Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-3657

Опубликовано: 18 фев. 2022
Источник: debian
EPSS Низкий

Описание

A flaw was found in mbsync versions prior to 1.4.4. Due to inadequate handling of extremely large (>=2GiB) IMAP literals, malicious or compromised IMAP servers, and hypothetically even external email senders, could cause several different buffer overflows, which could conceivably be exploited for remote code execution.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
isyncfixed1.4.4-1package
isyncfixed1.3.0-2.2+deb11u1bullseyepackage
isyncfixed1.3.0-2.2~deb10u2busterpackage

Примечания

  • https://www.openwall.com/lists/oss-security/2021/12/03/1

EPSS

Процентиль: 91%
0.06799
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
почти 4 года назад

A flaw was found in mbsync versions prior to 1.4.4. Due to inadequate handling of extremely large (>=2GiB) IMAP literals, malicious or compromised IMAP servers, and hypothetically even external email senders, could cause several different buffer overflows, which could conceivably be exploited for remote code execution.

CVSS3: 9.8
nvd
почти 4 года назад

A flaw was found in mbsync versions prior to 1.4.4. Due to inadequate handling of extremely large (>=2GiB) IMAP literals, malicious or compromised IMAP servers, and hypothetically even external email senders, could cause several different buffer overflows, which could conceivably be exploited for remote code execution.

CVSS3: 9.8
github
почти 4 года назад

A flaw was found in mbsync versions prior to 1.4.4. Due to inadequate handling of extremely large (>=2GiB) IMAP literals, malicious or compromised IMAP servers, and hypothetically even external email senders, could cause several different buffer overflows, which could conceivably be exploited for remote code execution.

EPSS

Процентиль: 91%
0.06799
Низкий