Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2021:3838

Опубликовано: 20 окт. 2021
Источник: rocky
Оценка: Important

Описание

Important: thunderbird security update

For more information visit https://errata.rockylinux.org/RLSA-2021:3838

Затронутые продукты

  • Rocky Linux 8

НаименованиеАрхитектураРелизRPM
thunderbirdx86_641.el8_4thunderbird-91.2.0-1.el8_4.x86_64.rpm

Показывать по

Связанные CVE

Связанные уязвимости

CVSS3: 5.9
ubuntu
почти 4 года назад

Thunderbird ignored the configuration to require STARTTLS security for an SMTP connection. A MITM could perform a downgrade attack to intercept transmitted messages, or could take control of the authenticated session to execute SMTP commands chosen by the MITM. If an unprotected authentication method was configured, the MITM could obtain the authentication credentials, too. This vulnerability affects Thunderbird < 91.2.

CVSS3: 7.5
redhat
почти 4 года назад

Thunderbird ignored the configuration to require STARTTLS security for an SMTP connection. A MITM could perform a downgrade attack to intercept transmitted messages, or could take control of the authenticated session to execute SMTP commands chosen by the MITM. If an unprotected authentication method was configured, the MITM could obtain the authentication credentials, too. This vulnerability affects Thunderbird < 91.2.

CVSS3: 5.9
nvd
почти 4 года назад

Thunderbird ignored the configuration to require STARTTLS security for an SMTP connection. A MITM could perform a downgrade attack to intercept transmitted messages, or could take control of the authenticated session to execute SMTP commands chosen by the MITM. If an unprotected authentication method was configured, the MITM could obtain the authentication credentials, too. This vulnerability affects Thunderbird < 91.2.

CVSS3: 5.9
debian
почти 4 года назад

Thunderbird ignored the configuration to require STARTTLS security for ...

CVSS3: 5.9
github
около 3 лет назад

Thunderbird ignored the configuration to require STARTTLS security for an SMTP connection. A MITM could perform a downgrade attack to intercept transmitted messages, or could take control of the authenticated session to execute SMTP commands chosen by the MITM. If an unprotected authentication method was configured, the MITM could obtain the authentication credentials, too. This vulnerability affects Thunderbird < 91.2.