Upstream information

CVE-2020-15953 at MITRE

Description

LibEtPan through 1.9.4, as used in MailCore 2 through 0.6.3 and other products, has a STARTTLS buffering issue that affects IMAP, SMTP, and POP3. When a server sends a "begin TLS" response, the client reads additional data (e.g., from a meddler-in-the-middle attacker) and evaluates it in a TLS context, aka "response injection."

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having moderate severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 5.8
Vector AV:N/AC:M/Au:N/C:P/I:P/A:N
Access Vector Network
Access Complexity Medium
Authentication None
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact None
CVSS v3 Scores
  National Vulnerability Database
Base Score 7.4
Vector CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
Attack Vector Network
Attack Complexity High
Privileges Required None
User Interaction None
Scope Unchanged
Confidentiality Impact High
Integrity Impact High
Availability Impact None
CVSSv3 Version 3.1
SUSE Bugzilla entry: 1174579 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SUSE Package Hub 15 SP2
  • libetpan-devel >= 1.9.4-bp152.4.3.1
  • libetpan20 >= 1.9.4-bp152.4.3.1
Patchnames:
openSUSE-2020-1505
openSUSE Leap 15.2
  • libetpan-devel >= 1.9.4-lp152.3.3.1
  • libetpan20 >= 1.9.4-lp152.3.3.1
Patchnames:
openSUSE-2020-1454
openSUSE Tumbleweed
  • libetpan-devel >= 1.9.4-1.7
  • libetpan20 >= 1.9.4-1.7
Patchnames:
openSUSE Tumbleweed GA libetpan-devel-1.9.4-1.7


SUSE Timeline for this CVE

CVE page created: Mon Jul 27 17:27:49 2020
CVE page last modified: Wed Oct 26 22:37:16 2022