Closed
Bug 511806
Opened 15 years ago
Closed 15 years ago
Crash when using SSPI and joined to AD under Vista or later [@ strcat - nsImapFlagAndUidState::AddUidCustomFlagPair]
Categories
(MailNews Core :: Networking: IMAP, defect)
Tracking
(status1.9.2 beta1-fixed, status1.9.1 .4-fixed)
VERIFIED
FIXED
Thunderbird 3.0b4
Tracking | Status | |
---|---|---|
status1.9.2 | --- | beta1-fixed |
status1.9.1 | --- | .4-fixed |
People
(Reporter: pnfisher, Assigned: Bienvenu)
References
Details
(Keywords: crash, verified1.8.1.24, verified1.9.1, Whiteboard: [sg:critical][no l10n impact][needs 1.9.0 landing])
Crash Data
Attachments
(1 file, 2 obsolete files)
(deleted),
patch
|
Bienvenu
:
review+
Bienvenu
:
superreview+
beltzner
:
approval1.9.2+
dveditz
:
approval1.9.1.4+
dveditz
:
approval1.9.0.18-
dveditz
:
approval1.8.1.next+
|
Details | Diff | Splinter Review |
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.9.1.2) Gecko/20090803 Fedora/3.5.2-2.fc11 Firefox/3.5.2
Build Identifier: 3.0b3 / 20090715140311
The UC Berkeley central email system recently enabled GSSAPI support for SMTP, IMAP, and POP. Thunderbird 2.0.0.22 on Windows XP when joined to AD works fine; however, under Vista or Windows 7 (and joined to AD), Thunderbird crashes when attempting to use SSPI. Thunderbird 2, by default, will always attempt to use SSPI during SMTP, and we've received widespread reports across campus of Thunderbird crashing when attempting to send email. Setting network.auth-use-sspi to false returns Thunderbird to a stable state.
We have been unable to get Talkback data for Thunderbird 2, so we've replicated the problem with Thunderbird 3.0b3 and Breakpad, which appears to also crash under SSPI.
This bug may be a duplicate of bug 505971. However, since this behaviour is widespread in our environment, and Thunderbird immediately crashes with SMTP or IMAP when joined to AD on Vista or later and SSPI is enabled it seems worthwhile to file a separate bug report.
Reproducible: Always
Steps to Reproduce:
1. Join Windows Vista (or later) machine to CAMPUS.BERKELEY.EDU AD
2. Configure Thunderbird client to use calmail.berkeley.edu (which will advertise AUTH=GSSAPI for SSL/TLS connections).
3. Attempt to send email with Thunderbird 2 (or under Thunderbird 3, check "Use secure authentication" for SMTP setup) or retrieve email with "Use secure authentication" checked for IMAP/POP
Actual Results:
Thunderbird crashes.
Expected Results:
Thunderbird performs GSSAPI SASL negotiation and sends email or retrieves email.
http://crash-stats.mozilla.com/report/index/40d6d04c-6423-47b1-898d-6a8a62090820 is a crash of 3.0b3 under Vista using SSPI to login to IMAP.
so, your description indicates it should be that bug, but your crash says it's totally unrelated.
Signature strcat
UUID 40d6d04c-6423-47b1-898d-6a8a62090820
Time 2009-08-20 16:55:07.232911
Uptime 3
Product Thunderbird
Version 3.0b3
Build ID 20090715140311
Branch 1.9.1
OS Windows NT
OS Version 6.0.6002 Service Pack 2
CPU x86
CPU Info GenuineIntel family 15 model 6 stepping 4
Crash Reason EXCEPTION_ACCESS_VIOLATION
Crash Address 0x0
User Comments using sspi to log into IMAP
Processor Notes
Crashing Thread
Frame Module Signature [Expand] Source
0 mozcrt19.dll strcat strcat.asm:178
1 thunderbird.exe nsImapFlagAndUidState::AddUidCustomFlagPair mailnews/imap/src/nsImapFlagAndUidState.cpp:365
2 thunderbird.exe nsImapServerResponseParser::msg_fetch mailnews/imap/src/nsImapServerResponseParser.cpp:1385
3 thunderbird.exe nsImapServerResponseParser::response_data mailnews/imap/src/nsImapServerResponseParser.cpp:756
4 thunderbird.exe nsImapServerResponseParser::ParseIMAPServerResponse mailnews/imap/src/nsImapServerResponseParser.cpp:243
5 thunderbird.exe nsImapProtocol::ParseIMAPandCheckForNewMail mailnews/imap/src/nsImapProtocol.cpp:1853
6 thunderbird.exe nsImapProtocol::FetchMessage mailnews/imap/src/nsImapProtocol.cpp:3416
7 thunderbird.exe nsImapProtocol::ProcessMailboxUpdate mailnews/imap/src/nsImapProtocol.cpp:3917
8 thunderbird.exe nsImapProtocol::ProcessSelectedStateURL mailnews/imap/src/nsImapProtocol.cpp:2819
9 thunderbird.exe nsImapProtocol::ProcessCurrentURL mailnews/imap/src/nsImapProtocol.cpp:1709
10 thunderbird.exe nsImapProtocol::ImapThreadMainLoop mailnews/imap/src/nsImapProtocol.cpp:1360
11 thunderbird.exe nsImapProtocol::Run mailnews/imap/src/nsImapProtocol.cpp:1059
12 xpcom_core.dll nsThread::ProcessNextEvent xpcom/threads/nsThread.cpp:510
13 xpcom_core.dll NS_ProcessNextEvent_P nsThreadUtils.cpp:227
14 xpcom_core.dll nsThread::ThreadFunc xpcom/threads/nsThread.cpp:254
15 nspr4.dll _PR_NativeRunThread nsprpub/pr/src/threads/combined/pruthr.c:426
16 nspr4.dll pr_root nsprpub/pr/src/md/windows/w95thred.c:122
17 mozcrt19.dll _callthreadstartex threadex.c:348
18 mozcrt19.dll _threadstartex threadex.c:326
19 kernel32.dll BaseThreadInitThunk
20 ntdll.dll __RtlUserThreadStart
21 ntdll.dll _RtlUserThreadStart
Component: General → Networking: IMAP
Keywords: crash
Product: Thunderbird → MailNews Core
QA Contact: general → networking.imap
Summary: Crash when using SSPI and joined to AD under Vista or later → Crash when using SSPI and joined to AD under Vista or later [@ strcat - nsImapFlagAndUidState::AddUidCustomFlagPair]
Version: unspecified → 1.9.1 Branch
Reporter | ||
Comment 2•15 years ago
|
||
Yes, I agree that the backtrace doesn't match the bug description; however if the bug is the same as bug 505971, I would assume the use of SSPI, in and of itself, could cause Thunderbird to become unstable and blow up at some later point.
I don't have immediate access to a Vista machine, but I'll try to get some additional crash reports submitted in the next few days.
Comment 3•15 years ago
|
||
I got a crash report generated under Windows Server 2008 R2 (equivalent to Windows 7) when trying to use SMTP with SSPI enabled and while logged into an AD account:
http://crash-stats.mozilla.com:80/report/index/e148a46f-4282-42fb-8604-6424f2090821
Comment 4•15 years ago
|
||
This crash occurred when using TB 3b3 under Win Server 2008 R2 when gssapi-enabled imap server was being accessed while logged into an AD account with network.auth-use-sspi=true:
http://crash-stats.mozilla.com:80/report/index/7fb38a9e-a2f6-4082-8a2f-df43d2090821?p=1
Comment 5•15 years ago
|
||
Karl your problem is described in bug 505971
Assignee | ||
Comment 6•15 years ago
|
||
marking blocker - I think bug 505971 is the same but I'll do the work here for now.
Assignee: nobody → bienvenu
Status: UNCONFIRMED → ASSIGNED
Ever confirmed: true
Flags: blocking-thunderbird3+
Target Milestone: --- → Thunderbird 3.0b4
Updated•15 years ago
|
Whiteboard: [no l10n impact]
Assignee | ||
Comment 7•15 years ago
|
||
With much help from Karl (thx!) I've got an environment to reproduce this bug. The issue seems to be in the Microsoft secur32.dll (which might help explain why this bug seems to be new to Vista/Windows 7). When we call DecryptMessage on a token, we get back a success error code and a valid unwrapped token len, but trying to free the resulting unwrapped token crashes. According to the comments in the code, we're only unwrapping the token to verify that the signature was correct (we're not doing security layers).
Since we're not using the unwrapped token, and don't care what it is, commenting out the freeing of the memory makes things work fine. I suppose it's possible that we should be freeing the memory differently, but an other possibility is that the arguments we're passing to DecryptMessage might be exposing a bug in secur32.dll. I suppose it's also remotely possible that we shouldn't be using secur32.dll - this code is fairly old. Cc'ing Simon who might just know off the top of his head what's going wrong.
Here's the call to DecryptMessage:
http://mxr.mozilla.org/comm-central/source/mozilla/extensions/auth/nsAuthSSPI.cpp#407
and here's the free call:
http://mxr.mozilla.org/comm-central/source/mozilla/extensions/auth/nsAuthSASL.cpp#135
I'm marking security sensitive for now, just because it's a potential heap corruption, though I don't know if it's exploitable.
Group: core-security
Assignee | ||
Comment 8•15 years ago
|
||
In the MSDN sample code, they don't say anything about having the free the result data, but I don't know if that's just assumed or not.
Assignee | ||
Comment 9•15 years ago
|
||
they do say that the data is decrypted in place, from the input buffer, which implies we wouldn't have to free it.
http://msdn.microsoft.com/en-us/library/aa375215%28VS.85%29.aspx
Our code looks to be straight from the sample code, except that the sample code doesn't free the memory.
Comment 10•15 years ago
|
||
(In reply to comment #7)
> With much help from Karl (thx!) I've got an environment to reproduce this bug.
> The issue seems to be in the Microsoft secur32.dll (which might help explain
> why this bug seems to be new to Vista/Windows 7).
Therefore seems not dupe at all of bug 505971.
Assignee | ||
Comment 11•15 years ago
|
||
why do you say that? Isn't that SSPI GSSAPI as well? Or are you saying you're having the issue with XP?
Comment 12•15 years ago
|
||
(In reply to comment #11)
> Or are you saying you're having the issue with XP?
Exactly, there crash reports from Windows XP, tested on Windows 7 and XP.
Assignee | ||
Comment 13•15 years ago
|
||
I have no technical reason to believe that the issue doesn't happen on XP, other than some folks say they haven't seen it on XP. If you can do your own builds, I can tell you what line to comment out and see if the problem goes away on XP.
Comment 14•15 years ago
|
||
If you are talking about exactly this bug, I'm not aware any problems such as these described by reporter. Only those reported in bug 505971. Still I can make my own builds (at least give a try)
Assignee | ||
Comment 15•15 years ago
|
||
the general problem is a crash after doing SSPI GSSAPI authentication due to heap corruption. bug 505971 sounds like it matches. Given the nature of heap corruption, and this bug in particular, I would expect the actual crash site to differ between builds and OS's.
I haven't tried this myself, but a simple fix would be to find this code
414 if (SEC_SUCCESS(rc)) {
415 *outToken = ib[1].pvBuffer;
416 *outTokenLen = ib[1].cbBuffer;
and just change the *outToken = ... line to *outToken = NULL;
which is here:
http://mxr.mozilla.org/comm-central/source/mozilla/extensions/auth/nsAuthSSPI.cpp#407
Assignee | ||
Comment 16•15 years ago
|
||
I think this affects Firefox, in theory, at least, since the code is shared with Firefox. We very much would like this for the next beta of TB 3, which has code freeze in about 2 weeks. Someone other than me should probably figure out if it affects Firefox in actual fact, but I think this fix should go into whatever versions of gecko Thunderbird ships on, at least. Since I only have the version of gecko that Thunderbird uses, once this is reviewed, it would be helpful if someone else could land it on the trunk...
Attachment #397375 -
Flags: superreview?(neil)
Attachment #397375 -
Flags: review?(simon)
Attachment #397375 -
Flags: approval1.9.1.3?
Attachment #397375 -
Flags: approval1.8.1.next?
Comment 17•15 years ago
|
||
Comment on attachment 397375 [details] [diff] [review]
proposed fix
1.9.1.3 is frozen.
Attachment #397375 -
Flags: approval1.9.1.3? → approval1.9.1.4?
Comment 18•15 years ago
|
||
Comment on attachment 397375 [details] [diff] [review]
proposed fix
>
> else
> nsMemory::Free(ib[1].pvBuffer);
This should free ib[0].pvBuffer (which we've allocated), not ib[1].pvBuffer, which may not be a pointer to the start of an allocated block.
S.
Attachment #397375 -
Flags: review?(simon) → review-
Comment 19•15 years ago
|
||
(In reply to comment #15)
David, I've tested this small suggestion and it appears works fine and resolving bug 505971 issue. I've test this only on Windows 7.
Comment 20•15 years ago
|
||
And its working just fine on XP too
Assignee | ||
Comment 21•15 years ago
|
||
Attachment #397375 -
Attachment is obsolete: true
Attachment #397446 -
Flags: superreview?(neil)
Attachment #397446 -
Flags: review?(simon)
Attachment #397375 -
Flags: superreview?(neil)
Attachment #397375 -
Flags: approval1.9.1.4?
Attachment #397375 -
Flags: approval1.8.1.next?
Comment 22•15 years ago
|
||
(In reply to comment #16)
> I think this affects Firefox, in theory, at least, since the code is shared
> with Firefox. We very much would like this for the next beta of TB 3, which has
> code freeze in about 2 weeks. Someone other than me should probably figure out
> if it affects Firefox in actual fact, but I think this fix should go into
> whatever versions of gecko Thunderbird ships on, at least. Since I only have
> the version of gecko that Thunderbird uses, once this is reviewed, it would be
> helpful if someone else could land it on the trunk...
Well I can't crash Firefox, probably something special need to do but just surfing pages with SSPI authentication enabled does nothing.
Comment 23•15 years ago
|
||
(In reply to comment #8)
> In the MSDN sample code
Got a link to that? I'm finding it really hard to work out what Unwrap is trying to achieve and reading that is my last resort.
Assignee | ||
Comment 24•15 years ago
|
||
http://msdn.microsoft.com/en-us/library/aa375215%28VS.85%29.aspx describes what DecryptMessage does. In particular, note that it says it decrypts in place, which means that the outbuffer pointer it returns is a pointer into the input buffer, which is also what we see in the debugger. Simon says he could imagine the pointer not being at the start of the buffer, which is why we have the code that copies the output buffer if the pointer is not at the start of the buffer.
Assignee | ||
Updated•15 years ago
|
Whiteboard: [no l10n impact] → [no l10n impact][has patch for review]
Comment 25•15 years ago
|
||
Comment on attachment 397446 [details] [diff] [review]
fix addressing comments
I'm happy that this is theoretically correct, but I don't have a Windows development system handy to test it on.
Attachment #397446 -
Flags: review?(simon) → review+
Assignee | ||
Comment 26•15 years ago
|
||
I've gone to rather great pains to test it, so I'm confident it works. Perhaps Nikolay could be prevailed upon to test this latest patch, instead of the hack I suggested to him earlier...
Comment 27•15 years ago
|
||
Works good, no problem so far. Only problem is my builds are with memory leak so can't test if this code leaks anything. Thanks for fix.
Assignee | ||
Comment 28•15 years ago
|
||
Nikolay, I've kicked off a try server build with the patch that you can try, if you want - it shouldn't have any memory leak problems.
http://tinderbox.mozilla.org/showbuilds.cgi?tree=ThunderbirdTry
However, I'm not really sure you'd be able to detect any leaks if there were any - there are about 10 bytes of memory allocated in this code, per connection to the imap server.
Comment 30•15 years ago
|
||
Thanks David, if that just 10 bytes it really difficult to test manually. So it not worth trying.
btw
Try server actually reports - fail to patch, if it really matters
unable to find 'extensions/auth/nsAuthSSPI.cpp' for patching
1 out of 1 hunks FAILED -- saving rejects to file extensions/auth/nsAuthSSPI.cpp.rej
extensions\auth\nsAuthSSPI.cpp: The system cannot find the file specified
Assignee | ||
Comment 31•15 years ago
|
||
oh, yeah, it's a moz-central, not comm-central patch. But yeah, if it's just for you to try to see if there's any memory leaks, it's not going to help you.
Comment 32•15 years ago
|
||
(In reply to comment #24)
> http://msdn.microsoft.com/en-us/library/aa375215%28VS.85%29.aspx describes what
> DecryptMessage does. In particular, note that it says it decrypts in place,
> which means that the outbuffer pointer it returns is a pointer into the input
I don't see anything about inbuffer and outbuffer pointers...
Assignee | ||
Comment 33•15 years ago
|
||
pMessage [in, out]
A pointer to a SecBufferDesc structure. On input, the structure references one or more SecBuffer structures. One of these may be of type SECBUFFER_DATA. That buffer contains the encrypted message. The encrypted message is decrypted in place, overwriting the original contents of its buffer.
This matches what I see in the debugger as well.
Comment 34•15 years ago
|
||
(In reply to comment #33)
> pMessage [in, out]
>
> A pointer to a SecBufferDesc structure. On input, the structure references
> one or more SecBuffer structures. One of these may be of type SECBUFFER_DATA.
> That buffer contains the encrypted message. The encrypted message is decrypted
> in place, overwriting the original contents of its buffer.
Right, but what I'm not following is why we pass in two structures, one of type SECBUFFER_DATA, and expect to read the output from the other structure.
Assignee | ||
Comment 35•15 years ago
|
||
If you scroll to the end of this page - http://msdn.microsoft.com/en-us/library/aa380496%28VS.85%29.aspx you'll see that the sample code MS provides does the same thing. We don't actually use the result (the caller throws it away - it just wants to check that it was decrypted successfully - if we try to turn on security levels, then we would not throw the data away, if I understand correctly).
Assignee | ||
Comment 36•15 years ago
|
||
The 1.9.x moz-central branch this needs to go into is freezing in a few days, and we'd really like to get this in before it freezes - let me know if there's anything else Simon or I can do to help explain this (the MS doc is not extremely helpful).
Whiteboard: [no l10n impact][has patch for review] → [no l10n impact][needs sr neil]
Comment 37•15 years ago
|
||
Comment on attachment 397446 [details] [diff] [review]
fix addressing comments
>+ memmove(*outToken, ib[1].pvBuffer, ib[1].cbBuffer);
Thanks, that makes sense now. Nit: use memcpy (or even nsMemory::Clone) here.
(I assume a previous revision of the patch memmoved from ib[1] to ib[0].)
Attachment #397446 -
Flags: superreview?(neil) → superreview+
Assignee | ||
Comment 38•15 years ago
|
||
OK, thx, I'll attach a new patch in a bit, and request moz-central check-in approval.
Assignee | ||
Updated•15 years ago
|
Whiteboard: [no l10n impact][needs sr neil] → [no l10n impact]
Assignee | ||
Comment 39•15 years ago
|
||
carrying forward r/sr, requesting moz-central checkin approval.
Attachment #397446 -
Attachment is obsolete: true
Attachment #399064 -
Flags: superreview+
Attachment #399064 -
Flags: review+
Attachment #399064 -
Flags: approval1.9.2?
Attachment #399064 -
Flags: approval1.9.1.4?
Assignee | ||
Comment 40•15 years ago
|
||
dveditz, I'm not clear what all moz-central branches this should land in. I believe it's a bug that goes a long way back. It may not affect Firefox but it definitely affects Thunderbird and SeaMonkey. So I guess I need at minimum to get this into TB 2.0x next and TB 3.0b4...
Assignee | ||
Updated•15 years ago
|
Attachment #399064 -
Flags: approval1.8.1.next?
Comment 41•15 years ago
|
||
Needs to land on trunk and 1.9.2 first at least so it get some baking...
Comment 42•15 years ago
|
||
Pushed to mozilla-central: http://hg.mozilla.org/mozilla-central/rev/3a1e9ee72015
Leaving this open whilst we bake and get approvals for branch so that it doesn't get lost from the TB 3 blocking list.
Whiteboard: [no l10n impact] → [no l10n impact][baking on trunk][awaiting branch approvals]
Updated•15 years ago
|
Whiteboard: [no l10n impact][baking on trunk][awaiting branch approvals] → [no l10n impact][baking on trunk][awaiting branch approvals][sg:critical]
Comment 43•15 years ago
|
||
Can we get 1.9.2 approval on this?
I know it hasn't baked for long, but we are looking to cut Thunderbird 3b4 on Tuesday so it would be good if we could get it in to 1.9.2 before the weekend so we have some hope of getting it into 1.9.1 by Tuesday...
Comment 44•15 years ago
|
||
This isn't in a component that any 1.9.2 drivers likely look at. You should ping one or two individually for approval.
Assignee | ||
Comment 45•15 years ago
|
||
pinging dveditz...
Comment 46•15 years ago
|
||
dveditz isn't a 1.9.2 driver. See the following page for a list of drivers for various releases.
https://wiki.mozilla.org/Releases/Drivers
Assignee | ||
Comment 47•15 years ago
|
||
bsmedberg, ping for 1.9.2 approval. afaik, Firefox doesn't seem to use this code, but Thunderbird needs this fix for our b4 build.
Comment 48•15 years ago
|
||
Comment on attachment 399064 [details] [diff] [review]
patch addressing Neil's comment
a192=beltzner
Attachment #399064 -
Flags: approval1.9.2? → approval1.9.2+
Comment 49•15 years ago
|
||
Checked into the 1.9.2 branch:
http://hg.mozilla.org/releases/mozilla-1.9.2/rev/2202e671651d
status1.9.2:
--- → beta1-fixed
Comment 50•15 years ago
|
||
Comment on attachment 399064 [details] [diff] [review]
patch addressing Neil's comment
Approved for 1.9.1.4, a=dveditz for release-drivers
Attachment #399064 -
Flags: approval1.9.1.4? → approval1.9.1.4+
Comment 51•15 years ago
|
||
Checked into the 1.9.1 branch:
http://hg.mozilla.org/releases/mozilla-1.9.1/rev/4aac246ba59f
Status: ASSIGNED → RESOLVED
Closed: 15 years ago
status1.9.1:
--- → .4-fixed
Resolution: --- → FIXED
Whiteboard: [no l10n impact][baking on trunk][awaiting branch approvals][sg:critical] → [no l10n impact][baking on trunk][sg:critical]
Updated•15 years ago
|
Whiteboard: [no l10n impact][baking on trunk][sg:critical] → [no l10n impact][sg:critical]
Comment 52•15 years ago
|
||
Can the reporter or someone with a repro environment try this with the nightly 1.9.1 Thunderbird build and see if the issue is actually fixed now?
ftp://ftp.mozilla.org/pub/thunderbird/nightly/2009-09-15-03-comm-1.9.1/
Comment 53•15 years ago
|
||
It is fixed
Comment 54•15 years ago
|
||
Tested on Windows Server 2008 R2 64-bit, Windows 7 32-bit, Window Vista, and Windows XP (all joined to an MS Active Directory). Thanks to all for working on this.
Updated•15 years ago
|
Status: RESOLVED → VERIFIED
Assignee | ||
Comment 56•15 years ago
|
||
who does 1.8.1.next approvals? I'd like to get this fix in the next 2.0x TB build...
Comment 57•15 years ago
|
||
Sam, Dan, and I do them.
Updated•15 years ago
|
Flags: wanted1.8.1.x+
Flags: blocking1.8.1.next?
Updated•15 years ago
|
Flags: blocking1.8.1.next? → blocking1.8.1.next+
Comment 58•15 years ago
|
||
Comment on attachment 399064 [details] [diff] [review]
patch addressing Neil's comment
Looks like this never landed on the 1.9.0 branch. When you land on the 1.8 branch in CVS please go ahead and land on CVE HEAD as well.
Attachment #399064 -
Flags: approval1.9.0.18+
Attachment #399064 -
Flags: approval1.8.1.next?
Attachment #399064 -
Flags: approval1.8.1.next+
Comment 59•15 years ago
|
||
dveditz: thanks for the heads up!
Assignee | ||
Comment 60•15 years ago
|
||
I've landed this on the 1.8 branch but I don't have a CVS head tree pulled right now. I'll try to get one built at some point...
Keywords: fixed1.8.1.24
Updated•15 years ago
|
Whiteboard: [no l10n impact][sg:critical] → [sg:critical][no l10n impact][needs 1.9.0 landing]
Comment 61•15 years ago
|
||
Comment on attachment 399064 [details] [diff] [review]
patch addressing Neil's comment
removing 1.9.0.18 approval, time to ship. Please re-request approval if this is still wanted by someone maintaining mailnews on the 1.9.0 branch
Attachment #399064 -
Flags: approval1.9.0.18+ → approval1.9.0.18-
Comment 62•15 years ago
|
||
This is now checked into 1.8.1 for Thunderbird 2.0.0.24. If possible, we need the reporter or someone else with Berkeley e-mail access to verify that it is fixed in TB 2.0.0.24. This can be done using a nightly build from ftp://ftp.mozilla.org/pub/thunderbird/nightly/latest-mozilla1.8/.
Comment 63•15 years ago
|
||
I can confirm correct working with SSPI enabled on Win7 Enterprise 32-bit joined to AD and running TB version 2.0.0.24pre (20100211) for both IMAP and SMTP. Thanks for helping to get this addressed for our campus.
Assignee | ||
Comment 64•15 years ago
|
||
Thx, Karl.
Comment 65•15 years ago
|
||
Thanks!
Marking as verified for 1.8.1.24.
Keywords: fixed1.8.1.24 → verified1.8.1.24
Updated•15 years ago
|
Group: core-security
Updated•13 years ago
|
Crash Signature: [@ strcat - nsImapFlagAndUidState::AddUidCustomFlagPair]
You need to log in
before you can comment on or make changes to this bug.
Description
•