CVE-2020-15917

NameCVE-2020-15917
Descriptioncommon/session.c in Claws Mail before 3.17.6 has a protocol violation because suffix data after STARTTLS is mishandled.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severityhigh

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
claws-mail (PTS)stretch3.14.1-3vulnerable
buster3.17.3-2vulnerable
bullseye, sid3.17.8-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
claws-mailsource(unstable)3.17.6-1

Notes

[buster] - claws-mail <no-dsa> (Minor issue)
[stretch] - claws-mail <no-dsa> (low priority issue)
https://git.claws-mail.org/?p=claws.git;a=commit;h=fcc25329049b6f9bd8d890f1197ed61eb12e14d5

Search for package or bug name: Reporting problems