-4725-1 | Third Party Advisory |
https://usn.ubuntu.com/4429-1/ | Third Party Advisory |
https://www.debian.org/security/2020/dsa-4725 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2020-07-17T15:30:42
Updated: 2020-08-01T05:06:23
Reserved: 2020-06-19T00:00:00
Link: CVE-2020-14928
JSON object: View
NVD Information
Status : Modified
Published: 2020-07-17T16:15:11.387
Modified: 2023-11-07T03:17:22.757
Link: CVE-2020-14928
JSON object: View
Redhat Information
No data.
CWE