Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-3rg7-72j5-5xpv

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

evolution-data-server (eds) through 3.36.3 has a STARTTLS buffering issue that affects SMTP and POP3. When a server sends a "begin TLS" response, eds reads additional data and evaluates it in a TLS context, aka "response injection."

evolution-data-server (eds) through 3.36.3 has a STARTTLS buffering issue that affects SMTP and POP3. When a server sends a "begin TLS" response, eds reads additional data and evaluates it in a TLS context, aka "response injection."

EPSS

Процентиль: 88%
0.04044
Низкий

Связанные уязвимости

CVSS3: 5.9
ubuntu
почти 5 лет назад

evolution-data-server (eds) through 3.36.3 has a STARTTLS buffering issue that affects SMTP and POP3. When a server sends a "begin TLS" response, eds reads additional data and evaluates it in a TLS context, aka "response injection."

CVSS3: 5.3
redhat
почти 5 лет назад

evolution-data-server (eds) through 3.36.3 has a STARTTLS buffering issue that affects SMTP and POP3. When a server sends a "begin TLS" response, eds reads additional data and evaluates it in a TLS context, aka "response injection."

CVSS3: 5.9
nvd
почти 5 лет назад

evolution-data-server (eds) through 3.36.3 has a STARTTLS buffering issue that affects SMTP and POP3. When a server sends a "begin TLS" response, eds reads additional data and evaluates it in a TLS context, aka "response injection."

CVSS3: 5.9
debian
почти 5 лет назад

evolution-data-server (eds) through 3.36.3 has a STARTTLS buffering is ...

rocky
больше 4 лет назад

Low: evolution security and bug fix update

EPSS

Процентиль: 88%
0.04044
Низкий