USN-4598-1: LibEtPan vulnerability
Publication date
22 October 2020
Overview
LibEtPan could be made to expose sensitive information over the network.
Releases
Packages
- libetpan - Mail Framework for C Language
Details
It was discovered that LibEtPan incorrectly handled STARTTLS when using
IMAP, SMTP and POP3. A remote attacker could possibly use this issue
to perform a response injection attack. (CVE-2020-15953)
It was discovered that LibEtPan incorrectly handled STARTTLS when using
IMAP, SMTP and POP3. A remote attacker could possibly use this issue
to perform a response injection attack. (CVE-2020-15953)
Update instructions
In general, a standard system update will make all the necessary changes.
Learn more about how to get the fixes.The problem can be corrected by updating your system to the following package versions:
Ubuntu Release | Package Version | ||
---|---|---|---|
16.04 xenial | libetpan-dev – 1.6-1ubuntu0.1 | ||
libetpan17 – 1.6-1ubuntu0.1 |
Reduce your security exposure
Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.