vulnerability
Ubuntu: USN-4429-1 (CVE-2020-14928): Evolution Data Server vulnerability
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
4 | (AV:N/AC:M/Au:N/C:N/I:P/A:N) | Jul 17, 2020 | Aug 5, 2020 | Mar 22, 2023 |
Severity
4
CVSS
(AV:N/AC:M/Au:N/C:N/I:P/A:N)
Published
Jul 17, 2020
Added
Aug 5, 2020
Modified
Mar 22, 2023
Description
evolution-data-server (eds) through 3.36.3 has a STARTTLS buffering issue that affects SMTP and POP3. When a server sends a "begin TLS" response, eds reads additional data and evaluates it in a TLS context, aka "response injection."
Solution(s)
ubuntu-upgrade-evolution-data-serverubuntu-upgrade-evolution-data-server-commonubuntu-upgrade-libcamel-1-2-54ubuntu-upgrade-libcamel-1-2-61ubuntu-upgrade-libcamel-1-2-62ubuntu-upgrade-libebackend-1-2-10ubuntu-upgrade-libedataserver-1-2-21ubuntu-upgrade-libedataserver-1-2-23ubuntu-upgrade-libedataserver-1-2-24

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.