Description
If Thunderbird was configured to use STARTTLS for an IMAP connection, and an attacker injected IMAP server responses prior to the completion of the STARTTLS handshake, then Thunderbird didn't ignore the injected data. This could have resulted in Thunderbird showing incorrect information, for example the attacker could have tricked Thunderbird to show folders that didn't exist on the IMAP server. This vulnerability affects Thunderbird < 78.12.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2711-1 | thunderbird security update |
Debian DSA |
DSA-4940-1 | thunderbird security update |
EUVD |
EUVD-2021-16428 | If Thunderbird was configured to use STARTTLS for an IMAP connection, and an attacker injected IMAP server responses prior to the completion of the STARTTLS handshake, then Thunderbird didn't ignore the injected data. This could have resulted in Thunderbird showing incorrect information, for example the attacker could have tricked Thunderbird to show folders that didn't exist on the IMAP server. This vulnerability affects Thunderbird < 78.12. |
Ubuntu USN |
USN-5058-1 | Thunderbird vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mozilla
Published:
Updated: 2024-08-03T22:24:57.484Z
Reserved: 2021-04-01T00:00:00.000Z
Link: CVE-2021-29969
No data.
Status : Modified
Published: 2021-08-05T20:15:08.500
Modified: 2024-11-21T06:02:05.040
Link: CVE-2021-29969
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN