CVE-2020-14928Injection in Evolution-data-server

Severity
5.9MEDIUMNVD
EPSS
6.4%
top 8.98%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 17
Latest updateMay 24

Description

evolution-data-server (eds) through 3.36.3 has a STARTTLS buffering issue that affects SMTP and POP3. When a server sends a "begin TLS" response, eds reads additional data and evaluates it in a TLS context, aka "response injection."

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:NExploitability: 2.2 | Impact: 3.6

Affected Packages2 packages

Also affects: Debian Linux 10.0, 9.0, Fedora 31, Ubuntu Linux 16.04, 18.04, 20.04

Patches

🔴Vulnerability Details

3
GHSA
GHSA-3rg7-72j5-5xpv: evolution-data-server (eds) through 32022-05-24
OSV
CVE-2020-14928: evolution-data-server (eds) through 32020-07-17
CVEList
CVE-2020-14928: evolution-data-server (eds) through 32020-07-17

📋Vendor Advisories

3
Ubuntu
Evolution Data Server vulnerability2020-07-22
Red Hat
evolution-data-server: Response injection via STARTTLS in SMTP and POP32020-07-04
Debian
CVE-2020-14928: evolution-data-server - evolution-data-server (eds) through 3.36.3 has a STARTTLS buffering issue that a...2020

💬Community

2
Bugzilla
CVE-2020-14928 evolution-data-server: Response injection via STARTTLS in SMTP and POP32020-07-15
Bugzilla
CVE-2020-14928 evolution-data-server: Response Injection via STARTTLS in SMTP and POP3 [fedora-all]2020-07-15
CVE-2020-14928 — Injection in Evolution-data-server | cvebase