| Vulnerability Name: | CVE-2021-3578 (CCN-203110) | ||||||||||||||||||||||||||||||||
| Assigned: | 2021-06-07 | ||||||||||||||||||||||||||||||||
| Published: | 2021-06-07 | ||||||||||||||||||||||||||||||||
| Updated: | 2022-10-18 | ||||||||||||||||||||||||||||||||
| Summary: | A flaw was found in mbsync before v1.3.6 and v1.4.2, where an unchecked pointer cast allows a malicious or compromised server to write an arbitrary integer value past the end of a heap-allocated structure by issuing an unexpected APPENDUID response. This could be plausibly exploited for remote code execution on the client. | ||||||||||||||||||||||||||||||||
| CVSS v3 Severity: | 7.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) 6.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
7.7 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||
| CVSS v2 Severity: | 7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
| ||||||||||||||||||||||||||||||||
| Vulnerability Type: | CWE-704 | ||||||||||||||||||||||||||||||||
| Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||||||
| References: | Source: MITRE Type: CNA CVE-2021-3578 Source: MLIST Type: Mailing List, Patch, Third Party Advisory [oss-security] 20210607 CVE-2021-3578: possible remote code execution in isync/mbsync Source: MISC Type: Not Applicable https://bugzilla.redhat.com/show_bug.cgi?id=1961710 Source: MISC Type: Issue Tracking, Patch, Third Party Advisory https://bugzilla.redhat.com/show_bug.cgi?id=1967397 Source: XF Type: UNKNOWN isync-cve20213578-code-exec(203110) Source: MISC Type: Not Applicable https://github.blog/2021-06-10-privilege-escalation-polkit-root-on-linux-with-bug/ Source: MLIST Type: Mailing List, Third Party Advisory [debian-lts-announce] 20220701 [SECURITY] [DLA 3066-1] isync security update Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2021-754af4d52b Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2021-f236f9f01a Source: CCN Type: oss-sec Mailing List, Mon, 7 Jun 2021 13:46:43 +0200 CVE-2021-3578: possible remote code execution in isync/mbsync Source: GENTOO Type: Third Party Advisory GLSA-202208-15 Source: CCN Type: SourceForge Isync Project Web site Isync mbsync Source: MISC Type: Mailing List, Patch, Third Party Advisory https://www.openwall.com/lists/oss-security/2021/06/07/1 | ||||||||||||||||||||||||||||||||
| Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||
| Oval Definitions | |||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||
| BACK | |||||||||||||||||||||||||||||||||