Vulnerabilites related to gnome - balsa
CVE-2007-5007 (GCVE-0-2007-5007)
Vulnerability from cvelistv5
Published
2007-09-20 20:00
Modified
2024-08-07 15:17
Severity ?
Summary
Stack-based buffer overflow in the ir_fetch_seq function in balsa before 2.3.20 might allow remote IMAP servers to execute arbitrary code via a long response to a FETCH command.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T15:17:27.993Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.gentoo.org/show_bug.cgi?id=193179"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=297581"
          },
          {
            "name": "SUSE-SR:2007:019",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://www.novell.com/linux/security/advisories/2007_19_sr.html"
          },
          {
            "name": "25777",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/25777"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugzilla.gnome.org/show_bug.cgi?id=474366"
          },
          {
            "name": "26987",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26987"
          },
          {
            "name": "[ANNOUNCE] 20070907 balsa-2.3.20 released",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://mail.gnome.org/archives/balsa-list/2007-September/msg00010.html"
          },
          {
            "name": "ADV-2007-3263",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/3263"
          },
          {
            "name": "27272",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/27272"
          },
          {
            "name": "40585",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/40585"
          },
          {
            "name": "GLSA-200710-17",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-200710-17.xml"
          },
          {
            "name": "26947",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26947"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-09-20T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Stack-based buffer overflow in the ir_fetch_seq function in balsa before 2.3.20 might allow remote IMAP servers to execute arbitrary code via a long response to a FETCH command."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2007-09-28T09:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.gentoo.org/show_bug.cgi?id=193179"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=297581"
        },
        {
          "name": "SUSE-SR:2007:019",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://www.novell.com/linux/security/advisories/2007_19_sr.html"
        },
        {
          "name": "25777",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/25777"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugzilla.gnome.org/show_bug.cgi?id=474366"
        },
        {
          "name": "26987",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26987"
        },
        {
          "name": "[ANNOUNCE] 20070907 balsa-2.3.20 released",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://mail.gnome.org/archives/balsa-list/2007-September/msg00010.html"
        },
        {
          "name": "ADV-2007-3263",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/3263"
        },
        {
          "name": "27272",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/27272"
        },
        {
          "name": "40585",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/40585"
        },
        {
          "name": "GLSA-200710-17",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-200710-17.xml"
        },
        {
          "name": "26947",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26947"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "[email protected]",
          "ID": "CVE-2007-5007",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Stack-based buffer overflow in the ir_fetch_seq function in balsa before 2.3.20 might allow remote IMAP servers to execute arbitrary code via a long response to a FETCH command."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://bugs.gentoo.org/show_bug.cgi?id=193179",
              "refsource": "CONFIRM",
              "url": "http://bugs.gentoo.org/show_bug.cgi?id=193179"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=297581",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=297581"
            },
            {
              "name": "SUSE-SR:2007:019",
              "refsource": "SUSE",
              "url": "http://www.novell.com/linux/security/advisories/2007_19_sr.html"
            },
            {
              "name": "25777",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/25777"
            },
            {
              "name": "http://bugzilla.gnome.org/show_bug.cgi?id=474366",
              "refsource": "CONFIRM",
              "url": "http://bugzilla.gnome.org/show_bug.cgi?id=474366"
            },
            {
              "name": "26987",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26987"
            },
            {
              "name": "[ANNOUNCE] 20070907 balsa-2.3.20 released",
              "refsource": "MLIST",
              "url": "http://mail.gnome.org/archives/balsa-list/2007-September/msg00010.html"
            },
            {
              "name": "ADV-2007-3263",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/3263"
            },
            {
              "name": "27272",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/27272"
            },
            {
              "name": "40585",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/40585"
            },
            {
              "name": "GLSA-200710-17",
              "refsource": "GENTOO",
              "url": "http://www.gentoo.org/security/en/glsa/glsa-200710-17.xml"
            },
            {
              "name": "26947",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26947"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-5007",
    "datePublished": "2007-09-20T20:00:00",
    "dateReserved": "2007-09-20T00:00:00",
    "dateUpdated": "2024-08-07T15:17:27.993Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-16118 (GCVE-0-2020-16118)
Vulnerability from cvelistv5
Published
2020-07-29 17:58
Modified
2024-08-04 13:37
Severity ?
Summary
In GNOME Balsa before 2.6.0, a malicious server operator or man in the middle can trigger a NULL pointer dereference and client crash by sending a PREAUTH response to imap_mbox_connect in libbalsa/imap/imap-handle.c.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T13:37:53.604Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://gitlab.gnome.org/GNOME/balsa/-/issues/23"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://gitlab.gnome.org/GNOME/balsa/-/commit/4e245d758e1c826a01080d40c22ca8706f0339e5"
          },
          {
            "name": "openSUSE-SU-2020:1207",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00035.html"
          },
          {
            "name": "openSUSE-SU-2020:1230",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00045.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In GNOME Balsa before 2.6.0, a malicious server operator or man in the middle can trigger a NULL pointer dereference and client crash by sending a PREAUTH response to imap_mbox_connect in libbalsa/imap/imap-handle.c."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-08-18T11:06:16",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://gitlab.gnome.org/GNOME/balsa/-/issues/23"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://gitlab.gnome.org/GNOME/balsa/-/commit/4e245d758e1c826a01080d40c22ca8706f0339e5"
        },
        {
          "name": "openSUSE-SU-2020:1207",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00035.html"
        },
        {
          "name": "openSUSE-SU-2020:1230",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00045.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "[email protected]",
          "ID": "CVE-2020-16118",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In GNOME Balsa before 2.6.0, a malicious server operator or man in the middle can trigger a NULL pointer dereference and client crash by sending a PREAUTH response to imap_mbox_connect in libbalsa/imap/imap-handle.c."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://gitlab.gnome.org/GNOME/balsa/-/issues/23",
              "refsource": "MISC",
              "url": "https://gitlab.gnome.org/GNOME/balsa/-/issues/23"
            },
            {
              "name": "https://gitlab.gnome.org/GNOME/balsa/-/commit/4e245d758e1c826a01080d40c22ca8706f0339e5",
              "refsource": "MISC",
              "url": "https://gitlab.gnome.org/GNOME/balsa/-/commit/4e245d758e1c826a01080d40c22ca8706f0339e5"
            },
            {
              "name": "openSUSE-SU-2020:1207",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00035.html"
            },
            {
              "name": "openSUSE-SU-2020:1230",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00045.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2020-16118",
    "datePublished": "2020-07-29T17:58:51",
    "dateReserved": "2020-07-29T00:00:00",
    "dateUpdated": "2024-08-04T13:37:53.604Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-13645 (GCVE-0-2020-13645)
Vulnerability from cvelistv5
Published
2020-05-28 11:55
Modified
2024-08-04 12:25
Severity ?
Summary
In GNOME glib-networking through 2.64.2, the implementation of GTlsClientConnection skips hostname verification of the server's TLS certificate if the application fails to specify the expected server identity. This is in contrast to its intended documented behavior, to fail the certificate verification. Applications that fail to provide the server identity, including Balsa before 2.5.11 and 2.6.x before 2.6.1, accept a TLS certificate if the certificate is valid for any host.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T12:25:16.135Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://gitlab.gnome.org/GNOME/glib-networking/-/issues/135"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://gitlab.gnome.org/GNOME/balsa/-/issues/34"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20200608-0004/"
          },
          {
            "name": "FEDORA-2020-98ebbd1397",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TQEQJQ4XFMFCFJTEXKL2ZO3UELBPCKSK/"
          },
          {
            "name": "FEDORA-2020-cadbc5992f",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HLEX2IP62SU6WJ4SK3U766XGLQK3J62O/"
          },
          {
            "name": "FEDORA-2020-a83c8cd358",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LRCUM22YEWWKNMN2BP5LTVDM5P4VWIXS/"
          },
          {
            "name": "USN-4405-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "https://usn.ubuntu.com/4405-1/"
          },
          {
            "name": "GLSA-202007-50",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/202007-50"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In GNOME glib-networking through 2.64.2, the implementation of GTlsClientConnection skips hostname verification of the server\u0027s TLS certificate if the application fails to specify the expected server identity. This is in contrast to its intended documented behavior, to fail the certificate verification. Applications that fail to provide the server identity, including Balsa before 2.5.11 and 2.6.x before 2.6.1, accept a TLS certificate if the certificate is valid for any host."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-07-27T03:06:08",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://gitlab.gnome.org/GNOME/glib-networking/-/issues/135"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://gitlab.gnome.org/GNOME/balsa/-/issues/34"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20200608-0004/"
        },
        {
          "name": "FEDORA-2020-98ebbd1397",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TQEQJQ4XFMFCFJTEXKL2ZO3UELBPCKSK/"
        },
        {
          "name": "FEDORA-2020-cadbc5992f",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HLEX2IP62SU6WJ4SK3U766XGLQK3J62O/"
        },
        {
          "name": "FEDORA-2020-a83c8cd358",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LRCUM22YEWWKNMN2BP5LTVDM5P4VWIXS/"
        },
        {
          "name": "USN-4405-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "https://usn.ubuntu.com/4405-1/"
        },
        {
          "name": "GLSA-202007-50",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/202007-50"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "[email protected]",
          "ID": "CVE-2020-13645",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In GNOME glib-networking through 2.64.2, the implementation of GTlsClientConnection skips hostname verification of the server\u0027s TLS certificate if the application fails to specify the expected server identity. This is in contrast to its intended documented behavior, to fail the certificate verification. Applications that fail to provide the server identity, including Balsa before 2.5.11 and 2.6.x before 2.6.1, accept a TLS certificate if the certificate is valid for any host."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://gitlab.gnome.org/GNOME/glib-networking/-/issues/135",
              "refsource": "MISC",
              "url": "https://gitlab.gnome.org/GNOME/glib-networking/-/issues/135"
            },
            {
              "name": "https://gitlab.gnome.org/GNOME/balsa/-/issues/34",
              "refsource": "MISC",
              "url": "https://gitlab.gnome.org/GNOME/balsa/-/issues/34"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20200608-0004/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20200608-0004/"
            },
            {
              "name": "FEDORA-2020-98ebbd1397",
              "refsource": "FEDORA",
              "url": "https://lists.fedoraproject.org/archives/list/[email protected]/message/TQEQJQ4XFMFCFJTEXKL2ZO3UELBPCKSK/"
            },
            {
              "name": "FEDORA-2020-cadbc5992f",
              "refsource": "FEDORA",
              "url": "https://lists.fedoraproject.org/archives/list/[email protected]/message/HLEX2IP62SU6WJ4SK3U766XGLQK3J62O/"
            },
            {
              "name": "FEDORA-2020-a83c8cd358",
              "refsource": "FEDORA",
              "url": "https://lists.fedoraproject.org/archives/list/[email protected]/message/LRCUM22YEWWKNMN2BP5LTVDM5P4VWIXS/"
            },
            {
              "name": "USN-4405-1",
              "refsource": "UBUNTU",
              "url": "https://usn.ubuntu.com/4405-1/"
            },
            {
              "name": "GLSA-202007-50",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/202007-50"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2020-13645",
    "datePublished": "2020-05-28T11:55:39",
    "dateReserved": "2020-05-28T00:00:00",
    "dateUpdated": "2024-08-04T12:25:16.135Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2020-05-28 12:15
Modified
2024-11-21 05:01
Summary
In GNOME glib-networking through 2.64.2, the implementation of GTlsClientConnection skips hostname verification of the server's TLS certificate if the application fails to specify the expected server identity. This is in contrast to its intended documented behavior, to fail the certificate verification. Applications that fail to provide the server identity, including Balsa before 2.5.11 and 2.6.x before 2.6.1, accept a TLS certificate if the certificate is valid for any host.
References
[email protected]https://gitlab.gnome.org/GNOME/balsa/-/issues/34Exploit, Vendor Advisory
[email protected]https://gitlab.gnome.org/GNOME/glib-networking/-/issues/135Exploit, Vendor Advisory
[email protected]https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HLEX2IP62SU6WJ4SK3U766XGLQK3J62O/
[email protected]https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LRCUM22YEWWKNMN2BP5LTVDM5P4VWIXS/
[email protected]https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TQEQJQ4XFMFCFJTEXKL2ZO3UELBPCKSK/
[email protected]https://security.gentoo.org/glsa/202007-50Third Party Advisory
[email protected]https://security.netapp.com/advisory/ntap-20200608-0004/Third Party Advisory
[email protected]https://usn.ubuntu.com/4405-1/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://gitlab.gnome.org/GNOME/balsa/-/issues/34Exploit, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://gitlab.gnome.org/GNOME/glib-networking/-/issues/135Exploit, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HLEX2IP62SU6WJ4SK3U766XGLQK3J62O/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LRCUM22YEWWKNMN2BP5LTVDM5P4VWIXS/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TQEQJQ4XFMFCFJTEXKL2ZO3UELBPCKSK/
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/202007-50Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20200608-0004/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/4405-1/Third Party Advisory



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:gnome:balsa:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC0C6B25-3989-4491-B956-EEB2BB7E98DC",
              "versionEndExcluding": "2.5.11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:balsa:2.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECD7DBF7-F15C-4BE2-B4CC-4312A05966B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:glib-networking:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "474CE3E4-30D3-4AE3-9CBB-29EE51772DB4",
              "versionEndExcluding": "2.62.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:glib-networking:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EF800C2-5EB3-4BF3-8A5E-3B5CB1391A13",
              "versionEndExcluding": "2.64.3",
              "versionStartIncluding": "2.64.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "A31C8344-3E02-4EB8-8BD8-4C84B7959624",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "902B8056-9E37-443B-8905-8AA93E2447FB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
              "matchCriteriaId": "80F0FA5D-8D3B-4C0E-81E2-87998286AF33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
              "matchCriteriaId": "36D96259-24BD-44E2-96D9-78CE1D41F956",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C2089EE-5D7F-47EC-8EA5-0F69790564C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:broadcom:fabric_operating_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "046FB51E-B768-44D3-AEB5-D857145CA840",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In GNOME glib-networking through 2.64.2, the implementation of GTlsClientConnection skips hostname verification of the server\u0027s TLS certificate if the application fails to specify the expected server identity. This is in contrast to its intended documented behavior, to fail the certificate verification. Applications that fail to provide the server identity, including Balsa before 2.5.11 and 2.6.x before 2.6.1, accept a TLS certificate if the certificate is valid for any host."
    },
    {
      "lang": "es",
      "value": "En GNOME glib-networking versiones hasta 2.64.2, la implementaci\u00f3n de GTlsClientConnection omite la verificaci\u00f3n del nombre de host del certificado TLS del servidor si la aplicaci\u00f3n presenta un fallo al especificar la identidad esperada del servidor. Esto est\u00e1 en contraste con su comportamiento documentado previsto, en el fallo de la verificaci\u00f3n del certificado. Las aplicaciones que fallaron al proporcionar la identidad del servidor, incluidas Balsa versiones anteriores a 2.5.11 y versiones 2.6.x anteriores a 2.6.1, aceptan un certificado TLS si el certificado es v\u00e1lido para cualquier host."
    }
  ],
  "id": "CVE-2020-13645",
  "lastModified": "2024-11-21T05:01:40.310",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 6.4,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "[email protected]",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.5,
        "source": "[email protected]",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-05-28T12:15:11.173",
  "references": [
    {
      "source": "[email protected]",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "https://gitlab.gnome.org/GNOME/balsa/-/issues/34"
    },
    {
      "source": "[email protected]",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "https://gitlab.gnome.org/GNOME/glib-networking/-/issues/135"
    },
    {
      "source": "[email protected]",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HLEX2IP62SU6WJ4SK3U766XGLQK3J62O/"
    },
    {
      "source": "[email protected]",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LRCUM22YEWWKNMN2BP5LTVDM5P4VWIXS/"
    },
    {
      "source": "[email protected]",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TQEQJQ4XFMFCFJTEXKL2ZO3UELBPCKSK/"
    },
    {
      "source": "[email protected]",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/202007-50"
    },
    {
      "source": "[email protected]",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200608-0004/"
    },
    {
      "source": "[email protected]",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://usn.ubuntu.com/4405-1/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "https://gitlab.gnome.org/GNOME/balsa/-/issues/34"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "https://gitlab.gnome.org/GNOME/glib-networking/-/issues/135"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HLEX2IP62SU6WJ4SK3U766XGLQK3J62O/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LRCUM22YEWWKNMN2BP5LTVDM5P4VWIXS/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TQEQJQ4XFMFCFJTEXKL2ZO3UELBPCKSK/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/202007-50"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200608-0004/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://usn.ubuntu.com/4405-1/"
    }
  ],
  "sourceIdentifier": "[email protected]",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-295"
        }
      ],
      "source": "[email protected]",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2007-12-12 22:10
Modified
2025-04-09 00:30
Severity ?
Summary
Stack-based buffer overflow in the ir_fetch_seq function in balsa before 2.3.20 might allow remote IMAP servers to execute arbitrary code via a long response to a FETCH command.
References
[email protected]http://bugs.gentoo.org/show_bug.cgi?id=193179Exploit
[email protected]http://bugzilla.gnome.org/show_bug.cgi?id=474366
[email protected]http://mail.gnome.org/archives/balsa-list/2007-September/msg00010.htmlPatch
[email protected]http://osvdb.org/40585
[email protected]http://secunia.com/advisories/26947Vendor Advisory
[email protected]http://secunia.com/advisories/26987Vendor Advisory
[email protected]http://secunia.com/advisories/27272Vendor Advisory
[email protected]http://www.gentoo.org/security/en/glsa/glsa-200710-17.xml
[email protected]http://www.novell.com/linux/security/advisories/2007_19_sr.html
[email protected]http://www.securityfocus.com/bid/25777Patch
[email protected]http://www.vupen.com/english/advisories/2007/3263
[email protected]https://bugzilla.redhat.com/show_bug.cgi?id=297581
af854a3a-2127-422b-91ae-364da2661108http://bugs.gentoo.org/show_bug.cgi?id=193179Exploit
af854a3a-2127-422b-91ae-364da2661108http://bugzilla.gnome.org/show_bug.cgi?id=474366
af854a3a-2127-422b-91ae-364da2661108http://mail.gnome.org/archives/balsa-list/2007-September/msg00010.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/40585
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26947Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26987Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/27272Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-200710-17.xml
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2007_19_sr.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/25777Patch
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/3263
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=297581
Impacted products
Vendor Product Version
gnome balsa 1.1.7
gnome balsa 1.2.4
gnome balsa 1.4
gnome balsa 1.4.3
gnome balsa 2.0.6
gnome balsa 2.0.10
gnome balsa 2.0.16
gnome balsa 2.0.17
gnome balsa 2.0.18
gnome balsa 2.1
gnome balsa 2.1.1
gnome balsa 2.1.2
gnome balsa 2.1.3
gnome balsa 2.1.90
gnome balsa 2.1.91
gnome balsa 2.2
gnome balsa 2.2.1
gnome balsa 2.2.2
gnome balsa 2.2.3
gnome balsa 2.2.4
gnome balsa 2.2.5
gnome balsa 2.2.6
gnome balsa 2.3
gnome balsa 2.3.1
gnome balsa 2.3.2
gnome balsa 2.3.3
gnome balsa 2.3.4
gnome balsa 2.3.5
gnome balsa 2.3.6
gnome balsa 2.3.7
gnome balsa 2.3.8
gnome balsa 2.3.10
gnome balsa 2.3.11
gnome balsa 2.3.12
gnome balsa 2.3.13
gnome balsa 2.3.14
gnome balsa 2.3.15
gnome balsa 2.3.16
gnome balsa 2.3.17
gnome balsa 2.3.19



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:gnome:balsa:1.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "950C09DA-EAEA-4DE7-8A5E-ED9E82C653F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:balsa:1.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1BCE579-53AC-4B05-9E33-ACDA345D5B6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:balsa:1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C0E134F-93E3-4754-98A5-E6917853C99B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:balsa:1.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D0FCECC-E287-486D-A8C1-CA952F4FBC67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:balsa:2.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EAE6454-3B98-4AC8-8C03-4943F168AEF8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:balsa:2.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "91C14FE8-1596-4C1C-924D-D296EDB8FB9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:balsa:2.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "7225E52A-13A9-4283-8B00-D22C47358871",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:balsa:2.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7927268-514A-45C8-9A03-CF33426B2875",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:balsa:2.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFC7FF7A-856E-42BC-9129-A1B28F508EAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:balsa:2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "871512E9-340D-4BC3-A2C0-5D160E6F4004",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:balsa:2.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "596A3E04-CB96-4DFE-AE7C-B506DD3C54D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:balsa:2.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "209D1628-7C99-4722-8038-B835BDE57B5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:balsa:2.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8E8B391-160B-49E0-8505-AA0E625A792C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:balsa:2.1.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB30197C-3991-469D-83E9-9EBE17BFA59F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:balsa:2.1.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5BCD53C-61D5-49E2-8854-F8F8021DAA85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:balsa:2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA6D9C1F-A67A-4E1F-B6BE-9F98F9998DDD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:balsa:2.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B88D420-12D1-4196-9B6C-3A6BD4F4371C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:balsa:2.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FDDFC9F-A654-4644-9E8C-6F5902BFC51B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:balsa:2.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "EAFC41E5-6000-44B8-A7AC-426185E8FAB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:balsa:2.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "38D0233D-CCFC-47C0-B4D6-5F5F91A6260A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:balsa:2.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBA69D3A-E357-4B2A-9E9C-2CADA91E45A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:balsa:2.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "9506DE3C-AD8D-4128-AA5A-1B72465B73AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:balsa:2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1A9132B-91DC-404D-A3CA-69457DB75A71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:balsa:2.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "943CFC36-8856-4D8B-A7E5-DF1458769EBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:balsa:2.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "46DE94C8-F5D4-4D8C-AF9C-0290F24575AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:balsa:2.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B6C96C8-34EE-4C10-BB16-A093CB626FFC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:balsa:2.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8C116A3-1F8B-4F6B-8056-0685C9DAF9CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:balsa:2.3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "1134D391-A0CF-41AD-B871-423F1929BA58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:balsa:2.3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "50F69A80-C311-4840-AF70-ABDDB2D006EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:balsa:2.3.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "79156072-C833-4C7A-A07A-71DDC5BDCB4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:balsa:2.3.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BA4632D-4729-42A3-8778-C02F50D95C27",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:balsa:2.3.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F968DAE-A85A-483E-918F-45DA7CD5C0E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:balsa:2.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "6730AE89-6168-47FA-8C3C-8A54A8CF0790",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:balsa:2.3.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "61899224-39E2-485A-BD02-D0F596D0C3B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:balsa:2.3.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A3C98B1-04E7-4FB9-BBCA-A0CAC5C85453",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:balsa:2.3.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "850D4CD2-1F1F-43B7-8DD0-00985F059637",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:balsa:2.3.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A426AAD-E53A-4BCF-ADA2-A25215F36EA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:balsa:2.3.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A81A463-B9DF-4626-BA1F-0386D77A3BC9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:balsa:2.3.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDDA6B44-CB69-47FA-AC29-1A5D7BA14080",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:balsa:2.3.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "401E38DB-D54C-49B0-93B6-2DDE6FA93F6E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Stack-based buffer overflow in the ir_fetch_seq function in balsa before 2.3.20 might allow remote IMAP servers to execute arbitrary code via a long response to a FETCH command."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer basado en pila en la funci\u00f3n ir_fetch_seq de balsa anterior a 2.3.20 pod\u00eda permitir a servidores IMAP remotos ejecutar c\u00f3digo de su elecci\u00f3n mediante una respuesta larga para un comando FETCH."
    }
  ],
  "id": "CVE-2007-5007",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "[email protected]",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2007-12-12T22:10:00.000",
  "references": [
    {
      "source": "[email protected]",
      "tags": [
        "Exploit"
      ],
      "url": "http://bugs.gentoo.org/show_bug.cgi?id=193179"
    },
    {
      "source": "[email protected]",
      "url": "http://bugzilla.gnome.org/show_bug.cgi?id=474366"
    },
    {
      "source": "[email protected]",
      "tags": [
        "Patch"
      ],
      "url": "http://mail.gnome.org/archives/balsa-list/2007-September/msg00010.html"
    },
    {
      "source": "[email protected]",
      "url": "http://osvdb.org/40585"
    },
    {
      "source": "[email protected]",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26947"
    },
    {
      "source": "[email protected]",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26987"
    },
    {
      "source": "[email protected]",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/27272"
    },
    {
      "source": "[email protected]",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200710-17.xml"
    },
    {
      "source": "[email protected]",
      "url": "http://www.novell.com/linux/security/advisories/2007_19_sr.html"
    },
    {
      "source": "[email protected]",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/25777"
    },
    {
      "source": "[email protected]",
      "url": "http://www.vupen.com/english/advisories/2007/3263"
    },
    {
      "source": "[email protected]",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=297581"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://bugs.gentoo.org/show_bug.cgi?id=193179"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugzilla.gnome.org/show_bug.cgi?id=474366"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://mail.gnome.org/archives/balsa-list/2007-September/msg00010.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/40585"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26947"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26987"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/27272"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200710-17.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.novell.com/linux/security/advisories/2007_19_sr.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/25777"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/3263"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=297581"
    }
  ],
  "sourceIdentifier": "[email protected]",
  "vendorComments": [
    {
      "comment": "Not vulnerable. This issue did not affect version of balsa as shipped with Red Hat Enterprise Linux 2.1.",
      "lastModified": "2008-01-09T00:00:00",
      "organization": "Red Hat"
    }
  ],
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "[email protected]",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-07-29 18:15
Modified
2024-11-21 05:06
Summary
In GNOME Balsa before 2.6.0, a malicious server operator or man in the middle can trigger a NULL pointer dereference and client crash by sending a PREAUTH response to imap_mbox_connect in libbalsa/imap/imap-handle.c.
Impacted products
Vendor Product Version
gnome balsa *
opensuse backports_sle 15.0
opensuse leap 15.1



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:gnome:balsa:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5656FC65-29BD-415F-9359-C2798645B197",
              "versionEndExcluding": "2.6.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "40513095-7E6E-46B3-B604-C926F1BA3568",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In GNOME Balsa before 2.6.0, a malicious server operator or man in the middle can trigger a NULL pointer dereference and client crash by sending a PREAUTH response to imap_mbox_connect in libbalsa/imap/imap-handle.c."
    },
    {
      "lang": "es",
      "value": "En GNOME Balsa versiones anteriores a 2.6.0, un operador de servidor malicioso o un man in the middle puede desencadenar una desreferencia del puntero NULL y un bloqueo del cliente mediante el env\u00edo de una respuesta PREAUTH hacia la funci\u00f3n imap_mbox_connect en la biblioteca libbalsa/imap/imap-handle.c"
    }
  ],
  "id": "CVE-2020-16118",
  "lastModified": "2024-11-21T05:06:47.740",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "[email protected]",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "[email protected]",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-07-29T18:15:15.000",
  "references": [
    {
      "source": "[email protected]",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00035.html"
    },
    {
      "source": "[email protected]",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00045.html"
    },
    {
      "source": "[email protected]",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://gitlab.gnome.org/GNOME/balsa/-/commit/4e245d758e1c826a01080d40c22ca8706f0339e5"
    },
    {
      "source": "[email protected]",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://gitlab.gnome.org/GNOME/balsa/-/issues/23"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00035.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00045.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://gitlab.gnome.org/GNOME/balsa/-/commit/4e245d758e1c826a01080d40c22ca8706f0339e5"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://gitlab.gnome.org/GNOME/balsa/-/issues/23"
    }
  ],
  "sourceIdentifier": "[email protected]",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-476"
        }
      ],
      "source": "[email protected]",
      "type": "Primary"
    }
  ]
}

OSZAR »