Vulnerability Details : CVE-2021-29969
If Thunderbird was configured to use STARTTLS for an IMAP connection, and an attacker injected IMAP server responses prior to the completion of the STARTTLS handshake, then Thunderbird didn't ignore the injected data. This could have resulted in Thunderbird showing incorrect information, for example the attacker could have tricked Thunderbird to show folders that didn't exist on the IMAP server. This vulnerability affects Thunderbird < 78.12.
Products affected by CVE-2021-29969
- cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-29969
0.16%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 52 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-29969
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:N/A:N |
8.6
|
2.9
|
NIST | |
5.9
|
MEDIUM | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N |
2.2
|
3.6
|
NIST |
CWE ids for CVE-2021-29969
-
The product makes files or directories accessible to unauthorized actors, even though they should not be.Assigned by: nvd@nist.gov (Primary)
References for CVE-2021-29969
-
https://bugzilla.mozilla.org/show_bug.cgi?id=1682370
Access DeniedIssue Tracking;Permissions Required;Vendor Advisory
-
https://security.gentoo.org/glsa/202208-14
Mozilla Thunderbird: Multiple Vulnerabilities (GLSA 202208-14) — Gentoo securityThird Party Advisory
-
https://www.mozilla.org/security/advisories/mfsa2021-30/
Security Vulnerabilities fixed in Thunderbird 78.12 — MozillaVendor Advisory
Jump to