First published: Thu Jul 23 2020(Updated: )
common/session.c in Claws Mail before 3.17.6 has a protocol violation because suffix data after STARTTLS is mishandled.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Claws-Mail | <3.17.6 | |
Fedora | =31 | |
Fedora | =32 | |
openSUSE Backports | =15.0-sp1 | |
openSUSE Backports | =15.0-sp2 | |
openSUSE | =15.1 | |
openSUSE | =15.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-15917 has a moderate severity rating due to the protocol violation issues.
To fix CVE-2020-15917, upgrade Claws Mail to version 3.17.6 or later.
CVE-2020-15917 affects all versions of Claws Mail prior to 3.17.6.
The vulnerability in CVE-2020-15917 is a protocol violation caused by mishandling suffix data after the STARTTLS command.
CVE-2020-15917 impacts Fedora versions 31 and 32, and specific versions of openSUSE.