
CVE-2020-16118
https://notcve.org/view.php?id=CVE-2020-16118
29 Jul 2020 — In GNOME Balsa before 2.6.0, a malicious server operator or man in the middle can trigger a NULL pointer dereference and client crash by sending a PREAUTH response to imap_mbox_connect in libbalsa/imap/imap-handle.c. En GNOME Balsa versiones anteriores a 2.6.0, un operador de servidor malicioso o un man in the middle puede desencadenar una desreferencia del puntero NULL y un bloqueo del cliente mediante el envío de una respuesta PREAUTH hacia la función imap_mbox_connect en la biblioteca libbalsa/imap/imap-... • http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00035.html • CWE-476: NULL Pointer Dereference •

CVE-2020-13645 – Ubuntu Security Notice USN-4405-1
https://notcve.org/view.php?id=CVE-2020-13645
28 May 2020 — In GNOME glib-networking through 2.64.2, the implementation of GTlsClientConnection skips hostname verification of the server's TLS certificate if the application fails to specify the expected server identity. This is in contrast to its intended documented behavior, to fail the certificate verification. Applications that fail to provide the server identity, including Balsa before 2.5.11 and 2.6.x before 2.6.1, accept a TLS certificate if the certificate is valid for any host. En GNOME glib-networking versio... • https://gitlab.gnome.org/GNOME/balsa/-/issues/34 • CWE-295: Improper Certificate Validation •

CVE-2007-5007
https://notcve.org/view.php?id=CVE-2007-5007
20 Sep 2007 — Stack-based buffer overflow in the ir_fetch_seq function in balsa before 2.3.20 might allow remote IMAP servers to execute arbitrary code via a long response to a FETCH command. Desbordamiento de búfer basado en pila en la función ir_fetch_seq de balsa anterior a 2.3.20 podía permitir a servidores IMAP remotos ejecutar código de su elección mediante una respuesta larga para un comando FETCH. • http://bugs.gentoo.org/show_bug.cgi?id=193179 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2003-0299
https://notcve.org/view.php?id=CVE-2003-0299
15 May 2003 — The IMAP Client, as used in mutt 1.4.1 and Balsa 2.0.10, allows remote malicious IMAP servers to cause a denial of service and possibly execute arbitrary code via certain large mailbox size values that cause either integer signedness errors or integer overflow errors. El cliente IMAP, usado en mutt 1.4.1 y Balsa 2.0.10, permite que servidores IMAP remotos dañinos provoquen una denegación de servicio y posiblemente ejecuten código arbitrario mediante ciertos valores de tamaño para mailbox muy grandes (lo que... • http://marc.info/?l=bugtraq&m=105294024124163&w=2 •

CVE-2003-0300
https://notcve.org/view.php?id=CVE-2003-0300
15 May 2003 — The IMAP Client for Sylpheed 0.8.11 allows remote malicious IMAP servers to cause a denial of service (crash) via certain large literal size values that cause either integer signedness errors or integer overflow errors. El cliente IMAP para Sylpheed 0.8.11 permite que servidores IMAP remotos dañinos originen una denegación de servicio (caída) mediante ciertos tamaños literales muy largos que causan desbordamientos de búfer de enteros. • http://marc.info/?l=bugtraq&m=105294024124163&w=2 •