Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-14928

Опубликовано: 17 июл. 2020
Источник: debian
EPSS Низкий

Описание

evolution-data-server (eds) through 3.36.3 has a STARTTLS buffering issue that affects SMTP and POP3. When a server sends a "begin TLS" response, eds reads additional data and evaluates it in a TLS context, aka "response injection."

Пакеты

ПакетСтатусВерсия исправленияРелизТип
evolution-data-serverfixed3.36.4-1package

Примечания

  • https://gitlab.gnome.org/GNOME/evolution-data-server/-/issues/226

  • https://gitlab.gnome.org/GNOME//evolution-data-server/commit/ba82be72cfd427b5d72ff21f929b3a6d8529c4df

EPSS

Процентиль: 88%
0.04044
Низкий

Связанные уязвимости

CVSS3: 5.9
ubuntu
почти 5 лет назад

evolution-data-server (eds) through 3.36.3 has a STARTTLS buffering issue that affects SMTP and POP3. When a server sends a "begin TLS" response, eds reads additional data and evaluates it in a TLS context, aka "response injection."

CVSS3: 5.3
redhat
почти 5 лет назад

evolution-data-server (eds) through 3.36.3 has a STARTTLS buffering issue that affects SMTP and POP3. When a server sends a "begin TLS" response, eds reads additional data and evaluates it in a TLS context, aka "response injection."

CVSS3: 5.9
nvd
почти 5 лет назад

evolution-data-server (eds) through 3.36.3 has a STARTTLS buffering issue that affects SMTP and POP3. When a server sends a "begin TLS" response, eds reads additional data and evaluates it in a TLS context, aka "response injection."

rocky
больше 4 лет назад

Low: evolution security and bug fix update

github
около 3 лет назад

evolution-data-server (eds) through 3.36.3 has a STARTTLS buffering issue that affects SMTP and POP3. When a server sends a "begin TLS" response, eds reads additional data and evaluates it in a TLS context, aka "response injection."

EPSS

Процентиль: 88%
0.04044
Низкий