Vulnerabilites related to gnome - balsa
CVE-2007-5007 (GCVE-0-2007-5007)
Vulnerability from cvelistv5
Published
2007-09-20 20:00
Modified
2024-08-07 15:17
Severity ?
VLAI Severity ?
EPSS score ?
Summary
Stack-based buffer overflow in the ir_fetch_seq function in balsa before 2.3.20 might allow remote IMAP servers to execute arbitrary code via a long response to a FETCH command.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T15:17:27.993Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.gentoo.org/show_bug.cgi?id=193179" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=297581" }, { "name": "SUSE-SR:2007:019", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2007_19_sr.html" }, { "name": "25777", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/25777" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugzilla.gnome.org/show_bug.cgi?id=474366" }, { "name": "26987", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26987" }, { "name": "[ANNOUNCE] 20070907 balsa-2.3.20 released", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://mail.gnome.org/archives/balsa-list/2007-September/msg00010.html" }, { "name": "ADV-2007-3263", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/3263" }, { "name": "27272", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27272" }, { "name": "40585", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/40585" }, { "name": "GLSA-200710-17", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200710-17.xml" }, { "name": "26947", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26947" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-09-20T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the ir_fetch_seq function in balsa before 2.3.20 might allow remote IMAP servers to execute arbitrary code via a long response to a FETCH command." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2007-09-28T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.gentoo.org/show_bug.cgi?id=193179" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=297581" }, { "name": "SUSE-SR:2007:019", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2007_19_sr.html" }, { "name": "25777", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/25777" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugzilla.gnome.org/show_bug.cgi?id=474366" }, { "name": "26987", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26987" }, { "name": "[ANNOUNCE] 20070907 balsa-2.3.20 released", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://mail.gnome.org/archives/balsa-list/2007-September/msg00010.html" }, { "name": "ADV-2007-3263", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/3263" }, { "name": "27272", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27272" }, { "name": "40585", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/40585" }, { "name": "GLSA-200710-17", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200710-17.xml" }, { "name": "26947", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26947" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "[email protected]", "ID": "CVE-2007-5007", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in the ir_fetch_seq function in balsa before 2.3.20 might allow remote IMAP servers to execute arbitrary code via a long response to a FETCH command." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://bugs.gentoo.org/show_bug.cgi?id=193179", "refsource": "CONFIRM", "url": "http://bugs.gentoo.org/show_bug.cgi?id=193179" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=297581", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=297581" }, { "name": "SUSE-SR:2007:019", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2007_19_sr.html" }, { "name": "25777", "refsource": "BID", "url": "http://www.securityfocus.com/bid/25777" }, { "name": "http://bugzilla.gnome.org/show_bug.cgi?id=474366", "refsource": "CONFIRM", "url": "http://bugzilla.gnome.org/show_bug.cgi?id=474366" }, { "name": "26987", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26987" }, { "name": "[ANNOUNCE] 20070907 balsa-2.3.20 released", "refsource": "MLIST", "url": "http://mail.gnome.org/archives/balsa-list/2007-September/msg00010.html" }, { "name": "ADV-2007-3263", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/3263" }, { "name": "27272", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/27272" }, { "name": "40585", "refsource": "OSVDB", "url": "http://osvdb.org/40585" }, { "name": "GLSA-200710-17", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-200710-17.xml" }, { "name": "26947", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26947" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-5007", "datePublished": "2007-09-20T20:00:00", "dateReserved": "2007-09-20T00:00:00", "dateUpdated": "2024-08-07T15:17:27.993Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-16118 (GCVE-0-2020-16118)
Vulnerability from cvelistv5
Published
2020-07-29 17:58
Modified
2024-08-04 13:37
Severity ?
VLAI Severity ?
EPSS score ?
Summary
In GNOME Balsa before 2.6.0, a malicious server operator or man in the middle can trigger a NULL pointer dereference and client crash by sending a PREAUTH response to imap_mbox_connect in libbalsa/imap/imap-handle.c.
References
▼ | URL | Tags |
---|---|---|
https://gitlab.gnome.org/GNOME/balsa/-/issues/23 | x_refsource_MISC | |
https://gitlab.gnome.org/GNOME/balsa/-/commit/4e245d758e1c826a01080d40c22ca8706f0339e5 | x_refsource_MISC | |
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00035.html | vendor-advisory, x_refsource_SUSE | |
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00045.html | vendor-advisory, x_refsource_SUSE |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T13:37:53.604Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gitlab.gnome.org/GNOME/balsa/-/issues/23" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gitlab.gnome.org/GNOME/balsa/-/commit/4e245d758e1c826a01080d40c22ca8706f0339e5" }, { "name": "openSUSE-SU-2020:1207", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00035.html" }, { "name": "openSUSE-SU-2020:1230", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00045.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In GNOME Balsa before 2.6.0, a malicious server operator or man in the middle can trigger a NULL pointer dereference and client crash by sending a PREAUTH response to imap_mbox_connect in libbalsa/imap/imap-handle.c." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-08-18T11:06:16", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://gitlab.gnome.org/GNOME/balsa/-/issues/23" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gitlab.gnome.org/GNOME/balsa/-/commit/4e245d758e1c826a01080d40c22ca8706f0339e5" }, { "name": "openSUSE-SU-2020:1207", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00035.html" }, { "name": "openSUSE-SU-2020:1230", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00045.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "[email protected]", "ID": "CVE-2020-16118", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In GNOME Balsa before 2.6.0, a malicious server operator or man in the middle can trigger a NULL pointer dereference and client crash by sending a PREAUTH response to imap_mbox_connect in libbalsa/imap/imap-handle.c." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://gitlab.gnome.org/GNOME/balsa/-/issues/23", "refsource": "MISC", "url": "https://gitlab.gnome.org/GNOME/balsa/-/issues/23" }, { "name": "https://gitlab.gnome.org/GNOME/balsa/-/commit/4e245d758e1c826a01080d40c22ca8706f0339e5", "refsource": "MISC", "url": "https://gitlab.gnome.org/GNOME/balsa/-/commit/4e245d758e1c826a01080d40c22ca8706f0339e5" }, { "name": "openSUSE-SU-2020:1207", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00035.html" }, { "name": "openSUSE-SU-2020:1230", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00045.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-16118", "datePublished": "2020-07-29T17:58:51", "dateReserved": "2020-07-29T00:00:00", "dateUpdated": "2024-08-04T13:37:53.604Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-13645 (GCVE-0-2020-13645)
Vulnerability from cvelistv5
Published
2020-05-28 11:55
Modified
2024-08-04 12:25
Severity ?
VLAI Severity ?
EPSS score ?
Summary
In GNOME glib-networking through 2.64.2, the implementation of GTlsClientConnection skips hostname verification of the server's TLS certificate if the application fails to specify the expected server identity. This is in contrast to its intended documented behavior, to fail the certificate verification. Applications that fail to provide the server identity, including Balsa before 2.5.11 and 2.6.x before 2.6.1, accept a TLS certificate if the certificate is valid for any host.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T12:25:16.135Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gitlab.gnome.org/GNOME/glib-networking/-/issues/135" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gitlab.gnome.org/GNOME/balsa/-/issues/34" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20200608-0004/" }, { "name": "FEDORA-2020-98ebbd1397", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TQEQJQ4XFMFCFJTEXKL2ZO3UELBPCKSK/" }, { "name": "FEDORA-2020-cadbc5992f", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HLEX2IP62SU6WJ4SK3U766XGLQK3J62O/" }, { "name": "FEDORA-2020-a83c8cd358", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LRCUM22YEWWKNMN2BP5LTVDM5P4VWIXS/" }, { "name": "USN-4405-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4405-1/" }, { "name": "GLSA-202007-50", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202007-50" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In GNOME glib-networking through 2.64.2, the implementation of GTlsClientConnection skips hostname verification of the server\u0027s TLS certificate if the application fails to specify the expected server identity. This is in contrast to its intended documented behavior, to fail the certificate verification. Applications that fail to provide the server identity, including Balsa before 2.5.11 and 2.6.x before 2.6.1, accept a TLS certificate if the certificate is valid for any host." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-07-27T03:06:08", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://gitlab.gnome.org/GNOME/glib-networking/-/issues/135" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gitlab.gnome.org/GNOME/balsa/-/issues/34" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20200608-0004/" }, { "name": "FEDORA-2020-98ebbd1397", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TQEQJQ4XFMFCFJTEXKL2ZO3UELBPCKSK/" }, { "name": "FEDORA-2020-cadbc5992f", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HLEX2IP62SU6WJ4SK3U766XGLQK3J62O/" }, { "name": "FEDORA-2020-a83c8cd358", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LRCUM22YEWWKNMN2BP5LTVDM5P4VWIXS/" }, { "name": "USN-4405-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4405-1/" }, { "name": "GLSA-202007-50", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202007-50" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "[email protected]", "ID": "CVE-2020-13645", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In GNOME glib-networking through 2.64.2, the implementation of GTlsClientConnection skips hostname verification of the server\u0027s TLS certificate if the application fails to specify the expected server identity. This is in contrast to its intended documented behavior, to fail the certificate verification. Applications that fail to provide the server identity, including Balsa before 2.5.11 and 2.6.x before 2.6.1, accept a TLS certificate if the certificate is valid for any host." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://gitlab.gnome.org/GNOME/glib-networking/-/issues/135", "refsource": "MISC", "url": "https://gitlab.gnome.org/GNOME/glib-networking/-/issues/135" }, { "name": "https://gitlab.gnome.org/GNOME/balsa/-/issues/34", "refsource": "MISC", "url": "https://gitlab.gnome.org/GNOME/balsa/-/issues/34" }, { "name": "https://security.netapp.com/advisory/ntap-20200608-0004/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20200608-0004/" }, { "name": "FEDORA-2020-98ebbd1397", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/[email protected]/message/TQEQJQ4XFMFCFJTEXKL2ZO3UELBPCKSK/" }, { "name": "FEDORA-2020-cadbc5992f", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/[email protected]/message/HLEX2IP62SU6WJ4SK3U766XGLQK3J62O/" }, { "name": "FEDORA-2020-a83c8cd358", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/[email protected]/message/LRCUM22YEWWKNMN2BP5LTVDM5P4VWIXS/" }, { "name": "USN-4405-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4405-1/" }, { "name": "GLSA-202007-50", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202007-50" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-13645", "datePublished": "2020-05-28T11:55:39", "dateReserved": "2020-05-28T00:00:00", "dateUpdated": "2024-08-04T12:25:16.135Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2020-05-28 12:15
Modified
2024-11-21 05:01
Severity ?
Summary
In GNOME glib-networking through 2.64.2, the implementation of GTlsClientConnection skips hostname verification of the server's TLS certificate if the application fails to specify the expected server identity. This is in contrast to its intended documented behavior, to fail the certificate verification. Applications that fail to provide the server identity, including Balsa before 2.5.11 and 2.6.x before 2.6.1, accept a TLS certificate if the certificate is valid for any host.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
gnome | balsa | * | |
gnome | balsa | 2.6.0 | |
gnome | glib-networking | * | |
gnome | glib-networking | * | |
canonical | ubuntu_linux | 16.04 | |
canonical | ubuntu_linux | 18.04 | |
canonical | ubuntu_linux | 19.10 | |
canonical | ubuntu_linux | 20.04 | |
fedoraproject | fedora | 31 | |
fedoraproject | fedora | 32 | |
netapp | cloud_backup | - | |
broadcom | fabric_operating_system | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnome:balsa:*:*:*:*:*:*:*:*", "matchCriteriaId": "EC0C6B25-3989-4491-B956-EEB2BB7E98DC", "versionEndExcluding": "2.5.11", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:balsa:2.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "ECD7DBF7-F15C-4BE2-B4CC-4312A05966B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:glib-networking:*:*:*:*:*:*:*:*", "matchCriteriaId": "474CE3E4-30D3-4AE3-9CBB-29EE51772DB4", "versionEndExcluding": "2.62.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:glib-networking:*:*:*:*:*:*:*:*", "matchCriteriaId": "6EF800C2-5EB3-4BF3-8A5E-3B5CB1391A13", "versionEndExcluding": "2.64.3", "versionStartIncluding": "2.64.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "matchCriteriaId": "A31C8344-3E02-4EB8-8BD8-4C84B7959624", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*", "matchCriteriaId": "902B8056-9E37-443B-8905-8AA93E2447FB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "matchCriteriaId": "80F0FA5D-8D3B-4C0E-81E2-87998286AF33", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "matchCriteriaId": "36D96259-24BD-44E2-96D9-78CE1D41F956", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C2089EE-5D7F-47EC-8EA5-0F69790564C4", "vulnerable": true }, { "criteria": "cpe:2.3:o:broadcom:fabric_operating_system:-:*:*:*:*:*:*:*", "matchCriteriaId": "046FB51E-B768-44D3-AEB5-D857145CA840", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In GNOME glib-networking through 2.64.2, the implementation of GTlsClientConnection skips hostname verification of the server\u0027s TLS certificate if the application fails to specify the expected server identity. This is in contrast to its intended documented behavior, to fail the certificate verification. Applications that fail to provide the server identity, including Balsa before 2.5.11 and 2.6.x before 2.6.1, accept a TLS certificate if the certificate is valid for any host." }, { "lang": "es", "value": "En GNOME glib-networking versiones hasta 2.64.2, la implementaci\u00f3n de GTlsClientConnection omite la verificaci\u00f3n del nombre de host del certificado TLS del servidor si la aplicaci\u00f3n presenta un fallo al especificar la identidad esperada del servidor. Esto est\u00e1 en contraste con su comportamiento documentado previsto, en el fallo de la verificaci\u00f3n del certificado. Las aplicaciones que fallaron al proporcionar la identidad del servidor, incluidas Balsa versiones anteriores a 2.5.11 y versiones 2.6.x anteriores a 2.6.1, aceptan un certificado TLS si el certificado es v\u00e1lido para cualquier host." } ], "id": "CVE-2020-13645", "lastModified": "2024-11-21T05:01:40.310", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 2.5, "source": "[email protected]", "type": "Primary" } ] }, "published": "2020-05-28T12:15:11.173", "references": [ { "source": "[email protected]", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://gitlab.gnome.org/GNOME/balsa/-/issues/34" }, { "source": "[email protected]", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://gitlab.gnome.org/GNOME/glib-networking/-/issues/135" }, { "source": "[email protected]", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HLEX2IP62SU6WJ4SK3U766XGLQK3J62O/" }, { "source": "[email protected]", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LRCUM22YEWWKNMN2BP5LTVDM5P4VWIXS/" }, { "source": "[email protected]", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TQEQJQ4XFMFCFJTEXKL2ZO3UELBPCKSK/" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202007-50" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200608-0004/" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4405-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://gitlab.gnome.org/GNOME/balsa/-/issues/34" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://gitlab.gnome.org/GNOME/glib-networking/-/issues/135" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HLEX2IP62SU6WJ4SK3U766XGLQK3J62O/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LRCUM22YEWWKNMN2BP5LTVDM5P4VWIXS/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TQEQJQ4XFMFCFJTEXKL2ZO3UELBPCKSK/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202007-50" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200608-0004/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4405-1/" } ], "sourceIdentifier": "[email protected]", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-295" } ], "source": "[email protected]", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-12-12 22:10
Modified
2025-04-09 00:30
Severity ?
Summary
Stack-based buffer overflow in the ir_fetch_seq function in balsa before 2.3.20 might allow remote IMAP servers to execute arbitrary code via a long response to a FETCH command.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
gnome | balsa | 1.1.7 | |
gnome | balsa | 1.2.4 | |
gnome | balsa | 1.4 | |
gnome | balsa | 1.4.3 | |
gnome | balsa | 2.0.6 | |
gnome | balsa | 2.0.10 | |
gnome | balsa | 2.0.16 | |
gnome | balsa | 2.0.17 | |
gnome | balsa | 2.0.18 | |
gnome | balsa | 2.1 | |
gnome | balsa | 2.1.1 | |
gnome | balsa | 2.1.2 | |
gnome | balsa | 2.1.3 | |
gnome | balsa | 2.1.90 | |
gnome | balsa | 2.1.91 | |
gnome | balsa | 2.2 | |
gnome | balsa | 2.2.1 | |
gnome | balsa | 2.2.2 | |
gnome | balsa | 2.2.3 | |
gnome | balsa | 2.2.4 | |
gnome | balsa | 2.2.5 | |
gnome | balsa | 2.2.6 | |
gnome | balsa | 2.3 | |
gnome | balsa | 2.3.1 | |
gnome | balsa | 2.3.2 | |
gnome | balsa | 2.3.3 | |
gnome | balsa | 2.3.4 | |
gnome | balsa | 2.3.5 | |
gnome | balsa | 2.3.6 | |
gnome | balsa | 2.3.7 | |
gnome | balsa | 2.3.8 | |
gnome | balsa | 2.3.10 | |
gnome | balsa | 2.3.11 | |
gnome | balsa | 2.3.12 | |
gnome | balsa | 2.3.13 | |
gnome | balsa | 2.3.14 | |
gnome | balsa | 2.3.15 | |
gnome | balsa | 2.3.16 | |
gnome | balsa | 2.3.17 | |
gnome | balsa | 2.3.19 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnome:balsa:1.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "950C09DA-EAEA-4DE7-8A5E-ED9E82C653F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:balsa:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "B1BCE579-53AC-4B05-9E33-ACDA345D5B6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:balsa:1.4:*:*:*:*:*:*:*", "matchCriteriaId": "6C0E134F-93E3-4754-98A5-E6917853C99B", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:balsa:1.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "3D0FCECC-E287-486D-A8C1-CA952F4FBC67", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:balsa:2.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "9EAE6454-3B98-4AC8-8C03-4943F168AEF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:balsa:2.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "91C14FE8-1596-4C1C-924D-D296EDB8FB9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:balsa:2.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "7225E52A-13A9-4283-8B00-D22C47358871", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:balsa:2.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "C7927268-514A-45C8-9A03-CF33426B2875", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:balsa:2.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "AFC7FF7A-856E-42BC-9129-A1B28F508EAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:balsa:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "871512E9-340D-4BC3-A2C0-5D160E6F4004", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:balsa:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "596A3E04-CB96-4DFE-AE7C-B506DD3C54D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:balsa:2.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "209D1628-7C99-4722-8038-B835BDE57B5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:balsa:2.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "B8E8B391-160B-49E0-8505-AA0E625A792C", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:balsa:2.1.90:*:*:*:*:*:*:*", "matchCriteriaId": "EB30197C-3991-469D-83E9-9EBE17BFA59F", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:balsa:2.1.91:*:*:*:*:*:*:*", "matchCriteriaId": "C5BCD53C-61D5-49E2-8854-F8F8021DAA85", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:balsa:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "FA6D9C1F-A67A-4E1F-B6BE-9F98F9998DDD", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:balsa:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "6B88D420-12D1-4196-9B6C-3A6BD4F4371C", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:balsa:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "4FDDFC9F-A654-4644-9E8C-6F5902BFC51B", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:balsa:2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "EAFC41E5-6000-44B8-A7AC-426185E8FAB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:balsa:2.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "38D0233D-CCFC-47C0-B4D6-5F5F91A6260A", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:balsa:2.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "FBA69D3A-E357-4B2A-9E9C-2CADA91E45A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:balsa:2.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "9506DE3C-AD8D-4128-AA5A-1B72465B73AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:balsa:2.3:*:*:*:*:*:*:*", "matchCriteriaId": "E1A9132B-91DC-404D-A3CA-69457DB75A71", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:balsa:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "943CFC36-8856-4D8B-A7E5-DF1458769EBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:balsa:2.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "46DE94C8-F5D4-4D8C-AF9C-0290F24575AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:balsa:2.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "8B6C96C8-34EE-4C10-BB16-A093CB626FFC", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:balsa:2.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "B8C116A3-1F8B-4F6B-8056-0685C9DAF9CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:balsa:2.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "1134D391-A0CF-41AD-B871-423F1929BA58", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:balsa:2.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "50F69A80-C311-4840-AF70-ABDDB2D006EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:balsa:2.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "79156072-C833-4C7A-A07A-71DDC5BDCB4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:balsa:2.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "2BA4632D-4729-42A3-8778-C02F50D95C27", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:balsa:2.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "0F968DAE-A85A-483E-918F-45DA7CD5C0E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:balsa:2.3.11:*:*:*:*:*:*:*", "matchCriteriaId": "6730AE89-6168-47FA-8C3C-8A54A8CF0790", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:balsa:2.3.12:*:*:*:*:*:*:*", "matchCriteriaId": "61899224-39E2-485A-BD02-D0F596D0C3B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:balsa:2.3.13:*:*:*:*:*:*:*", "matchCriteriaId": "0A3C98B1-04E7-4FB9-BBCA-A0CAC5C85453", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:balsa:2.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "850D4CD2-1F1F-43B7-8DD0-00985F059637", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:balsa:2.3.15:*:*:*:*:*:*:*", "matchCriteriaId": "9A426AAD-E53A-4BCF-ADA2-A25215F36EA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:balsa:2.3.16:*:*:*:*:*:*:*", "matchCriteriaId": "6A81A463-B9DF-4626-BA1F-0386D77A3BC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:balsa:2.3.17:*:*:*:*:*:*:*", "matchCriteriaId": "BDDA6B44-CB69-47FA-AC29-1A5D7BA14080", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:balsa:2.3.19:*:*:*:*:*:*:*", "matchCriteriaId": "401E38DB-D54C-49B0-93B6-2DDE6FA93F6E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the ir_fetch_seq function in balsa before 2.3.20 might allow remote IMAP servers to execute arbitrary code via a long response to a FETCH command." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer basado en pila en la funci\u00f3n ir_fetch_seq de balsa anterior a 2.3.20 pod\u00eda permitir a servidores IMAP remotos ejecutar c\u00f3digo de su elecci\u00f3n mediante una respuesta larga para un comando FETCH." } ], "id": "CVE-2007-5007", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2007-12-12T22:10:00.000", "references": [ { "source": "[email protected]", "tags": [ "Exploit" ], "url": "http://bugs.gentoo.org/show_bug.cgi?id=193179" }, { "source": "[email protected]", "url": "http://bugzilla.gnome.org/show_bug.cgi?id=474366" }, { "source": "[email protected]", "tags": [ "Patch" ], "url": "http://mail.gnome.org/archives/balsa-list/2007-September/msg00010.html" }, { "source": "[email protected]", "url": "http://osvdb.org/40585" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/26947" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/26987" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/27272" }, { "source": "[email protected]", "url": "http://www.gentoo.org/security/en/glsa/glsa-200710-17.xml" }, { "source": "[email protected]", "url": "http://www.novell.com/linux/security/advisories/2007_19_sr.html" }, { "source": "[email protected]", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/25777" }, { "source": "[email protected]", "url": "http://www.vupen.com/english/advisories/2007/3263" }, { "source": "[email protected]", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=297581" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://bugs.gentoo.org/show_bug.cgi?id=193179" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://bugzilla.gnome.org/show_bug.cgi?id=474366" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://mail.gnome.org/archives/balsa-list/2007-September/msg00010.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/40585" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/26947" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/26987" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/27272" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.gentoo.org/security/en/glsa/glsa-200710-17.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.novell.com/linux/security/advisories/2007_19_sr.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/25777" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/3263" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=297581" } ], "sourceIdentifier": "[email protected]", "vendorComments": [ { "comment": "Not vulnerable. This issue did not affect version of balsa as shipped with Red Hat Enterprise Linux 2.1.", "lastModified": "2008-01-09T00:00:00", "organization": "Red Hat" } ], "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "[email protected]", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-07-29 18:15
Modified
2024-11-21 05:06
Severity ?
Summary
In GNOME Balsa before 2.6.0, a malicious server operator or man in the middle can trigger a NULL pointer dereference and client crash by sending a PREAUTH response to imap_mbox_connect in libbalsa/imap/imap-handle.c.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnome:balsa:*:*:*:*:*:*:*:*", "matchCriteriaId": "5656FC65-29BD-415F-9359-C2798645B197", "versionEndExcluding": "2.6.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "40513095-7E6E-46B3-B604-C926F1BA3568", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In GNOME Balsa before 2.6.0, a malicious server operator or man in the middle can trigger a NULL pointer dereference and client crash by sending a PREAUTH response to imap_mbox_connect in libbalsa/imap/imap-handle.c." }, { "lang": "es", "value": "En GNOME Balsa versiones anteriores a 2.6.0, un operador de servidor malicioso o un man in the middle puede desencadenar una desreferencia del puntero NULL y un bloqueo del cliente mediante el env\u00edo de una respuesta PREAUTH hacia la funci\u00f3n imap_mbox_connect en la biblioteca libbalsa/imap/imap-handle.c" } ], "id": "CVE-2020-16118", "lastModified": "2024-11-21T05:06:47.740", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "[email protected]", "type": "Primary" } ] }, "published": "2020-07-29T18:15:15.000", "references": [ { "source": "[email protected]", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00035.html" }, { "source": "[email protected]", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00045.html" }, { "source": "[email protected]", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://gitlab.gnome.org/GNOME/balsa/-/commit/4e245d758e1c826a01080d40c22ca8706f0339e5" }, { "source": "[email protected]", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gitlab.gnome.org/GNOME/balsa/-/issues/23" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00035.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00045.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://gitlab.gnome.org/GNOME/balsa/-/commit/4e245d758e1c826a01080d40c22ca8706f0339e5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gitlab.gnome.org/GNOME/balsa/-/issues/23" } ], "sourceIdentifier": "[email protected]", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-476" } ], "source": "[email protected]", "type": "Primary" } ] }