Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2021:2883

Опубликовано: 03 авг. 2021
Источник: rocky
Оценка: Important

Описание

Important: thunderbird security update

For more information visit https://errata.rockylinux.org/RLSA-2021:2883

Затронутые продукты

  • Rocky Linux 8

НаименованиеАрхитектураРелизRPM
thunderbirdx86_643.el8_4thunderbird-78.12.0-3.el8_4.x86_64.rpm

Показывать по

Связанные CVE

Связанные уязвимости

CVSS3: 5.9
ubuntu
около 4 лет назад

If Thunderbird was configured to use STARTTLS for an IMAP connection, and an attacker injected IMAP server responses prior to the completion of the STARTTLS handshake, then Thunderbird didn't ignore the injected data. This could have resulted in Thunderbird showing incorrect information, for example the attacker could have tricked Thunderbird to show folders that didn't exist on the IMAP server. This vulnerability affects Thunderbird < 78.12.

CVSS3: 5.9
redhat
около 4 лет назад

If Thunderbird was configured to use STARTTLS for an IMAP connection, and an attacker injected IMAP server responses prior to the completion of the STARTTLS handshake, then Thunderbird didn't ignore the injected data. This could have resulted in Thunderbird showing incorrect information, for example the attacker could have tricked Thunderbird to show folders that didn't exist on the IMAP server. This vulnerability affects Thunderbird < 78.12.

CVSS3: 5.9
nvd
около 4 лет назад

If Thunderbird was configured to use STARTTLS for an IMAP connection, and an attacker injected IMAP server responses prior to the completion of the STARTTLS handshake, then Thunderbird didn't ignore the injected data. This could have resulted in Thunderbird showing incorrect information, for example the attacker could have tricked Thunderbird to show folders that didn't exist on the IMAP server. This vulnerability affects Thunderbird < 78.12.

CVSS3: 5.9
debian
около 4 лет назад

If Thunderbird was configured to use STARTTLS for an IMAP connection, ...

CVSS3: 5.9
github
около 3 лет назад

If Thunderbird was configured to use STARTTLS for an IMAP connection, and an attacker injected IMAP server responses prior to the completion of the STARTTLS handshake, then Thunderbird didn't ignore the injected data. This could have resulted in Thunderbird showing incorrect information, for example the attacker could have tricked Thunderbird to show folders that didn't exist on the IMAP server. This vulnerability affects Thunderbird < 78.12.