CVE-2021-29969

EUVD-2021-16428
If Thunderbird was configured to use STARTTLS for an IMAP connection, and an attacker injected IMAP server responses prior to the completion of the STARTTLS handshake, then Thunderbird didn't ignore the injected data. This could have resulted in Thunderbird showing incorrect information, for example the attacker could have tricked Thunderbird to show folders that didn't exist on the IMAP server. This vulnerability affects Thunderbird < 78.12.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
5.9 MEDIUM
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 59%
Affected Products (NVD)
VendorProductVersion
mozillathunderbird
𝑥
< 78.12
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
thunderbird
bookworm
1:115.12.0-1~deb12u1
fixed
bookworm (security)
1:128.4.0esr-1~deb12u1
fixed
bullseye
1:115.12.0-1~deb11u1
fixed
bullseye (security)
1:128.4.0esr-1~deb11u1
fixed
sid
1:128.4.0esr-1
fixed
trixie
1:128.4.0esr-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
thunderbird
bionic
Fixed 1:78.13.0+build1-0ubuntu0.18.04.1
released
focal
Fixed 1:78.13.0+build1-0ubuntu0.20.04.2
released
groovy
ignored
hirsute
Fixed 1:78.13.0+build1-0ubuntu0.21.04.2
released
impish
Fixed 1:78.12.0+build2-0ubuntu1
released
jammy
Fixed 1:78.12.0+build2-0ubuntu1
released
kinetic
Fixed 1:78.12.0+build2-0ubuntu1
released
lunar
Fixed 1:78.12.0+build2-0ubuntu1
released
trusty
dne
xenial
ignored