vulnerability
Oracle Linux: CVE-2020-14928: ELSA-2020-4649: evolution security and bug fix update (LOW) (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
5 | (AV:N/AC:H/Au:N/C:N/I:C/A:N) | Jul 4, 2020 | Nov 12, 2020 | Nov 29, 2024 |
Severity
5
CVSS
(AV:N/AC:H/Au:N/C:N/I:C/A:N)
Published
Jul 4, 2020
Added
Nov 12, 2020
Modified
Nov 29, 2024
Description
evolution-data-server (eds) through 3.36.3 has a STARTTLS buffering issue that affects SMTP and POP3. When a server sends a "begin TLS" response, eds reads additional data and evaluates it in a TLS context, aka "response injection."
Solution(s)
oracle-linux-upgrade-bogofilteroracle-linux-upgrade-evolutionoracle-linux-upgrade-evolution-bogofilteroracle-linux-upgrade-evolution-data-serveroracle-linux-upgrade-evolution-data-server-develoracle-linux-upgrade-evolution-data-server-docoracle-linux-upgrade-evolution-data-server-langpacksoracle-linux-upgrade-evolution-data-server-perloracle-linux-upgrade-evolution-data-server-testsoracle-linux-upgrade-evolution-develoracle-linux-upgrade-evolution-helporacle-linux-upgrade-evolution-langpacksoracle-linux-upgrade-evolution-mapioracle-linux-upgrade-evolution-mapi-langpacksoracle-linux-upgrade-evolution-pstoracle-linux-upgrade-evolution-spamassassinoracle-linux-upgrade-openchange

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.