Описание
The BAT! mail client allows remote attackers to bypass user warnings of an executable attachment and execute arbitrary commands via an attachment whose file name contains many spaces, which also causes the BAT! to misrepresent the attachment's type with a different icon.
Ссылки
- Vendor Advisory
- ExploitPatchVendor Advisory
- Vendor Advisory
- ExploitPatchVendor Advisory
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:ritlabs:the_bat:1.0_build1336:*:*:*:*:*:*:*
cpe:2.3:a:ritlabs:the_bat:1.0_build1349:*:*:*:*:*:*:*
cpe:2.3:a:ritlabs:the_bat:1.1:*:*:*:*:*:*:*
cpe:2.3:a:ritlabs:the_bat:1.011:*:*:*:*:*:*:*
cpe:2.3:a:ritlabs:the_bat:1.14:*:*:*:*:*:*:*
cpe:2.3:a:ritlabs:the_bat:1.15:*:*:*:*:*:*:*
cpe:2.3:a:ritlabs:the_bat:1.015:*:*:*:*:*:*:*
cpe:2.3:a:ritlabs:the_bat:1.17:*:*:*:*:*:*:*
cpe:2.3:a:ritlabs:the_bat:1.18:*:*:*:*:*:*:*
cpe:2.3:a:ritlabs:the_bat:1.19:*:*:*:*:*:*:*
cpe:2.3:a:ritlabs:the_bat:1.21:*:*:*:*:*:*:*
cpe:2.3:a:ritlabs:the_bat:1.22:*:*:*:*:*:*:*
cpe:2.3:a:ritlabs:the_bat:1.028:*:*:*:*:*:*:*
cpe:2.3:a:ritlabs:the_bat:1.029:*:*:*:*:*:*:*
cpe:2.3:a:ritlabs:the_bat:1.31:*:*:*:*:*:*:*
cpe:2.3:a:ritlabs:the_bat:1.031:*:*:*:*:*:*:*
cpe:2.3:a:ritlabs:the_bat:1.32:*:*:*:*:*:*:*
cpe:2.3:a:ritlabs:the_bat:1.032:*:*:*:*:*:*:*
cpe:2.3:a:ritlabs:the_bat:1.33:*:*:*:*:*:*:*
cpe:2.3:a:ritlabs:the_bat:1.34:*:*:*:*:*:*:*
cpe:2.3:a:ritlabs:the_bat:1.035:*:*:*:*:*:*:*
cpe:2.3:a:ritlabs:the_bat:1.35:*:*:*:*:*:*:*
cpe:2.3:a:ritlabs:the_bat:1.036:*:*:*:*:*:*:*
cpe:2.3:a:ritlabs:the_bat:1.36:*:*:*:*:*:*:*
cpe:2.3:a:ritlabs:the_bat:1.037:*:*:*:*:*:*:*
cpe:2.3:a:ritlabs:the_bat:1.39:*:*:*:*:*:*:*
cpe:2.3:a:ritlabs:the_bat:1.039:*:*:*:*:*:*:*
cpe:2.3:a:ritlabs:the_bat:1.041:*:*:*:*:*:*:*
cpe:2.3:a:ritlabs:the_bat:1.41:*:*:*:*:*:*:*
cpe:2.3:a:ritlabs:the_bat:1.42:*:*:*:*:*:*:*
cpe:2.3:a:ritlabs:the_bat:1.42f:*:*:*:*:*:*:*
cpe:2.3:a:ritlabs:the_bat:1.043:*:*:*:*:*:*:*
cpe:2.3:a:ritlabs:the_bat:1.43:*:*:*:*:*:*:*
cpe:2.3:a:ritlabs:the_bat:1.44:*:*:*:*:*:*:*
cpe:2.3:a:ritlabs:the_bat:1.45:*:*:*:*:*:*:*
cpe:2.3:a:ritlabs:the_bat:1.46:*:*:*:*:*:*:*
cpe:2.3:a:ritlabs:the_bat:1.47:*:*:*:*:*:*:*
cpe:2.3:a:ritlabs:the_bat:1.48:*:*:*:*:*:*:*
cpe:2.3:a:ritlabs:the_bat:1.49:*:*:*:*:*:*:*
cpe:2.3:a:ritlabs:the_bat:1.101:*:*:*:*:*:*:*
EPSS
Процентиль: 77%
0.01053
Низкий
7.5 High
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
github
больше 3 лет назад
The BAT! mail client allows remote attackers to bypass user warnings of an executable attachment and execute arbitrary commands via an attachment whose file name contains many spaces, which also causes the BAT! to misrepresent the attachment's type with a different icon.
EPSS
Процентиль: 77%
0.01053
Низкий
7.5 High
CVSS2
Дефекты
NVD-CWE-Other