CVE Vulnerabilities

CVE-2021-38502

Published: Nov 03, 2021 | Modified: Nov 21, 2024
CVSS 3.x
5.9
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
CVSS 2.x
4.3 MEDIUM
AV:N/AC:M/Au:N/C:P/I:N/A:N
RedHat/V2
RedHat/V3
7.5 IMPORTANT
CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

Thunderbird ignored the configuration to require STARTTLS security for an SMTP connection. A MITM could perform a downgrade attack to intercept transmitted messages, or could take control of the authenticated session to execute SMTP commands chosen by the MITM. If an unprotected authentication method was configured, the MITM could obtain the authentication credentials, too. This vulnerability affects Thunderbird < 91.2.

Affected Software

NameVendorStart VersionEnd Version
ThunderbirdMozilla*91.2 (excluding)
Red Hat Enterprise Linux 7RedHatthunderbird-0:91.2.0-1.el7_9*
Red Hat Enterprise Linux 8RedHatthunderbird-0:91.2.0-1.el8_4*
Red Hat Enterprise Linux 8.1 Extended Update SupportRedHatthunderbird-0:91.2.0-1.el8_1*
Red Hat Enterprise Linux 8.2 Extended Update SupportRedHatthunderbird-0:91.2.0-1.el8_2*
ThunderbirdUbuntubionic*
ThunderbirdUbuntudevel*
ThunderbirdUbuntufocal*
ThunderbirdUbuntuhirsute*
ThunderbirdUbuntuimpish*
ThunderbirdUbuntujammy*
ThunderbirdUbuntukinetic*
ThunderbirdUbuntulunar*
ThunderbirdUbuntutrusty*
ThunderbirdUbuntuupstream*
ThunderbirdUbuntuxenial*

References