Thunderbird ignored the configuration to require STARTTLS security for an SMTP connection. A MITM could perform a downgrade attack to intercept transmitted messages, or could take control of the authenticated session to execute SMTP commands chosen by the MITM. If an unprotected authentication method was configured, the MITM could obtain the authentication credentials, too. This vulnerability affects Thunderbird < 91.2.
References
Link Resource
https://bugzilla.mozilla.org/show_bug.cgi?id=1733366 Issue Tracking Permissions Required Vendor Advisory
https://lists.debian.org/debian-lts-announce/2022/01/msg00001.html Mailing List Third Party Advisory
https://www.debian.org/security/2022/dsa-5034 Issue Tracking Third Party Advisory
https://www.mozilla.org/security/advisories/mfsa2021-47/ Vendor Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mozilla

Published: 2021-11-03T00:02:49

Updated: 2022-01-04T11:06:32

Reserved: 2021-08-10T00:00:00


Link: CVE-2021-38502

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2021-11-03T01:15:07.657

Modified: 2022-07-12T17:42:04.277


Link: CVE-2021-38502

JSON object: View

cve-icon Redhat Information

No data.