All the vulnerabilites related to gnome - balsa
Vulnerability from fkie_nvd
Published
2020-05-28 12:15
Modified
2024-11-21 05:01
Severity ?
Summary
In GNOME glib-networking through 2.64.2, the implementation of GTlsClientConnection skips hostname verification of the server's TLS certificate if the application fails to specify the expected server identity. This is in contrast to its intended documented behavior, to fail the certificate verification. Applications that fail to provide the server identity, including Balsa before 2.5.11 and 2.6.x before 2.6.1, accept a TLS certificate if the certificate is valid for any host.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
gnome | balsa | * | |
gnome | balsa | 2.6.0 | |
gnome | glib-networking | * | |
gnome | glib-networking | * | |
canonical | ubuntu_linux | 16.04 | |
canonical | ubuntu_linux | 18.04 | |
canonical | ubuntu_linux | 19.10 | |
canonical | ubuntu_linux | 20.04 | |
fedoraproject | fedora | 31 | |
fedoraproject | fedora | 32 | |
netapp | cloud_backup | - | |
broadcom | fabric_operating_system | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnome:balsa:*:*:*:*:*:*:*:*", "matchCriteriaId": "EC0C6B25-3989-4491-B956-EEB2BB7E98DC", "versionEndExcluding": "2.5.11", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:balsa:2.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "ECD7DBF7-F15C-4BE2-B4CC-4312A05966B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:glib-networking:*:*:*:*:*:*:*:*", "matchCriteriaId": "474CE3E4-30D3-4AE3-9CBB-29EE51772DB4", "versionEndExcluding": "2.62.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:glib-networking:*:*:*:*:*:*:*:*", "matchCriteriaId": "6EF800C2-5EB3-4BF3-8A5E-3B5CB1391A13", "versionEndExcluding": "2.64.3", "versionStartIncluding": "2.64.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "matchCriteriaId": "A31C8344-3E02-4EB8-8BD8-4C84B7959624", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*", "matchCriteriaId": "902B8056-9E37-443B-8905-8AA93E2447FB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "matchCriteriaId": "80F0FA5D-8D3B-4C0E-81E2-87998286AF33", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "matchCriteriaId": "36D96259-24BD-44E2-96D9-78CE1D41F956", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C2089EE-5D7F-47EC-8EA5-0F69790564C4", "vulnerable": true }, { "criteria": "cpe:2.3:o:broadcom:fabric_operating_system:-:*:*:*:*:*:*:*", "matchCriteriaId": "046FB51E-B768-44D3-AEB5-D857145CA840", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In GNOME glib-networking through 2.64.2, the implementation of GTlsClientConnection skips hostname verification of the server\u0027s TLS certificate if the application fails to specify the expected server identity. This is in contrast to its intended documented behavior, to fail the certificate verification. Applications that fail to provide the server identity, including Balsa before 2.5.11 and 2.6.x before 2.6.1, accept a TLS certificate if the certificate is valid for any host." }, { "lang": "es", "value": "En GNOME glib-networking versiones hasta 2.64.2, la implementaci\u00f3n de GTlsClientConnection omite la verificaci\u00f3n del nombre de host del certificado TLS del servidor si la aplicaci\u00f3n presenta un fallo al especificar la identidad esperada del servidor. Esto est\u00e1 en contraste con su comportamiento documentado previsto, en el fallo de la verificaci\u00f3n del certificado. Las aplicaciones que fallaron al proporcionar la identidad del servidor, incluidas Balsa versiones anteriores a 2.5.11 y versiones 2.6.x anteriores a 2.6.1, aceptan un certificado TLS si el certificado es v\u00e1lido para cualquier host." } ], "id": "CVE-2020-13645", "lastModified": "2024-11-21T05:01:40.310", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 2.5, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-05-28T12:15:11.173", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://gitlab.gnome.org/GNOME/balsa/-/issues/34" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://gitlab.gnome.org/GNOME/glib-networking/-/issues/135" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HLEX2IP62SU6WJ4SK3U766XGLQK3J62O/" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LRCUM22YEWWKNMN2BP5LTVDM5P4VWIXS/" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TQEQJQ4XFMFCFJTEXKL2ZO3UELBPCKSK/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202007-50" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200608-0004/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4405-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://gitlab.gnome.org/GNOME/balsa/-/issues/34" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://gitlab.gnome.org/GNOME/glib-networking/-/issues/135" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HLEX2IP62SU6WJ4SK3U766XGLQK3J62O/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LRCUM22YEWWKNMN2BP5LTVDM5P4VWIXS/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TQEQJQ4XFMFCFJTEXKL2ZO3UELBPCKSK/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202007-50" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200608-0004/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4405-1/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-295" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-12-12 22:10
Modified
2024-11-21 00:36
Severity ?
Summary
Stack-based buffer overflow in the ir_fetch_seq function in balsa before 2.3.20 might allow remote IMAP servers to execute arbitrary code via a long response to a FETCH command.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
gnome | balsa | 1.1.7 | |
gnome | balsa | 1.2.4 | |
gnome | balsa | 1.4 | |
gnome | balsa | 1.4.3 | |
gnome | balsa | 2.0.6 | |
gnome | balsa | 2.0.10 | |
gnome | balsa | 2.0.16 | |
gnome | balsa | 2.0.17 | |
gnome | balsa | 2.0.18 | |
gnome | balsa | 2.1 | |
gnome | balsa | 2.1.1 | |
gnome | balsa | 2.1.2 | |
gnome | balsa | 2.1.3 | |
gnome | balsa | 2.1.90 | |
gnome | balsa | 2.1.91 | |
gnome | balsa | 2.2 | |
gnome | balsa | 2.2.1 | |
gnome | balsa | 2.2.2 | |
gnome | balsa | 2.2.3 | |
gnome | balsa | 2.2.4 | |
gnome | balsa | 2.2.5 | |
gnome | balsa | 2.2.6 | |
gnome | balsa | 2.3 | |
gnome | balsa | 2.3.1 | |
gnome | balsa | 2.3.2 | |
gnome | balsa | 2.3.3 | |
gnome | balsa | 2.3.4 | |
gnome | balsa | 2.3.5 | |
gnome | balsa | 2.3.6 | |
gnome | balsa | 2.3.7 | |
gnome | balsa | 2.3.8 | |
gnome | balsa | 2.3.10 | |
gnome | balsa | 2.3.11 | |
gnome | balsa | 2.3.12 | |
gnome | balsa | 2.3.13 | |
gnome | balsa | 2.3.14 | |
gnome | balsa | 2.3.15 | |
gnome | balsa | 2.3.16 | |
gnome | balsa | 2.3.17 | |
gnome | balsa | 2.3.19 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnome:balsa:1.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "950C09DA-EAEA-4DE7-8A5E-ED9E82C653F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:balsa:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "B1BCE579-53AC-4B05-9E33-ACDA345D5B6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:balsa:1.4:*:*:*:*:*:*:*", "matchCriteriaId": "6C0E134F-93E3-4754-98A5-E6917853C99B", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:balsa:1.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "3D0FCECC-E287-486D-A8C1-CA952F4FBC67", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:balsa:2.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "9EAE6454-3B98-4AC8-8C03-4943F168AEF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:balsa:2.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "91C14FE8-1596-4C1C-924D-D296EDB8FB9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:balsa:2.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "7225E52A-13A9-4283-8B00-D22C47358871", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:balsa:2.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "C7927268-514A-45C8-9A03-CF33426B2875", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:balsa:2.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "AFC7FF7A-856E-42BC-9129-A1B28F508EAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:balsa:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "871512E9-340D-4BC3-A2C0-5D160E6F4004", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:balsa:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "596A3E04-CB96-4DFE-AE7C-B506DD3C54D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:balsa:2.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "209D1628-7C99-4722-8038-B835BDE57B5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:balsa:2.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "B8E8B391-160B-49E0-8505-AA0E625A792C", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:balsa:2.1.90:*:*:*:*:*:*:*", "matchCriteriaId": "EB30197C-3991-469D-83E9-9EBE17BFA59F", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:balsa:2.1.91:*:*:*:*:*:*:*", "matchCriteriaId": "C5BCD53C-61D5-49E2-8854-F8F8021DAA85", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:balsa:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "FA6D9C1F-A67A-4E1F-B6BE-9F98F9998DDD", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:balsa:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "6B88D420-12D1-4196-9B6C-3A6BD4F4371C", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:balsa:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "4FDDFC9F-A654-4644-9E8C-6F5902BFC51B", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:balsa:2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "EAFC41E5-6000-44B8-A7AC-426185E8FAB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:balsa:2.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "38D0233D-CCFC-47C0-B4D6-5F5F91A6260A", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:balsa:2.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "FBA69D3A-E357-4B2A-9E9C-2CADA91E45A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:balsa:2.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "9506DE3C-AD8D-4128-AA5A-1B72465B73AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:balsa:2.3:*:*:*:*:*:*:*", "matchCriteriaId": "E1A9132B-91DC-404D-A3CA-69457DB75A71", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:balsa:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "943CFC36-8856-4D8B-A7E5-DF1458769EBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:balsa:2.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "46DE94C8-F5D4-4D8C-AF9C-0290F24575AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:balsa:2.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "8B6C96C8-34EE-4C10-BB16-A093CB626FFC", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:balsa:2.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "B8C116A3-1F8B-4F6B-8056-0685C9DAF9CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:balsa:2.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "1134D391-A0CF-41AD-B871-423F1929BA58", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:balsa:2.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "50F69A80-C311-4840-AF70-ABDDB2D006EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:balsa:2.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "79156072-C833-4C7A-A07A-71DDC5BDCB4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:balsa:2.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "2BA4632D-4729-42A3-8778-C02F50D95C27", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:balsa:2.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "0F968DAE-A85A-483E-918F-45DA7CD5C0E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:balsa:2.3.11:*:*:*:*:*:*:*", "matchCriteriaId": "6730AE89-6168-47FA-8C3C-8A54A8CF0790", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:balsa:2.3.12:*:*:*:*:*:*:*", "matchCriteriaId": "61899224-39E2-485A-BD02-D0F596D0C3B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:balsa:2.3.13:*:*:*:*:*:*:*", "matchCriteriaId": "0A3C98B1-04E7-4FB9-BBCA-A0CAC5C85453", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:balsa:2.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "850D4CD2-1F1F-43B7-8DD0-00985F059637", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:balsa:2.3.15:*:*:*:*:*:*:*", "matchCriteriaId": "9A426AAD-E53A-4BCF-ADA2-A25215F36EA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:balsa:2.3.16:*:*:*:*:*:*:*", "matchCriteriaId": "6A81A463-B9DF-4626-BA1F-0386D77A3BC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:balsa:2.3.17:*:*:*:*:*:*:*", "matchCriteriaId": "BDDA6B44-CB69-47FA-AC29-1A5D7BA14080", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:balsa:2.3.19:*:*:*:*:*:*:*", "matchCriteriaId": "401E38DB-D54C-49B0-93B6-2DDE6FA93F6E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the ir_fetch_seq function in balsa before 2.3.20 might allow remote IMAP servers to execute arbitrary code via a long response to a FETCH command." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer basado en pila en la funci\u00f3n ir_fetch_seq de balsa anterior a 2.3.20 pod\u00eda permitir a servidores IMAP remotos ejecutar c\u00f3digo de su elecci\u00f3n mediante una respuesta larga para un comando FETCH." } ], "id": "CVE-2007-5007", "lastModified": "2024-11-21T00:36:55.717", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2007-12-12T22:10:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://bugs.gentoo.org/show_bug.cgi?id=193179" }, { "source": "cve@mitre.org", "url": "http://bugzilla.gnome.org/show_bug.cgi?id=474366" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://mail.gnome.org/archives/balsa-list/2007-September/msg00010.html" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/40585" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/26947" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/26987" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/27272" }, { "source": "cve@mitre.org", "url": "http://www.gentoo.org/security/en/glsa/glsa-200710-17.xml" }, { "source": "cve@mitre.org", "url": "http://www.novell.com/linux/security/advisories/2007_19_sr.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/25777" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/3263" }, { "source": "cve@mitre.org", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=297581" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://bugs.gentoo.org/show_bug.cgi?id=193179" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://bugzilla.gnome.org/show_bug.cgi?id=474366" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://mail.gnome.org/archives/balsa-list/2007-September/msg00010.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/40585" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/26947" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/26987" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/27272" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.gentoo.org/security/en/glsa/glsa-200710-17.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.novell.com/linux/security/advisories/2007_19_sr.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/25777" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/3263" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=297581" } ], "sourceIdentifier": "cve@mitre.org", "vendorComments": [ { "comment": "Not vulnerable. This issue did not affect version of balsa as shipped with Red Hat Enterprise Linux 2.1.", "lastModified": "2008-01-09T00:00:00", "organization": "Red Hat" } ], "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-07-29 18:15
Modified
2024-11-21 05:06
Severity ?
Summary
In GNOME Balsa before 2.6.0, a malicious server operator or man in the middle can trigger a NULL pointer dereference and client crash by sending a PREAUTH response to imap_mbox_connect in libbalsa/imap/imap-handle.c.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnome:balsa:*:*:*:*:*:*:*:*", "matchCriteriaId": "5656FC65-29BD-415F-9359-C2798645B197", "versionEndExcluding": "2.6.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "40513095-7E6E-46B3-B604-C926F1BA3568", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In GNOME Balsa before 2.6.0, a malicious server operator or man in the middle can trigger a NULL pointer dereference and client crash by sending a PREAUTH response to imap_mbox_connect in libbalsa/imap/imap-handle.c." }, { "lang": "es", "value": "En GNOME Balsa versiones anteriores a 2.6.0, un operador de servidor malicioso o un man in the middle puede desencadenar una desreferencia del puntero NULL y un bloqueo del cliente mediante el env\u00edo de una respuesta PREAUTH hacia la funci\u00f3n imap_mbox_connect en la biblioteca libbalsa/imap/imap-handle.c" } ], "id": "CVE-2020-16118", "lastModified": "2024-11-21T05:06:47.740", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-07-29T18:15:15.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00035.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00045.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://gitlab.gnome.org/GNOME/balsa/-/commit/4e245d758e1c826a01080d40c22ca8706f0339e5" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gitlab.gnome.org/GNOME/balsa/-/issues/23" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00035.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00045.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://gitlab.gnome.org/GNOME/balsa/-/commit/4e245d758e1c826a01080d40c22ca8706f0339e5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gitlab.gnome.org/GNOME/balsa/-/issues/23" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-476" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2020-16118
Vulnerability from cvelistv5
Published
2020-07-29 17:58
Modified
2024-08-04 13:37
Severity ?
EPSS score ?
Summary
In GNOME Balsa before 2.6.0, a malicious server operator or man in the middle can trigger a NULL pointer dereference and client crash by sending a PREAUTH response to imap_mbox_connect in libbalsa/imap/imap-handle.c.
References
▼ | URL | Tags |
---|---|---|
https://gitlab.gnome.org/GNOME/balsa/-/issues/23 | x_refsource_MISC | |
https://gitlab.gnome.org/GNOME/balsa/-/commit/4e245d758e1c826a01080d40c22ca8706f0339e5 | x_refsource_MISC | |
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00035.html | vendor-advisory, x_refsource_SUSE | |
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00045.html | vendor-advisory, x_refsource_SUSE |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T13:37:53.604Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gitlab.gnome.org/GNOME/balsa/-/issues/23" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gitlab.gnome.org/GNOME/balsa/-/commit/4e245d758e1c826a01080d40c22ca8706f0339e5" }, { "name": "openSUSE-SU-2020:1207", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00035.html" }, { "name": "openSUSE-SU-2020:1230", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00045.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In GNOME Balsa before 2.6.0, a malicious server operator or man in the middle can trigger a NULL pointer dereference and client crash by sending a PREAUTH response to imap_mbox_connect in libbalsa/imap/imap-handle.c." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-08-18T11:06:16", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://gitlab.gnome.org/GNOME/balsa/-/issues/23" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gitlab.gnome.org/GNOME/balsa/-/commit/4e245d758e1c826a01080d40c22ca8706f0339e5" }, { "name": "openSUSE-SU-2020:1207", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00035.html" }, { "name": "openSUSE-SU-2020:1230", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00045.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-16118", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In GNOME Balsa before 2.6.0, a malicious server operator or man in the middle can trigger a NULL pointer dereference and client crash by sending a PREAUTH response to imap_mbox_connect in libbalsa/imap/imap-handle.c." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://gitlab.gnome.org/GNOME/balsa/-/issues/23", "refsource": "MISC", "url": "https://gitlab.gnome.org/GNOME/balsa/-/issues/23" }, { "name": "https://gitlab.gnome.org/GNOME/balsa/-/commit/4e245d758e1c826a01080d40c22ca8706f0339e5", "refsource": "MISC", "url": "https://gitlab.gnome.org/GNOME/balsa/-/commit/4e245d758e1c826a01080d40c22ca8706f0339e5" }, { "name": "openSUSE-SU-2020:1207", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00035.html" }, { "name": "openSUSE-SU-2020:1230", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00045.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-16118", "datePublished": "2020-07-29T17:58:51", "dateReserved": "2020-07-29T00:00:00", "dateUpdated": "2024-08-04T13:37:53.604Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-13645
Vulnerability from cvelistv5
Published
2020-05-28 11:55
Modified
2024-08-04 12:25
Severity ?
EPSS score ?
Summary
In GNOME glib-networking through 2.64.2, the implementation of GTlsClientConnection skips hostname verification of the server's TLS certificate if the application fails to specify the expected server identity. This is in contrast to its intended documented behavior, to fail the certificate verification. Applications that fail to provide the server identity, including Balsa before 2.5.11 and 2.6.x before 2.6.1, accept a TLS certificate if the certificate is valid for any host.
References
▼ | URL | Tags |
---|---|---|
https://gitlab.gnome.org/GNOME/glib-networking/-/issues/135 | x_refsource_MISC | |
https://gitlab.gnome.org/GNOME/balsa/-/issues/34 | x_refsource_MISC | |
https://security.netapp.com/advisory/ntap-20200608-0004/ | x_refsource_CONFIRM | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TQEQJQ4XFMFCFJTEXKL2ZO3UELBPCKSK/ | vendor-advisory, x_refsource_FEDORA | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HLEX2IP62SU6WJ4SK3U766XGLQK3J62O/ | vendor-advisory, x_refsource_FEDORA | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LRCUM22YEWWKNMN2BP5LTVDM5P4VWIXS/ | vendor-advisory, x_refsource_FEDORA | |
https://usn.ubuntu.com/4405-1/ | vendor-advisory, x_refsource_UBUNTU | |
https://security.gentoo.org/glsa/202007-50 | vendor-advisory, x_refsource_GENTOO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T12:25:16.135Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gitlab.gnome.org/GNOME/glib-networking/-/issues/135" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gitlab.gnome.org/GNOME/balsa/-/issues/34" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20200608-0004/" }, { "name": "FEDORA-2020-98ebbd1397", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TQEQJQ4XFMFCFJTEXKL2ZO3UELBPCKSK/" }, { "name": "FEDORA-2020-cadbc5992f", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HLEX2IP62SU6WJ4SK3U766XGLQK3J62O/" }, { "name": "FEDORA-2020-a83c8cd358", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LRCUM22YEWWKNMN2BP5LTVDM5P4VWIXS/" }, { "name": "USN-4405-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4405-1/" }, { "name": "GLSA-202007-50", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202007-50" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In GNOME glib-networking through 2.64.2, the implementation of GTlsClientConnection skips hostname verification of the server\u0027s TLS certificate if the application fails to specify the expected server identity. This is in contrast to its intended documented behavior, to fail the certificate verification. Applications that fail to provide the server identity, including Balsa before 2.5.11 and 2.6.x before 2.6.1, accept a TLS certificate if the certificate is valid for any host." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-07-27T03:06:08", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://gitlab.gnome.org/GNOME/glib-networking/-/issues/135" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gitlab.gnome.org/GNOME/balsa/-/issues/34" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20200608-0004/" }, { "name": "FEDORA-2020-98ebbd1397", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TQEQJQ4XFMFCFJTEXKL2ZO3UELBPCKSK/" }, { "name": "FEDORA-2020-cadbc5992f", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HLEX2IP62SU6WJ4SK3U766XGLQK3J62O/" }, { "name": "FEDORA-2020-a83c8cd358", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LRCUM22YEWWKNMN2BP5LTVDM5P4VWIXS/" }, { "name": "USN-4405-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4405-1/" }, { "name": "GLSA-202007-50", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202007-50" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-13645", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In GNOME glib-networking through 2.64.2, the implementation of GTlsClientConnection skips hostname verification of the server\u0027s TLS certificate if the application fails to specify the expected server identity. This is in contrast to its intended documented behavior, to fail the certificate verification. Applications that fail to provide the server identity, including Balsa before 2.5.11 and 2.6.x before 2.6.1, accept a TLS certificate if the certificate is valid for any host." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://gitlab.gnome.org/GNOME/glib-networking/-/issues/135", "refsource": "MISC", "url": "https://gitlab.gnome.org/GNOME/glib-networking/-/issues/135" }, { "name": "https://gitlab.gnome.org/GNOME/balsa/-/issues/34", "refsource": "MISC", "url": "https://gitlab.gnome.org/GNOME/balsa/-/issues/34" }, { "name": "https://security.netapp.com/advisory/ntap-20200608-0004/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20200608-0004/" }, { "name": "FEDORA-2020-98ebbd1397", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TQEQJQ4XFMFCFJTEXKL2ZO3UELBPCKSK/" }, { "name": "FEDORA-2020-cadbc5992f", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HLEX2IP62SU6WJ4SK3U766XGLQK3J62O/" }, { "name": "FEDORA-2020-a83c8cd358", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LRCUM22YEWWKNMN2BP5LTVDM5P4VWIXS/" }, { "name": "USN-4405-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4405-1/" }, { "name": "GLSA-202007-50", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202007-50" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-13645", "datePublished": "2020-05-28T11:55:39", "dateReserved": "2020-05-28T00:00:00", "dateUpdated": "2024-08-04T12:25:16.135Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-5007
Vulnerability from cvelistv5
Published
2007-09-20 20:00
Modified
2024-08-07 15:17
Severity ?
EPSS score ?
Summary
Stack-based buffer overflow in the ir_fetch_seq function in balsa before 2.3.20 might allow remote IMAP servers to execute arbitrary code via a long response to a FETCH command.
References
▼ | URL | Tags |
---|---|---|
http://bugs.gentoo.org/show_bug.cgi?id=193179 | x_refsource_CONFIRM | |
https://bugzilla.redhat.com/show_bug.cgi?id=297581 | x_refsource_CONFIRM | |
http://www.novell.com/linux/security/advisories/2007_19_sr.html | vendor-advisory, x_refsource_SUSE | |
http://www.securityfocus.com/bid/25777 | vdb-entry, x_refsource_BID | |
http://bugzilla.gnome.org/show_bug.cgi?id=474366 | x_refsource_CONFIRM | |
http://secunia.com/advisories/26987 | third-party-advisory, x_refsource_SECUNIA | |
http://mail.gnome.org/archives/balsa-list/2007-September/msg00010.html | mailing-list, x_refsource_MLIST | |
http://www.vupen.com/english/advisories/2007/3263 | vdb-entry, x_refsource_VUPEN | |
http://secunia.com/advisories/27272 | third-party-advisory, x_refsource_SECUNIA | |
http://osvdb.org/40585 | vdb-entry, x_refsource_OSVDB | |
http://www.gentoo.org/security/en/glsa/glsa-200710-17.xml | vendor-advisory, x_refsource_GENTOO | |
http://secunia.com/advisories/26947 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T15:17:27.993Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.gentoo.org/show_bug.cgi?id=193179" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=297581" }, { "name": "SUSE-SR:2007:019", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2007_19_sr.html" }, { "name": "25777", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/25777" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugzilla.gnome.org/show_bug.cgi?id=474366" }, { "name": "26987", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26987" }, { "name": "[ANNOUNCE] 20070907 balsa-2.3.20 released", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://mail.gnome.org/archives/balsa-list/2007-September/msg00010.html" }, { "name": "ADV-2007-3263", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/3263" }, { "name": "27272", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27272" }, { "name": "40585", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/40585" }, { "name": "GLSA-200710-17", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200710-17.xml" }, { "name": "26947", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26947" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-09-20T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the ir_fetch_seq function in balsa before 2.3.20 might allow remote IMAP servers to execute arbitrary code via a long response to a FETCH command." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2007-09-28T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.gentoo.org/show_bug.cgi?id=193179" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=297581" }, { "name": "SUSE-SR:2007:019", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2007_19_sr.html" }, { "name": "25777", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/25777" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugzilla.gnome.org/show_bug.cgi?id=474366" }, { "name": "26987", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26987" }, { "name": "[ANNOUNCE] 20070907 balsa-2.3.20 released", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://mail.gnome.org/archives/balsa-list/2007-September/msg00010.html" }, { "name": "ADV-2007-3263", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/3263" }, { "name": "27272", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27272" }, { "name": "40585", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/40585" }, { "name": "GLSA-200710-17", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200710-17.xml" }, { "name": "26947", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26947" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-5007", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in the ir_fetch_seq function in balsa before 2.3.20 might allow remote IMAP servers to execute arbitrary code via a long response to a FETCH command." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://bugs.gentoo.org/show_bug.cgi?id=193179", "refsource": "CONFIRM", "url": "http://bugs.gentoo.org/show_bug.cgi?id=193179" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=297581", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=297581" }, { "name": "SUSE-SR:2007:019", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2007_19_sr.html" }, { "name": "25777", "refsource": "BID", "url": "http://www.securityfocus.com/bid/25777" }, { "name": "http://bugzilla.gnome.org/show_bug.cgi?id=474366", "refsource": "CONFIRM", "url": "http://bugzilla.gnome.org/show_bug.cgi?id=474366" }, { "name": "26987", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26987" }, { "name": "[ANNOUNCE] 20070907 balsa-2.3.20 released", "refsource": "MLIST", "url": "http://mail.gnome.org/archives/balsa-list/2007-September/msg00010.html" }, { "name": "ADV-2007-3263", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/3263" }, { "name": "27272", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/27272" }, { "name": "40585", "refsource": "OSVDB", "url": "http://osvdb.org/40585" }, { "name": "GLSA-200710-17", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-200710-17.xml" }, { "name": "26947", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26947" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-5007", "datePublished": "2007-09-20T20:00:00", "dateReserved": "2007-09-20T00:00:00", "dateUpdated": "2024-08-07T15:17:27.993Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }