{"api_version":"1","generated_at":"2026-04-23T02:16:51+00:00","cve":"CVE-2020-26970","urls":{"html":"https://cve.report/CVE-2020-26970","api":"https://cve.report/api/cve/CVE-2020-26970.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2020-26970","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2020-26970"},"summary":{"title":"CVE-2020-26970","description":"When reading SMTP server status codes, Thunderbird writes an integer value to a position on the stack that is intended to contain just one byte. Depending on processor architecture and stack layout, this leads to stack corruption that may be exploitable. This vulnerability affects Thunderbird < 78.5.1.","state":"PUBLIC","assigner":"security@mozilla.org","published_at":"2020-12-09 01:15:00","updated_at":"2020-12-10 18:52:00"},"problem_types":["CWE-787"],"metrics":[],"references":[{"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1677338","name":"https://bugzilla.mozilla.org/show_bug.cgi?id=1677338","refsource":"MISC","tags":["Issue Tracking","Permissions Required","Vendor Advisory"],"title":"Access Denied","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.mozilla.org/security/advisories/mfsa2020-53/","name":"https://www.mozilla.org/security/advisories/mfsa2020-53/","refsource":"CONFIRM","tags":["Vendor Advisory"],"title":"Security Vulnerabilities fixed in Thunderbird 78.5.1 — Mozilla","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2020-26970","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-26970","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2020","cve_id":"26970","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mozilla","cpe5":"thunderbird","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"26970","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mozilla","cpe5":"thunderbird","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2020-26970","qid":"502376","title":"Alpine Linux Security Update for thunderbird"},{"cve":"CVE-2020-26970","qid":"505444","title":"Alpine Linux Security Update for thunderbird"}]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ID":"CVE-2020-26970","ASSIGNER":"security@mozilla.org","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Mozilla","product":{"product_data":[{"product_name":"Thunderbird","version":{"version_data":[{"version_value":"< 78.5.1"}]}}]}}]}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Stack overflow due to incorrect parsing of SMTP server response codes"}]}]},"references":{"reference_data":[{"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1677338","refsource":"MISC","name":"https://bugzilla.mozilla.org/show_bug.cgi?id=1677338"},{"refsource":"CONFIRM","name":"https://www.mozilla.org/security/advisories/mfsa2020-53/","url":"https://www.mozilla.org/security/advisories/mfsa2020-53/"}]},"description":{"description_data":[{"lang":"eng","value":"When reading SMTP server status codes, Thunderbird writes an integer value to a position on the stack that is intended to contain just one byte. Depending on processor architecture and stack layout, this leads to stack corruption that may be exploitable. This vulnerability affects Thunderbird < 78.5.1."}]}},"nvd":{"publishedDate":"2020-12-09 01:15:00","lastModifiedDate":"2020-12-10 18:52:00","problem_types":["CWE-787"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:C/I:C/A:C","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE","baseScore":9.3},"severity":"HIGH","exploitabilityScore":8.6,"impactScore":10,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","versionEndExcluding":"78.5.1","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2020","CveId":"26970","Ordinal":"188404","Title":"CVE-2020-26970","CVE":"CVE-2020-26970","Year":"2020"},"notes":[{"CveYear":"2020","CveId":"26970","Ordinal":"1","NoteData":"When reading SMTP server status codes, Thunderbird writes an integer value to a position on the stack that is intended to contain just one byte. Depending on processor architecture and stack layout, this leads to stack corruption that may be exploitable. This vulnerability affects Thunderbird < 78.5.1.","Type":"Description","Title":null},{"CveYear":"2020","CveId":"26970","Ordinal":"2","NoteData":"2020-12-08","Type":"Other","Title":"Published"},{"CveYear":"2020","CveId":"26970","Ordinal":"3","NoteData":"2020-12-08","Type":"Other","Title":"Modified"}]}}}