During the plaintext phase of the STARTTLS connection setup, protocol commands could have been injected and evaluated within the encrypted session. This vulnerability affects Thunderbird < 78.7.
References
Link Resource
https://bugzilla.mozilla.org/show_bug.cgi?id=1622640 Exploit Issue Tracking Patch Vendor Advisory
https://www.mozilla.org/security/advisories/mfsa2021-05/ Vendor Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mozilla

Published: 2022-12-22T00:00:00

Updated: 2022-12-22T00:00:00

Reserved: 2020-07-10T00:00:00


Link: CVE-2020-15685

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2022-12-22T20:15:11.467

Modified: 2023-01-04T14:14:21.697


Link: CVE-2020-15685

JSON object: View

cve-icon Redhat Information

No data.

CWE