First published: Wed Jul 08 2020(Updated: )
evolution-data-server (eds) through 3.36.3 has a STARTTLS buffering issue that affects SMTP and POP3. When a server sends a "begin TLS" response, eds reads additional data and evaluates it in a TLS context, aka "response injection."
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNOME evolution-data-server | <=3.36.3 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Fedoraproject Fedora | =31 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =20.04 | |
debian/evolution-data-server | 3.30.5-1+deb10u2 3.30.5-1+deb10u1 3.38.3-1+deb11u2 3.46.4-2 3.50.3-1 | |
ubuntu/evolution-data-server | <3.36.3-0ubuntu1.1 | 3.36.3-0ubuntu1.1 |
ubuntu/evolution-data-server | <3.28.5-0ubuntu0.18.04.3 | 3.28.5-0ubuntu0.18.04.3 |
ubuntu/evolution-data-server | <3.36.4-1 | 3.36.4-1 |
ubuntu/evolution-data-server | <3.18.5-1ubuntu1.3 | 3.18.5-1ubuntu1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-14928 is a vulnerability in evolution-data-server (eds) through 3.36.3 that affects SMTP and POP3 due to a STARTTLS buffering issue.
The severity of CVE-2020-14928 is medium with a CVSS score of 5.9.
The affected software versions are evolution-data-server 3.36.3-0ubuntu1.1, 3.28.5-0ubuntu0.18.04.3, 3.36.4-1, and 3.18.5-1ubuntu1.3.
To fix CVE-2020-14928, update evolution-data-server to version 3.36.3-0ubuntu1.1, 3.28.5-0ubuntu0.18.04.3, 3.36.4-1, or 3.18.5-1ubuntu1.3.
Yes, you can find references for CVE-2020-14928 at the following links: [1] https://bugzilla.suse.com/show_bug.cgi?id=1173910, [2] https://gitlab.gnome.org/GNOME//evolution-data-server/commit/ba82be72cfd427b5d72ff21f929b3a6d8529c4df, [3] https://gitlab.gnome.org/GNOME/evolution-data-server/-/commit/f404f33fb01b23903c2bbb16791c7907e457fbac.