Lucene search

K
debianDebianDEBIAN:DLA-2329-1:13076
HistoryAug 16, 2020 - 12:00 p.m.

[SECURITY] [DLA 2329-1] libetpan security update

2020-08-1612:00:14
lists.debian.org
31
debian 9 stretch
starttls response injection
mail library

CVSS2

5.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

CVSS3

7.4

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N

EPSS

0.013

Percentile

86.1%


Debian LTS Advisory DLA-2329-1 [email protected]
https://www.debian.org/lts/security/
August 16, 2020 https://wiki.debian.org/LTS


Package : libetpan
Version : 1.6-3+deb9u1
CVE ID : CVE-2020-15953
Debian Bug : 966647

In libEtPan, a mail library, a STARTTLS response injection was
discovered that affects IMAP, SMTP, and POP3.

For Debian 9 stretch, this problem has been fixed in version
1.6-3+deb9u1.

We recommend that you upgrade your libetpan packages.

For the detailed security status of libetpan please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/libetpan

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

CVSS2

5.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

CVSS3

7.4

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N

EPSS

0.013

Percentile

86.1%