LibEtPan through 1.9.4, as used in MailCore 2 through 0.6.3 and other products, has a STARTTLS buffering issue that affects IMAP, SMTP, and POP3. When a server sends a "begin TLS" response, the client reads additional data (e.g., from a meddler-in-the-middle attacker) and evaluates it in a TLS context, aka "response injection."
The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.
Link | Tags |
---|---|
https://github.com/dinhvh/libetpan/issues/386 | patch third party advisory exploit |
https://security.gentoo.org/glsa/202007-55 | third party advisory vendor advisory |
https://lists.debian.org/debian-lts-announce/2020/08/msg00026.html | third party advisory mailing list |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QFBWNA5REI5ZGW2DAOEAVHM23MOU6O5J/ | vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M65FVH5XPS23NLHFN3ABEGBSCHZAISXN/ | vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00060.html | vendor advisory broken link |
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00075.html | vendor advisory broken link |