First published: Wed Oct 06 2021(Updated: )
Thunderbird ignored the configuration to require STARTTLS security for an SMTP connection. A MITM could perform a downgrade attack to intercept transmitted messages, or could take control of the authenticated session to execute SMTP commands chosen by the MITM. If an unprotected authentication method was configured, the MITM could obtain the authentication credentials, too.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Thunderbird | <91.2 | 91.2 |
<91.2 | 91.2 | |
Mozilla Thunderbird | <91.2 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
debian/thunderbird | 1:91.12.0-1~deb10u1 1:115.3.1-1~deb10u1 1:102.13.1-1~deb11u1 1:115.3.1-1~deb11u1 1:102.15.1-1~deb12u1 1:115.3.1-1~deb12u1 1:115.3.1-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2021-38502 is a vulnerability in Thunderbird where it ignored the configuration to require STARTTLS security for an SMTP connection, allowing for a MITM downgrade attack and interception of transmitted messages.
CVE-2021-38502 affects Thunderbird versions up to 91.2, allowing for a MITM downgrade attack on SMTP connections.
CVE-2021-38502 affects Debian Linux versions 9.0, 10.0, and 11.0, where Thunderbird versions up to 91.2 are vulnerable.
CVE-2021-38502 has a high severity rating of 5.9.
To fix CVE-2021-38502 in Thunderbird, update to version 91.2 or later.