First published: Tue Jun 02 2020(Updated: )
If Thunderbird is configured to use STARTTLS for an IMAP server, and the server sends a PREAUTH response, then Thunderbird will continue with an unencrypted connection, causing email data to be sent without protection.
Credit: security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Thunderbird | <68.9.0 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =19.10 | |
Canonical Ubuntu Linux | =20.04 | |
Mozilla Thunderbird | <68.9 | 68.9 |
debian/thunderbird | 1:115.12.0-1~deb11u1 1:128.5.0esr-1~deb11u1 1:115.16.0esr-1~deb12u1 1:128.5.0esr-1~deb12u1 1:128.5.2esr-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2020-12398 is a vulnerability in Thunderbird where, if it is configured to use STARTTLS for an IMAP server and the server sends a PREAUTH response, Thunderbird will continue with an unencrypted connection, causing email data to be sent without protection.
CVE-2020-12398 has a severity rating of high.
CVE-2020-12398 affects Thunderbird version 68.9, where if configured to use STARTTLS for an IMAP server and the server sends a PREAUTH response, Thunderbird will continue with an unencrypted connection.
To fix CVE-2020-12398 in Thunderbird, you should update to a version that includes the necessary security patches. The recommended version is 68.9 or later. Please refer to the Mozilla Thunderbird website or vendor for the latest updates.
You can find more information about CVE-2020-12398 on the Mozilla Bugzilla page (https://bugzilla.mozilla.org/show_bug.cgi?id=1613623) and the Mozilla Security Advisories page (https://www.mozilla.org/en-US/security/advisories/mfsa2020-22/).