Vulnerability Name: | CVE-2021-44143 (CCN-213984) | ||||||||||||
Assigned: | 2021-11-16 | ||||||||||||
Published: | 2021-11-16 | ||||||||||||
Updated: | 2022-10-25 | ||||||||||||
Summary: | A flaw was found in mbsync in isync 1.4.0 through 1.4.3. Due to an unchecked condition, a malicious or compromised IMAP server could use a crafted mail message that lacks headers (i.e., one that starts with an empty line) to provoke a heap overflow, which could conceivably be exploited for remote code execution. | ||||||||||||
CVSS v3 Severity: | 9.8 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) 8.6 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:R)
8.6 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:R)
| ||||||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||||||
Vulnerability Type: | CWE-787 | ||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2021-44143 Source: MLIST Type: Mailing List [oss-security] 20211203 CVE-2021-44143: heap overflow in isync/mbsync Source: CCN Type: Debian Bug report logs - #999804 crash after upgrade to 1.4.3 Source: MISC Type: Third Party Advisory https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=999804 Source: XF Type: UNKNOWN isync-cve202144143-code-exec(213984) Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2021-577129851b Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2021-b7fdb7e69a Source: GENTOO Type: Third Party Advisory GLSA-202208-15 Source: MISC Type: Patch, Third Party Advisory https://sourceforge.net/p/isync/isync/commit_browser Source: MISC Type: Third Party Advisory https://sourceforge.net/p/isync/isync/ref/master/tags/ Source: CCN Type: SourceForge Isync Project Web site Isync Source: CCN Type: WhiteSource Vulnerability Database CVE-2021-44143 | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration CCN 1: ![]() | ||||||||||||
BACK |