All the vulnerabilites related to gnome - balsa
Vulnerability from fkie_nvd
Published
2020-05-28 12:15
Modified
2024-11-21 05:01
Summary
In GNOME glib-networking through 2.64.2, the implementation of GTlsClientConnection skips hostname verification of the server's TLS certificate if the application fails to specify the expected server identity. This is in contrast to its intended documented behavior, to fail the certificate verification. Applications that fail to provide the server identity, including Balsa before 2.5.11 and 2.6.x before 2.6.1, accept a TLS certificate if the certificate is valid for any host.
References
cve@mitre.orghttps://gitlab.gnome.org/GNOME/balsa/-/issues/34Exploit, Vendor Advisory
cve@mitre.orghttps://gitlab.gnome.org/GNOME/glib-networking/-/issues/135Exploit, Vendor Advisory
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HLEX2IP62SU6WJ4SK3U766XGLQK3J62O/
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LRCUM22YEWWKNMN2BP5LTVDM5P4VWIXS/
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TQEQJQ4XFMFCFJTEXKL2ZO3UELBPCKSK/
cve@mitre.orghttps://security.gentoo.org/glsa/202007-50Third Party Advisory
cve@mitre.orghttps://security.netapp.com/advisory/ntap-20200608-0004/Third Party Advisory
cve@mitre.orghttps://usn.ubuntu.com/4405-1/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://gitlab.gnome.org/GNOME/balsa/-/issues/34Exploit, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://gitlab.gnome.org/GNOME/glib-networking/-/issues/135Exploit, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HLEX2IP62SU6WJ4SK3U766XGLQK3J62O/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LRCUM22YEWWKNMN2BP5LTVDM5P4VWIXS/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TQEQJQ4XFMFCFJTEXKL2ZO3UELBPCKSK/
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/202007-50Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20200608-0004/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/4405-1/Third Party Advisory



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:gnome:balsa:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC0C6B25-3989-4491-B956-EEB2BB7E98DC",
              "versionEndExcluding": "2.5.11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:balsa:2.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECD7DBF7-F15C-4BE2-B4CC-4312A05966B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:glib-networking:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "474CE3E4-30D3-4AE3-9CBB-29EE51772DB4",
              "versionEndExcluding": "2.62.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:glib-networking:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EF800C2-5EB3-4BF3-8A5E-3B5CB1391A13",
              "versionEndExcluding": "2.64.3",
              "versionStartIncluding": "2.64.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "A31C8344-3E02-4EB8-8BD8-4C84B7959624",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "902B8056-9E37-443B-8905-8AA93E2447FB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
              "matchCriteriaId": "80F0FA5D-8D3B-4C0E-81E2-87998286AF33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
              "matchCriteriaId": "36D96259-24BD-44E2-96D9-78CE1D41F956",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C2089EE-5D7F-47EC-8EA5-0F69790564C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:broadcom:fabric_operating_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "046FB51E-B768-44D3-AEB5-D857145CA840",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In GNOME glib-networking through 2.64.2, the implementation of GTlsClientConnection skips hostname verification of the server\u0027s TLS certificate if the application fails to specify the expected server identity. This is in contrast to its intended documented behavior, to fail the certificate verification. Applications that fail to provide the server identity, including Balsa before 2.5.11 and 2.6.x before 2.6.1, accept a TLS certificate if the certificate is valid for any host."
    },
    {
      "lang": "es",
      "value": "En GNOME glib-networking versiones hasta 2.64.2, la implementaci\u00f3n de GTlsClientConnection omite la verificaci\u00f3n del nombre de host del certificado TLS del servidor si la aplicaci\u00f3n presenta un fallo al especificar la identidad esperada del servidor. Esto est\u00e1 en contraste con su comportamiento documentado previsto, en el fallo de la verificaci\u00f3n del certificado. Las aplicaciones que fallaron al proporcionar la identidad del servidor, incluidas Balsa versiones anteriores a 2.5.11 y versiones 2.6.x anteriores a 2.6.1, aceptan un certificado TLS si el certificado es v\u00e1lido para cualquier host."
    }
  ],
  "id": "CVE-2020-13645",
  "lastModified": "2024-11-21T05:01:40.310",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 6.4,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.5,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-05-28T12:15:11.173",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "https://gitlab.gnome.org/GNOME/balsa/-/issues/34"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "https://gitlab.gnome.org/GNOME/glib-networking/-/issues/135"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HLEX2IP62SU6WJ4SK3U766XGLQK3J62O/"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LRCUM22YEWWKNMN2BP5LTVDM5P4VWIXS/"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TQEQJQ4XFMFCFJTEXKL2ZO3UELBPCKSK/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/202007-50"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200608-0004/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://usn.ubuntu.com/4405-1/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "https://gitlab.gnome.org/GNOME/balsa/-/issues/34"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "https://gitlab.gnome.org/GNOME/glib-networking/-/issues/135"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HLEX2IP62SU6WJ4SK3U766XGLQK3J62O/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LRCUM22YEWWKNMN2BP5LTVDM5P4VWIXS/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TQEQJQ4XFMFCFJTEXKL2ZO3UELBPCKSK/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/202007-50"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200608-0004/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://usn.ubuntu.com/4405-1/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-295"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2007-12-12 22:10
Modified
2024-11-21 00:36
Severity ?
Summary
Stack-based buffer overflow in the ir_fetch_seq function in balsa before 2.3.20 might allow remote IMAP servers to execute arbitrary code via a long response to a FETCH command.
References
cve@mitre.orghttp://bugs.gentoo.org/show_bug.cgi?id=193179Exploit
cve@mitre.orghttp://bugzilla.gnome.org/show_bug.cgi?id=474366
cve@mitre.orghttp://mail.gnome.org/archives/balsa-list/2007-September/msg00010.htmlPatch
cve@mitre.orghttp://osvdb.org/40585
cve@mitre.orghttp://secunia.com/advisories/26947Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/26987Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/27272Vendor Advisory
cve@mitre.orghttp://www.gentoo.org/security/en/glsa/glsa-200710-17.xml
cve@mitre.orghttp://www.novell.com/linux/security/advisories/2007_19_sr.html
cve@mitre.orghttp://www.securityfocus.com/bid/25777Patch
cve@mitre.orghttp://www.vupen.com/english/advisories/2007/3263
cve@mitre.orghttps://bugzilla.redhat.com/show_bug.cgi?id=297581
af854a3a-2127-422b-91ae-364da2661108http://bugs.gentoo.org/show_bug.cgi?id=193179Exploit
af854a3a-2127-422b-91ae-364da2661108http://bugzilla.gnome.org/show_bug.cgi?id=474366
af854a3a-2127-422b-91ae-364da2661108http://mail.gnome.org/archives/balsa-list/2007-September/msg00010.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/40585
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26947Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26987Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/27272Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-200710-17.xml
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2007_19_sr.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/25777Patch
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/3263
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=297581
Impacted products
Vendor Product Version
gnome balsa 1.1.7
gnome balsa 1.2.4
gnome balsa 1.4
gnome balsa 1.4.3
gnome balsa 2.0.6
gnome balsa 2.0.10
gnome balsa 2.0.16
gnome balsa 2.0.17
gnome balsa 2.0.18
gnome balsa 2.1
gnome balsa 2.1.1
gnome balsa 2.1.2
gnome balsa 2.1.3
gnome balsa 2.1.90
gnome balsa 2.1.91
gnome balsa 2.2
gnome balsa 2.2.1
gnome balsa 2.2.2
gnome balsa 2.2.3
gnome balsa 2.2.4
gnome balsa 2.2.5
gnome balsa 2.2.6
gnome balsa 2.3
gnome balsa 2.3.1
gnome balsa 2.3.2
gnome balsa 2.3.3
gnome balsa 2.3.4
gnome balsa 2.3.5
gnome balsa 2.3.6
gnome balsa 2.3.7
gnome balsa 2.3.8
gnome balsa 2.3.10
gnome balsa 2.3.11
gnome balsa 2.3.12
gnome balsa 2.3.13
gnome balsa 2.3.14
gnome balsa 2.3.15
gnome balsa 2.3.16
gnome balsa 2.3.17
gnome balsa 2.3.19



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:gnome:balsa:1.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "950C09DA-EAEA-4DE7-8A5E-ED9E82C653F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:balsa:1.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1BCE579-53AC-4B05-9E33-ACDA345D5B6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:balsa:1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C0E134F-93E3-4754-98A5-E6917853C99B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:balsa:1.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D0FCECC-E287-486D-A8C1-CA952F4FBC67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:balsa:2.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EAE6454-3B98-4AC8-8C03-4943F168AEF8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:balsa:2.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "91C14FE8-1596-4C1C-924D-D296EDB8FB9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:balsa:2.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "7225E52A-13A9-4283-8B00-D22C47358871",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:balsa:2.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7927268-514A-45C8-9A03-CF33426B2875",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:balsa:2.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFC7FF7A-856E-42BC-9129-A1B28F508EAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:balsa:2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "871512E9-340D-4BC3-A2C0-5D160E6F4004",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:balsa:2.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "596A3E04-CB96-4DFE-AE7C-B506DD3C54D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:balsa:2.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "209D1628-7C99-4722-8038-B835BDE57B5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:balsa:2.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8E8B391-160B-49E0-8505-AA0E625A792C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:balsa:2.1.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB30197C-3991-469D-83E9-9EBE17BFA59F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:balsa:2.1.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5BCD53C-61D5-49E2-8854-F8F8021DAA85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:balsa:2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA6D9C1F-A67A-4E1F-B6BE-9F98F9998DDD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:balsa:2.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B88D420-12D1-4196-9B6C-3A6BD4F4371C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:balsa:2.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FDDFC9F-A654-4644-9E8C-6F5902BFC51B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:balsa:2.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "EAFC41E5-6000-44B8-A7AC-426185E8FAB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:balsa:2.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "38D0233D-CCFC-47C0-B4D6-5F5F91A6260A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:balsa:2.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBA69D3A-E357-4B2A-9E9C-2CADA91E45A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:balsa:2.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "9506DE3C-AD8D-4128-AA5A-1B72465B73AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:balsa:2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1A9132B-91DC-404D-A3CA-69457DB75A71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:balsa:2.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "943CFC36-8856-4D8B-A7E5-DF1458769EBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:balsa:2.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "46DE94C8-F5D4-4D8C-AF9C-0290F24575AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:balsa:2.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B6C96C8-34EE-4C10-BB16-A093CB626FFC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:balsa:2.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8C116A3-1F8B-4F6B-8056-0685C9DAF9CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:balsa:2.3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "1134D391-A0CF-41AD-B871-423F1929BA58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:balsa:2.3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "50F69A80-C311-4840-AF70-ABDDB2D006EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:balsa:2.3.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "79156072-C833-4C7A-A07A-71DDC5BDCB4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:balsa:2.3.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BA4632D-4729-42A3-8778-C02F50D95C27",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:balsa:2.3.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F968DAE-A85A-483E-918F-45DA7CD5C0E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:balsa:2.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "6730AE89-6168-47FA-8C3C-8A54A8CF0790",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:balsa:2.3.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "61899224-39E2-485A-BD02-D0F596D0C3B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:balsa:2.3.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A3C98B1-04E7-4FB9-BBCA-A0CAC5C85453",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:balsa:2.3.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "850D4CD2-1F1F-43B7-8DD0-00985F059637",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:balsa:2.3.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A426AAD-E53A-4BCF-ADA2-A25215F36EA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:balsa:2.3.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A81A463-B9DF-4626-BA1F-0386D77A3BC9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:balsa:2.3.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDDA6B44-CB69-47FA-AC29-1A5D7BA14080",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:balsa:2.3.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "401E38DB-D54C-49B0-93B6-2DDE6FA93F6E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Stack-based buffer overflow in the ir_fetch_seq function in balsa before 2.3.20 might allow remote IMAP servers to execute arbitrary code via a long response to a FETCH command."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer basado en pila en la funci\u00f3n ir_fetch_seq de balsa anterior a 2.3.20 pod\u00eda permitir a servidores IMAP remotos ejecutar c\u00f3digo de su elecci\u00f3n mediante una respuesta larga para un comando FETCH."
    }
  ],
  "id": "CVE-2007-5007",
  "lastModified": "2024-11-21T00:36:55.717",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2007-12-12T22:10:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://bugs.gentoo.org/show_bug.cgi?id=193179"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://bugzilla.gnome.org/show_bug.cgi?id=474366"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://mail.gnome.org/archives/balsa-list/2007-September/msg00010.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/40585"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26947"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26987"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/27272"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200710-17.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.novell.com/linux/security/advisories/2007_19_sr.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/25777"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2007/3263"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=297581"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://bugs.gentoo.org/show_bug.cgi?id=193179"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugzilla.gnome.org/show_bug.cgi?id=474366"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://mail.gnome.org/archives/balsa-list/2007-September/msg00010.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/40585"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26947"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26987"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/27272"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200710-17.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.novell.com/linux/security/advisories/2007_19_sr.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/25777"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/3263"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=297581"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vendorComments": [
    {
      "comment": "Not vulnerable. This issue did not affect version of balsa as shipped with Red Hat Enterprise Linux 2.1.",
      "lastModified": "2008-01-09T00:00:00",
      "organization": "Red Hat"
    }
  ],
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-07-29 18:15
Modified
2024-11-21 05:06
Summary
In GNOME Balsa before 2.6.0, a malicious server operator or man in the middle can trigger a NULL pointer dereference and client crash by sending a PREAUTH response to imap_mbox_connect in libbalsa/imap/imap-handle.c.
Impacted products
Vendor Product Version
gnome balsa *
opensuse backports_sle 15.0
opensuse leap 15.1



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:gnome:balsa:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5656FC65-29BD-415F-9359-C2798645B197",
              "versionEndExcluding": "2.6.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "40513095-7E6E-46B3-B604-C926F1BA3568",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In GNOME Balsa before 2.6.0, a malicious server operator or man in the middle can trigger a NULL pointer dereference and client crash by sending a PREAUTH response to imap_mbox_connect in libbalsa/imap/imap-handle.c."
    },
    {
      "lang": "es",
      "value": "En GNOME Balsa versiones anteriores a 2.6.0, un operador de servidor malicioso o un man in the middle puede desencadenar una desreferencia del puntero NULL y un bloqueo del cliente mediante el env\u00edo de una respuesta PREAUTH hacia la funci\u00f3n imap_mbox_connect en la biblioteca libbalsa/imap/imap-handle.c"
    }
  ],
  "id": "CVE-2020-16118",
  "lastModified": "2024-11-21T05:06:47.740",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-07-29T18:15:15.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00035.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00045.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://gitlab.gnome.org/GNOME/balsa/-/commit/4e245d758e1c826a01080d40c22ca8706f0339e5"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://gitlab.gnome.org/GNOME/balsa/-/issues/23"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00035.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00045.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://gitlab.gnome.org/GNOME/balsa/-/commit/4e245d758e1c826a01080d40c22ca8706f0339e5"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://gitlab.gnome.org/GNOME/balsa/-/issues/23"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-476"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

cve-2020-16118
Vulnerability from cvelistv5
Published
2020-07-29 17:58
Modified
2024-08-04 13:37
Severity ?
Summary
In GNOME Balsa before 2.6.0, a malicious server operator or man in the middle can trigger a NULL pointer dereference and client crash by sending a PREAUTH response to imap_mbox_connect in libbalsa/imap/imap-handle.c.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T13:37:53.604Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://gitlab.gnome.org/GNOME/balsa/-/issues/23"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://gitlab.gnome.org/GNOME/balsa/-/commit/4e245d758e1c826a01080d40c22ca8706f0339e5"
          },
          {
            "name": "openSUSE-SU-2020:1207",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00035.html"
          },
          {
            "name": "openSUSE-SU-2020:1230",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00045.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In GNOME Balsa before 2.6.0, a malicious server operator or man in the middle can trigger a NULL pointer dereference and client crash by sending a PREAUTH response to imap_mbox_connect in libbalsa/imap/imap-handle.c."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-08-18T11:06:16",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://gitlab.gnome.org/GNOME/balsa/-/issues/23"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://gitlab.gnome.org/GNOME/balsa/-/commit/4e245d758e1c826a01080d40c22ca8706f0339e5"
        },
        {
          "name": "openSUSE-SU-2020:1207",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00035.html"
        },
        {
          "name": "openSUSE-SU-2020:1230",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00045.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2020-16118",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In GNOME Balsa before 2.6.0, a malicious server operator or man in the middle can trigger a NULL pointer dereference and client crash by sending a PREAUTH response to imap_mbox_connect in libbalsa/imap/imap-handle.c."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://gitlab.gnome.org/GNOME/balsa/-/issues/23",
              "refsource": "MISC",
              "url": "https://gitlab.gnome.org/GNOME/balsa/-/issues/23"
            },
            {
              "name": "https://gitlab.gnome.org/GNOME/balsa/-/commit/4e245d758e1c826a01080d40c22ca8706f0339e5",
              "refsource": "MISC",
              "url": "https://gitlab.gnome.org/GNOME/balsa/-/commit/4e245d758e1c826a01080d40c22ca8706f0339e5"
            },
            {
              "name": "openSUSE-SU-2020:1207",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00035.html"
            },
            {
              "name": "openSUSE-SU-2020:1230",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00045.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2020-16118",
    "datePublished": "2020-07-29T17:58:51",
    "dateReserved": "2020-07-29T00:00:00",
    "dateUpdated": "2024-08-04T13:37:53.604Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-13645
Vulnerability from cvelistv5
Published
2020-05-28 11:55
Modified
2024-08-04 12:25
Severity ?
Summary
In GNOME glib-networking through 2.64.2, the implementation of GTlsClientConnection skips hostname verification of the server's TLS certificate if the application fails to specify the expected server identity. This is in contrast to its intended documented behavior, to fail the certificate verification. Applications that fail to provide the server identity, including Balsa before 2.5.11 and 2.6.x before 2.6.1, accept a TLS certificate if the certificate is valid for any host.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T12:25:16.135Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://gitlab.gnome.org/GNOME/glib-networking/-/issues/135"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://gitlab.gnome.org/GNOME/balsa/-/issues/34"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20200608-0004/"
          },
          {
            "name": "FEDORA-2020-98ebbd1397",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TQEQJQ4XFMFCFJTEXKL2ZO3UELBPCKSK/"
          },
          {
            "name": "FEDORA-2020-cadbc5992f",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HLEX2IP62SU6WJ4SK3U766XGLQK3J62O/"
          },
          {
            "name": "FEDORA-2020-a83c8cd358",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LRCUM22YEWWKNMN2BP5LTVDM5P4VWIXS/"
          },
          {
            "name": "USN-4405-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "https://usn.ubuntu.com/4405-1/"
          },
          {
            "name": "GLSA-202007-50",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/202007-50"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In GNOME glib-networking through 2.64.2, the implementation of GTlsClientConnection skips hostname verification of the server\u0027s TLS certificate if the application fails to specify the expected server identity. This is in contrast to its intended documented behavior, to fail the certificate verification. Applications that fail to provide the server identity, including Balsa before 2.5.11 and 2.6.x before 2.6.1, accept a TLS certificate if the certificate is valid for any host."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-07-27T03:06:08",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://gitlab.gnome.org/GNOME/glib-networking/-/issues/135"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://gitlab.gnome.org/GNOME/balsa/-/issues/34"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20200608-0004/"
        },
        {
          "name": "FEDORA-2020-98ebbd1397",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TQEQJQ4XFMFCFJTEXKL2ZO3UELBPCKSK/"
        },
        {
          "name": "FEDORA-2020-cadbc5992f",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HLEX2IP62SU6WJ4SK3U766XGLQK3J62O/"
        },
        {
          "name": "FEDORA-2020-a83c8cd358",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LRCUM22YEWWKNMN2BP5LTVDM5P4VWIXS/"
        },
        {
          "name": "USN-4405-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "https://usn.ubuntu.com/4405-1/"
        },
        {
          "name": "GLSA-202007-50",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/202007-50"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2020-13645",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In GNOME glib-networking through 2.64.2, the implementation of GTlsClientConnection skips hostname verification of the server\u0027s TLS certificate if the application fails to specify the expected server identity. This is in contrast to its intended documented behavior, to fail the certificate verification. Applications that fail to provide the server identity, including Balsa before 2.5.11 and 2.6.x before 2.6.1, accept a TLS certificate if the certificate is valid for any host."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://gitlab.gnome.org/GNOME/glib-networking/-/issues/135",
              "refsource": "MISC",
              "url": "https://gitlab.gnome.org/GNOME/glib-networking/-/issues/135"
            },
            {
              "name": "https://gitlab.gnome.org/GNOME/balsa/-/issues/34",
              "refsource": "MISC",
              "url": "https://gitlab.gnome.org/GNOME/balsa/-/issues/34"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20200608-0004/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20200608-0004/"
            },
            {
              "name": "FEDORA-2020-98ebbd1397",
              "refsource": "FEDORA",
              "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TQEQJQ4XFMFCFJTEXKL2ZO3UELBPCKSK/"
            },
            {
              "name": "FEDORA-2020-cadbc5992f",
              "refsource": "FEDORA",
              "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HLEX2IP62SU6WJ4SK3U766XGLQK3J62O/"
            },
            {
              "name": "FEDORA-2020-a83c8cd358",
              "refsource": "FEDORA",
              "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LRCUM22YEWWKNMN2BP5LTVDM5P4VWIXS/"
            },
            {
              "name": "USN-4405-1",
              "refsource": "UBUNTU",
              "url": "https://usn.ubuntu.com/4405-1/"
            },
            {
              "name": "GLSA-202007-50",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/202007-50"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2020-13645",
    "datePublished": "2020-05-28T11:55:39",
    "dateReserved": "2020-05-28T00:00:00",
    "dateUpdated": "2024-08-04T12:25:16.135Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2007-5007
Vulnerability from cvelistv5
Published
2007-09-20 20:00
Modified
2024-08-07 15:17
Severity ?
Summary
Stack-based buffer overflow in the ir_fetch_seq function in balsa before 2.3.20 might allow remote IMAP servers to execute arbitrary code via a long response to a FETCH command.
References
http://bugs.gentoo.org/show_bug.cgi?id=193179x_refsource_CONFIRM
https://bugzilla.redhat.com/show_bug.cgi?id=297581x_refsource_CONFIRM
http://www.novell.com/linux/security/advisories/2007_19_sr.htmlvendor-advisory, x_refsource_SUSE
http://www.securityfocus.com/bid/25777vdb-entry, x_refsource_BID
http://bugzilla.gnome.org/show_bug.cgi?id=474366x_refsource_CONFIRM
http://secunia.com/advisories/26987third-party-advisory, x_refsource_SECUNIA
http://mail.gnome.org/archives/balsa-list/2007-September/msg00010.htmlmailing-list, x_refsource_MLIST
http://www.vupen.com/english/advisories/2007/3263vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/27272third-party-advisory, x_refsource_SECUNIA
http://osvdb.org/40585vdb-entry, x_refsource_OSVDB
http://www.gentoo.org/security/en/glsa/glsa-200710-17.xmlvendor-advisory, x_refsource_GENTOO
http://secunia.com/advisories/26947third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T15:17:27.993Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.gentoo.org/show_bug.cgi?id=193179"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=297581"
          },
          {
            "name": "SUSE-SR:2007:019",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://www.novell.com/linux/security/advisories/2007_19_sr.html"
          },
          {
            "name": "25777",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/25777"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugzilla.gnome.org/show_bug.cgi?id=474366"
          },
          {
            "name": "26987",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26987"
          },
          {
            "name": "[ANNOUNCE] 20070907 balsa-2.3.20 released",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://mail.gnome.org/archives/balsa-list/2007-September/msg00010.html"
          },
          {
            "name": "ADV-2007-3263",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/3263"
          },
          {
            "name": "27272",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/27272"
          },
          {
            "name": "40585",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/40585"
          },
          {
            "name": "GLSA-200710-17",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-200710-17.xml"
          },
          {
            "name": "26947",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26947"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-09-20T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Stack-based buffer overflow in the ir_fetch_seq function in balsa before 2.3.20 might allow remote IMAP servers to execute arbitrary code via a long response to a FETCH command."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2007-09-28T09:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.gentoo.org/show_bug.cgi?id=193179"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=297581"
        },
        {
          "name": "SUSE-SR:2007:019",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://www.novell.com/linux/security/advisories/2007_19_sr.html"
        },
        {
          "name": "25777",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/25777"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugzilla.gnome.org/show_bug.cgi?id=474366"
        },
        {
          "name": "26987",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26987"
        },
        {
          "name": "[ANNOUNCE] 20070907 balsa-2.3.20 released",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://mail.gnome.org/archives/balsa-list/2007-September/msg00010.html"
        },
        {
          "name": "ADV-2007-3263",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/3263"
        },
        {
          "name": "27272",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/27272"
        },
        {
          "name": "40585",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/40585"
        },
        {
          "name": "GLSA-200710-17",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-200710-17.xml"
        },
        {
          "name": "26947",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26947"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-5007",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Stack-based buffer overflow in the ir_fetch_seq function in balsa before 2.3.20 might allow remote IMAP servers to execute arbitrary code via a long response to a FETCH command."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://bugs.gentoo.org/show_bug.cgi?id=193179",
              "refsource": "CONFIRM",
              "url": "http://bugs.gentoo.org/show_bug.cgi?id=193179"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=297581",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=297581"
            },
            {
              "name": "SUSE-SR:2007:019",
              "refsource": "SUSE",
              "url": "http://www.novell.com/linux/security/advisories/2007_19_sr.html"
            },
            {
              "name": "25777",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/25777"
            },
            {
              "name": "http://bugzilla.gnome.org/show_bug.cgi?id=474366",
              "refsource": "CONFIRM",
              "url": "http://bugzilla.gnome.org/show_bug.cgi?id=474366"
            },
            {
              "name": "26987",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26987"
            },
            {
              "name": "[ANNOUNCE] 20070907 balsa-2.3.20 released",
              "refsource": "MLIST",
              "url": "http://mail.gnome.org/archives/balsa-list/2007-September/msg00010.html"
            },
            {
              "name": "ADV-2007-3263",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/3263"
            },
            {
              "name": "27272",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/27272"
            },
            {
              "name": "40585",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/40585"
            },
            {
              "name": "GLSA-200710-17",
              "refsource": "GENTOO",
              "url": "http://www.gentoo.org/security/en/glsa/glsa-200710-17.xml"
            },
            {
              "name": "26947",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26947"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-5007",
    "datePublished": "2007-09-20T20:00:00",
    "dateReserved": "2007-09-20T00:00:00",
    "dateUpdated": "2024-08-07T15:17:27.993Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}