Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2020-14928

Опубликовано: 17 июл. 2020
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 4.3
CVSS3: 5.9

Описание

evolution-data-server (eds) through 3.36.3 has a STARTTLS buffering issue that affects SMTP and POP3. When a server sends a "begin TLS" response, eds reads additional data and evaluates it in a TLS context, aka "response injection."

РелизСтатусПримечание
bionic

released

3.28.5-0ubuntu0.18.04.3
devel

not-affected

3.36.4-1
eoan

ignored

end of life
esm-infra-legacy/trusty

DNE

esm-infra/bionic

not-affected

3.28.5-0ubuntu0.18.04.3
esm-infra/focal

not-affected

3.36.3-0ubuntu1.1
esm-infra/xenial

not-affected

3.18.5-1ubuntu1.3
focal

released

3.36.3-0ubuntu1.1
precise/esm

DNE

trusty

ignored

end of standard support

Показывать по

EPSS

Процентиль: 88%
0.04044
Низкий

4.3 Medium

CVSS2

5.9 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.3
redhat
почти 5 лет назад

evolution-data-server (eds) through 3.36.3 has a STARTTLS buffering issue that affects SMTP and POP3. When a server sends a "begin TLS" response, eds reads additional data and evaluates it in a TLS context, aka "response injection."

CVSS3: 5.9
nvd
почти 5 лет назад

evolution-data-server (eds) through 3.36.3 has a STARTTLS buffering issue that affects SMTP and POP3. When a server sends a "begin TLS" response, eds reads additional data and evaluates it in a TLS context, aka "response injection."

CVSS3: 5.9
debian
почти 5 лет назад

evolution-data-server (eds) through 3.36.3 has a STARTTLS buffering is ...

rocky
больше 4 лет назад

Low: evolution security and bug fix update

github
около 3 лет назад

evolution-data-server (eds) through 3.36.3 has a STARTTLS buffering issue that affects SMTP and POP3. When a server sends a "begin TLS" response, eds reads additional data and evaluates it in a TLS context, aka "response injection."

EPSS

Процентиль: 88%
0.04044
Низкий

4.3 Medium

CVSS2

5.9 Medium

CVSS3