CVE-2020-14928
Summary
| CVE | CVE-2020-14928 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2020-07-17 16:15:00 UTC |
| Updated | 2023-11-07 03:17:00 UTC |
| Description | evolution-data-server (eds) through 3.36.3 has a STARTTLS buffering issue that affects SMTP and POP3. When a server sends a "begin TLS" response, eds reads additional data and evaluates it in a TLS context, aka "response injection." |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| [SECURITY] Fedora 31 Update: evolution-data-server-3.34.4-2.fc31 - package-announce - Fedora Mailing-Lists |
FEDORA |
lists.fedoraproject.org |
Mailing List, Third Party Advisory |
| I#226 - CVE-2020-14928: Response Injection via STARTTLS in SMTP and POP3 (f404f33f) · Commits · GNOME / evolution-data-server · GitLab |
CONFIRM |
gitlab.gnome.org |
Patch, Third Party Advisory |
| CVE-2020-14928: Response Injection via STARTTLS in SMTP and POP3 (#226) · Issues · GNOME / evolution-data-server · GitLab |
MISC |
gitlab.gnome.org |
Exploit, Third Party Advisory |
| [SECURITY] Fedora 31 Update: evolution-data-server-3.34.4-2.fc31 - package-announce - Fedora Mailing-Lists |
|
lists.fedoraproject.org |
|
| DLA-2281-1 |
CONFIRM |
security-tracker.debian.org |
Third Party Advisory |
| DSA-4725-1 |
CONFIRM |
security-tracker.debian.org |
Third Party Advisory |
| Bug 1173910 – VUL-0: CVE-2020-14928: evolution-data-server: Response Injection via STARTTLS in SMTP and POP3 |
CONFIRM |
bugzilla.suse.com |
Issue Tracking, Patch, Third Party Advisory |
| [SECURITY] [DLA 2281-1] evolution-data-server security update |
CONFIRM |
lists.debian.org |
Mailing List, Third Party Advisory |
| USN-4429-1: Evolution Data Server vulnerability | Ubuntu security notices | Ubuntu |
UBUNTU |
usn.ubuntu.com |
Third Party Advisory |
| I#226 - CVE-2020-14928: Response Injection via STARTTLS in SMTP and POP3 (ba82be72) · Commits · GNOME / evolution-data-server · GitLab |
CONFIRM |
gitlab.gnome.org |
Patch, Third Party Advisory |
| Debian -- Security Information -- DSA-4725-1 evolution-data-server |
DEBIAN |
www.debian.org |
Third Party Advisory |
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 174823 SUSE Enterprise Linux Security update for evolution-data-server (SUSE-SU-2021:0891-1)
- 296071 Oracle Solaris 11.4 Support Repository Update (SRU) 27.82.1 Missing (CPUOCT2020)
- 377392 Alibaba Cloud Linux Security Update for evolution (ALINUX3-SA-2022:0095)
- 670296 EulerOS Security Update for evolution-data-server (EulerOS-SA-2021-1780)
- 750291 OpenSUSE Security Update for evolution-data-server (openSUSE-SU-2021:0482-1)
- 940300 AlmaLinux Security Update for evolution (ALSA-2020:4649)
- 960357 Rocky Linux Security Update for evolution (RLSA-2020:4649)