CVE-2021-29969

NameCVE-2021-29969
DescriptionIf Thunderbird was configured to use STARTTLS for an IMAP connection, and an attacker injected IMAP server responses prior to the completion of the STARTTLS handshake, then Thunderbird didn't ignore the injected data. This could have resulted in Thunderbird showing incorrect information, for example the attacker could have tricked Thunderbird to show folders that didn't exist on the IMAP server. This vulnerability affects Thunderbird < 78.12.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-2711-1, DSA-4940-1
NVD severitymedium

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
thunderbird (PTS)stretch1:68.10.0-1~deb9u1vulnerable
stretch (security)1:78.14.0-1~deb9u1fixed
buster1:78.6.0-1~deb10u1vulnerable
buster (security)1:78.14.0-1~deb10u1fixed
bullseye1:78.12.0-1fixed
bullseye (security)1:78.14.0-1~deb11u1fixed
bookworm1:78.13.0-1fixed
sid1:78.14.0-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
thunderbirdsourcestretch1:78.12.0-1~deb9u1DLA-2711-1
thunderbirdsourcebuster1:78.12.0-1~deb10u1DSA-4940-1
thunderbirdsource(unstable)1:78.12.0-1

Notes

https://www.mozilla.org/en-US/security/advisories/mfsa2021-30/#CVE-2021-29969

Search for package or bug name: Reporting problems