3 results (0.006 seconds)

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 1

In GNOME Balsa before 2.6.0, a malicious server operator or man in the middle can trigger a NULL pointer dereference and client crash by sending a PREAUTH response to imap_mbox_connect in libbalsa/imap/imap-handle.c. En GNOME Balsa versiones anteriores a 2.6.0, un operador de servidor malicioso o un man in the middle puede desencadenar una desreferencia del puntero NULL y un bloqueo del cliente mediante el envío de una respuesta PREAUTH hacia la función imap_mbox_connect en la biblioteca libbalsa/imap/imap-handle.c • http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00045.html https://gitlab.gnome.org/GNOME/balsa/-/commit/4e245d758e1c826a01080d40c22ca8706f0339e5 https://gitlab.gnome.org/GNOME/balsa/-/issues/23 • CWE-476: NULL Pointer Dereference •

CVSS: 6.5EPSS: 0%CPEs: 12EXPL: 2

In GNOME glib-networking through 2.64.2, the implementation of GTlsClientConnection skips hostname verification of the server's TLS certificate if the application fails to specify the expected server identity. This is in contrast to its intended documented behavior, to fail the certificate verification. Applications that fail to provide the server identity, including Balsa before 2.5.11 and 2.6.x before 2.6.1, accept a TLS certificate if the certificate is valid for any host. En GNOME glib-networking versiones hasta 2.64.2, la implementación de GTlsClientConnection omite la verificación del nombre de host del certificado TLS del servidor si la aplicación presenta un fallo al especificar la identidad esperada del servidor. Esto está en contraste con su comportamiento documentado previsto, en el fallo de la verificación del certificado. • https://gitlab.gnome.org/GNOME/balsa/-/issues/34 https://gitlab.gnome.org/GNOME/glib-networking/-/issues/135 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HLEX2IP62SU6WJ4SK3U766XGLQK3J62O https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LRCUM22YEWWKNMN2BP5LTVDM5P4VWIXS https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TQEQJQ4XFMFCFJTEXKL2ZO3UELBPCKSK https://security.gentoo.org/glsa/202007-50 htt • CWE-295: Improper Certificate Validation •

CVSS: 6.8EPSS: 1%CPEs: 40EXPL: 1

Stack-based buffer overflow in the ir_fetch_seq function in balsa before 2.3.20 might allow remote IMAP servers to execute arbitrary code via a long response to a FETCH command. Desbordamiento de búfer basado en pila en la función ir_fetch_seq de balsa anterior a 2.3.20 podía permitir a servidores IMAP remotos ejecutar código de su elección mediante una respuesta larga para un comando FETCH. • http://bugs.gentoo.org/show_bug.cgi?id=193179 http://bugzilla.gnome.org/show_bug.cgi?id=474366 http://mail.gnome.org/archives/balsa-list/2007-September/msg00010.html http://osvdb.org/40585 http://secunia.com/advisories/26947 http://secunia.com/advisories/26987 http://secunia.com/advisories/27272 http://www.gentoo.org/security/en/glsa/glsa-200710-17.xml http://www.novell.com/linux/security/advisories/2007_19_sr.html http://www.securityfocus.com/bid/25777 http:/ • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •