Vulnerabilites related to gnome - balsa
Vulnerability from fkie_nvd
Published
2020-07-29 18:15
Modified
2024-11-21 05:06
Severity ?
Summary
In GNOME Balsa before 2.6.0, a malicious server operator or man in the middle can trigger a NULL pointer dereference and client crash by sending a PREAUTH response to imap_mbox_connect in libbalsa/imap/imap-handle.c.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:gnome:balsa:*:*:*:*:*:*:*:*", matchCriteriaId: "5656FC65-29BD-415F-9359-C2798645B197", versionEndExcluding: "2.6.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*", matchCriteriaId: "40513095-7E6E-46B3-B604-C926F1BA3568", vulnerable: true, }, { criteria: "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", matchCriteriaId: "B620311B-34A3-48A6-82DF-6F078D7A4493", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "In GNOME Balsa before 2.6.0, a malicious server operator or man in the middle can trigger a NULL pointer dereference and client crash by sending a PREAUTH response to imap_mbox_connect in libbalsa/imap/imap-handle.c.", }, { lang: "es", value: "En GNOME Balsa versiones anteriores a 2.6.0, un operador de servidor malicioso o un man in the middle puede desencadenar una desreferencia del puntero NULL y un bloqueo del cliente mediante el envío de una respuesta PREAUTH hacia la función imap_mbox_connect en la biblioteca libbalsa/imap/imap-handle.c", }, ], id: "CVE-2020-16118", lastModified: "2024-11-21T05:06:47.740", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-07-29T18:15:15.000", references: [ { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00035.html", }, { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00045.html", }, { source: "cve@mitre.org", tags: [ "Patch", "Third Party Advisory", ], url: "https://gitlab.gnome.org/GNOME/balsa/-/commit/4e245d758e1c826a01080d40c22ca8706f0339e5", }, { source: "cve@mitre.org", tags: [ "Exploit", "Third Party Advisory", ], url: "https://gitlab.gnome.org/GNOME/balsa/-/issues/23", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00035.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00045.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://gitlab.gnome.org/GNOME/balsa/-/commit/4e245d758e1c826a01080d40c22ca8706f0339e5", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", ], url: "https://gitlab.gnome.org/GNOME/balsa/-/issues/23", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-476", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-05-28 12:15
Modified
2024-11-21 05:01
Severity ?
Summary
In GNOME glib-networking through 2.64.2, the implementation of GTlsClientConnection skips hostname verification of the server's TLS certificate if the application fails to specify the expected server identity. This is in contrast to its intended documented behavior, to fail the certificate verification. Applications that fail to provide the server identity, including Balsa before 2.5.11 and 2.6.x before 2.6.1, accept a TLS certificate if the certificate is valid for any host.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
gnome | balsa | * | |
gnome | balsa | 2.6.0 | |
gnome | glib-networking | * | |
gnome | glib-networking | * | |
canonical | ubuntu_linux | 16.04 | |
canonical | ubuntu_linux | 18.04 | |
canonical | ubuntu_linux | 19.10 | |
canonical | ubuntu_linux | 20.04 | |
fedoraproject | fedora | 31 | |
fedoraproject | fedora | 32 | |
netapp | cloud_backup | - | |
broadcom | fabric_operating_system | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:gnome:balsa:*:*:*:*:*:*:*:*", matchCriteriaId: "EC0C6B25-3989-4491-B956-EEB2BB7E98DC", versionEndExcluding: "2.5.11", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:balsa:2.6.0:*:*:*:*:*:*:*", matchCriteriaId: "ECD7DBF7-F15C-4BE2-B4CC-4312A05966B2", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:glib-networking:*:*:*:*:*:*:*:*", matchCriteriaId: "474CE3E4-30D3-4AE3-9CBB-29EE51772DB4", versionEndExcluding: "2.62.4", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:glib-networking:*:*:*:*:*:*:*:*", matchCriteriaId: "6EF800C2-5EB3-4BF3-8A5E-3B5CB1391A13", versionEndExcluding: "2.64.3", versionStartIncluding: "2.64.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", matchCriteriaId: "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", matchCriteriaId: "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", matchCriteriaId: "A31C8344-3E02-4EB8-8BD8-4C84B7959624", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*", matchCriteriaId: "902B8056-9E37-443B-8905-8AA93E2447FB", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", matchCriteriaId: "80F0FA5D-8D3B-4C0E-81E2-87998286AF33", vulnerable: true, }, { criteria: "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", matchCriteriaId: "36D96259-24BD-44E2-96D9-78CE1D41F956", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*", matchCriteriaId: "5C2089EE-5D7F-47EC-8EA5-0F69790564C4", vulnerable: true, }, { criteria: "cpe:2.3:o:broadcom:fabric_operating_system:-:*:*:*:*:*:*:*", matchCriteriaId: "046FB51E-B768-44D3-AEB5-D857145CA840", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "In GNOME glib-networking through 2.64.2, the implementation of GTlsClientConnection skips hostname verification of the server's TLS certificate if the application fails to specify the expected server identity. This is in contrast to its intended documented behavior, to fail the certificate verification. Applications that fail to provide the server identity, including Balsa before 2.5.11 and 2.6.x before 2.6.1, accept a TLS certificate if the certificate is valid for any host.", }, { lang: "es", value: "En GNOME glib-networking versiones hasta 2.64.2, la implementación de GTlsClientConnection omite la verificación del nombre de host del certificado TLS del servidor si la aplicación presenta un fallo al especificar la identidad esperada del servidor. Esto está en contraste con su comportamiento documentado previsto, en el fallo de la verificación del certificado. Las aplicaciones que fallaron al proporcionar la identidad del servidor, incluidas Balsa versiones anteriores a 2.5.11 y versiones 2.6.x anteriores a 2.6.1, aceptan un certificado TLS si el certificado es válido para cualquier host.", }, ], id: "CVE-2020-13645", lastModified: "2024-11-21T05:01:40.310", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 6.4, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:N", version: "2.0", }, exploitabilityScore: 10, impactScore: 4.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 2.5, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-05-28T12:15:11.173", references: [ { source: "cve@mitre.org", tags: [ "Exploit", "Vendor Advisory", ], url: "https://gitlab.gnome.org/GNOME/balsa/-/issues/34", }, { source: "cve@mitre.org", tags: [ "Exploit", "Vendor Advisory", ], url: "https://gitlab.gnome.org/GNOME/glib-networking/-/issues/135", }, { source: "cve@mitre.org", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HLEX2IP62SU6WJ4SK3U766XGLQK3J62O/", }, { source: "cve@mitre.org", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LRCUM22YEWWKNMN2BP5LTVDM5P4VWIXS/", }, { source: "cve@mitre.org", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TQEQJQ4XFMFCFJTEXKL2ZO3UELBPCKSK/", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/202007-50", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20200608-0004/", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/4405-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Vendor Advisory", ], url: "https://gitlab.gnome.org/GNOME/balsa/-/issues/34", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Vendor Advisory", ], url: "https://gitlab.gnome.org/GNOME/glib-networking/-/issues/135", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HLEX2IP62SU6WJ4SK3U766XGLQK3J62O/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LRCUM22YEWWKNMN2BP5LTVDM5P4VWIXS/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TQEQJQ4XFMFCFJTEXKL2ZO3UELBPCKSK/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/202007-50", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20200608-0004/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/4405-1/", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-295", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2007-12-12 22:10
Modified
2025-04-09 00:30
Severity ?
Summary
Stack-based buffer overflow in the ir_fetch_seq function in balsa before 2.3.20 might allow remote IMAP servers to execute arbitrary code via a long response to a FETCH command.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
gnome | balsa | 1.1.7 | |
gnome | balsa | 1.2.4 | |
gnome | balsa | 1.4 | |
gnome | balsa | 1.4.3 | |
gnome | balsa | 2.0.6 | |
gnome | balsa | 2.0.10 | |
gnome | balsa | 2.0.16 | |
gnome | balsa | 2.0.17 | |
gnome | balsa | 2.0.18 | |
gnome | balsa | 2.1 | |
gnome | balsa | 2.1.1 | |
gnome | balsa | 2.1.2 | |
gnome | balsa | 2.1.3 | |
gnome | balsa | 2.1.90 | |
gnome | balsa | 2.1.91 | |
gnome | balsa | 2.2 | |
gnome | balsa | 2.2.1 | |
gnome | balsa | 2.2.2 | |
gnome | balsa | 2.2.3 | |
gnome | balsa | 2.2.4 | |
gnome | balsa | 2.2.5 | |
gnome | balsa | 2.2.6 | |
gnome | balsa | 2.3 | |
gnome | balsa | 2.3.1 | |
gnome | balsa | 2.3.2 | |
gnome | balsa | 2.3.3 | |
gnome | balsa | 2.3.4 | |
gnome | balsa | 2.3.5 | |
gnome | balsa | 2.3.6 | |
gnome | balsa | 2.3.7 | |
gnome | balsa | 2.3.8 | |
gnome | balsa | 2.3.10 | |
gnome | balsa | 2.3.11 | |
gnome | balsa | 2.3.12 | |
gnome | balsa | 2.3.13 | |
gnome | balsa | 2.3.14 | |
gnome | balsa | 2.3.15 | |
gnome | balsa | 2.3.16 | |
gnome | balsa | 2.3.17 | |
gnome | balsa | 2.3.19 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:gnome:balsa:1.1.7:*:*:*:*:*:*:*", matchCriteriaId: "950C09DA-EAEA-4DE7-8A5E-ED9E82C653F5", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:balsa:1.2.4:*:*:*:*:*:*:*", matchCriteriaId: "B1BCE579-53AC-4B05-9E33-ACDA345D5B6A", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:balsa:1.4:*:*:*:*:*:*:*", matchCriteriaId: "6C0E134F-93E3-4754-98A5-E6917853C99B", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:balsa:1.4.3:*:*:*:*:*:*:*", matchCriteriaId: "3D0FCECC-E287-486D-A8C1-CA952F4FBC67", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:balsa:2.0.6:*:*:*:*:*:*:*", matchCriteriaId: "9EAE6454-3B98-4AC8-8C03-4943F168AEF8", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:balsa:2.0.10:*:*:*:*:*:*:*", matchCriteriaId: "91C14FE8-1596-4C1C-924D-D296EDB8FB9F", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:balsa:2.0.16:*:*:*:*:*:*:*", matchCriteriaId: "7225E52A-13A9-4283-8B00-D22C47358871", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:balsa:2.0.17:*:*:*:*:*:*:*", matchCriteriaId: "C7927268-514A-45C8-9A03-CF33426B2875", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:balsa:2.0.18:*:*:*:*:*:*:*", matchCriteriaId: "AFC7FF7A-856E-42BC-9129-A1B28F508EAB", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:balsa:2.1:*:*:*:*:*:*:*", matchCriteriaId: "871512E9-340D-4BC3-A2C0-5D160E6F4004", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:balsa:2.1.1:*:*:*:*:*:*:*", matchCriteriaId: "596A3E04-CB96-4DFE-AE7C-B506DD3C54D8", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:balsa:2.1.2:*:*:*:*:*:*:*", matchCriteriaId: "209D1628-7C99-4722-8038-B835BDE57B5D", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:balsa:2.1.3:*:*:*:*:*:*:*", matchCriteriaId: "B8E8B391-160B-49E0-8505-AA0E625A792C", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:balsa:2.1.90:*:*:*:*:*:*:*", matchCriteriaId: "EB30197C-3991-469D-83E9-9EBE17BFA59F", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:balsa:2.1.91:*:*:*:*:*:*:*", matchCriteriaId: "C5BCD53C-61D5-49E2-8854-F8F8021DAA85", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:balsa:2.2:*:*:*:*:*:*:*", matchCriteriaId: "FA6D9C1F-A67A-4E1F-B6BE-9F98F9998DDD", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:balsa:2.2.1:*:*:*:*:*:*:*", matchCriteriaId: "6B88D420-12D1-4196-9B6C-3A6BD4F4371C", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:balsa:2.2.2:*:*:*:*:*:*:*", matchCriteriaId: "4FDDFC9F-A654-4644-9E8C-6F5902BFC51B", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:balsa:2.2.3:*:*:*:*:*:*:*", matchCriteriaId: "EAFC41E5-6000-44B8-A7AC-426185E8FAB9", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:balsa:2.2.4:*:*:*:*:*:*:*", matchCriteriaId: "38D0233D-CCFC-47C0-B4D6-5F5F91A6260A", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:balsa:2.2.5:*:*:*:*:*:*:*", matchCriteriaId: "FBA69D3A-E357-4B2A-9E9C-2CADA91E45A3", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:balsa:2.2.6:*:*:*:*:*:*:*", matchCriteriaId: "9506DE3C-AD8D-4128-AA5A-1B72465B73AF", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:balsa:2.3:*:*:*:*:*:*:*", matchCriteriaId: "E1A9132B-91DC-404D-A3CA-69457DB75A71", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:balsa:2.3.1:*:*:*:*:*:*:*", matchCriteriaId: "943CFC36-8856-4D8B-A7E5-DF1458769EBA", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:balsa:2.3.2:*:*:*:*:*:*:*", matchCriteriaId: "46DE94C8-F5D4-4D8C-AF9C-0290F24575AE", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:balsa:2.3.3:*:*:*:*:*:*:*", matchCriteriaId: "8B6C96C8-34EE-4C10-BB16-A093CB626FFC", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:balsa:2.3.4:*:*:*:*:*:*:*", matchCriteriaId: "B8C116A3-1F8B-4F6B-8056-0685C9DAF9CF", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:balsa:2.3.5:*:*:*:*:*:*:*", matchCriteriaId: "1134D391-A0CF-41AD-B871-423F1929BA58", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:balsa:2.3.6:*:*:*:*:*:*:*", matchCriteriaId: "50F69A80-C311-4840-AF70-ABDDB2D006EB", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:balsa:2.3.7:*:*:*:*:*:*:*", matchCriteriaId: "79156072-C833-4C7A-A07A-71DDC5BDCB4B", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:balsa:2.3.8:*:*:*:*:*:*:*", matchCriteriaId: "2BA4632D-4729-42A3-8778-C02F50D95C27", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:balsa:2.3.10:*:*:*:*:*:*:*", matchCriteriaId: "0F968DAE-A85A-483E-918F-45DA7CD5C0E4", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:balsa:2.3.11:*:*:*:*:*:*:*", matchCriteriaId: "6730AE89-6168-47FA-8C3C-8A54A8CF0790", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:balsa:2.3.12:*:*:*:*:*:*:*", matchCriteriaId: "61899224-39E2-485A-BD02-D0F596D0C3B9", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:balsa:2.3.13:*:*:*:*:*:*:*", matchCriteriaId: "0A3C98B1-04E7-4FB9-BBCA-A0CAC5C85453", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:balsa:2.3.14:*:*:*:*:*:*:*", matchCriteriaId: "850D4CD2-1F1F-43B7-8DD0-00985F059637", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:balsa:2.3.15:*:*:*:*:*:*:*", matchCriteriaId: "9A426AAD-E53A-4BCF-ADA2-A25215F36EA3", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:balsa:2.3.16:*:*:*:*:*:*:*", matchCriteriaId: "6A81A463-B9DF-4626-BA1F-0386D77A3BC9", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:balsa:2.3.17:*:*:*:*:*:*:*", matchCriteriaId: "BDDA6B44-CB69-47FA-AC29-1A5D7BA14080", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:balsa:2.3.19:*:*:*:*:*:*:*", matchCriteriaId: "401E38DB-D54C-49B0-93B6-2DDE6FA93F6E", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Stack-based buffer overflow in the ir_fetch_seq function in balsa before 2.3.20 might allow remote IMAP servers to execute arbitrary code via a long response to a FETCH command.", }, { lang: "es", value: "Desbordamiento de búfer basado en pila en la función ir_fetch_seq de balsa anterior a 2.3.20 podía permitir a servidores IMAP remotos ejecutar código de su elección mediante una respuesta larga para un comando FETCH.", }, ], id: "CVE-2007-5007", lastModified: "2025-04-09T00:30:58.490", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 6.8, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], }, published: "2007-12-12T22:10:00.000", references: [ { source: "cve@mitre.org", tags: [ "Exploit", ], url: "http://bugs.gentoo.org/show_bug.cgi?id=193179", }, { source: "cve@mitre.org", url: "http://bugzilla.gnome.org/show_bug.cgi?id=474366", }, { source: "cve@mitre.org", tags: [ "Patch", ], url: "http://mail.gnome.org/archives/balsa-list/2007-September/msg00010.html", }, { source: "cve@mitre.org", url: "http://osvdb.org/40585", }, { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/26947", }, { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/26987", }, { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/27272", }, { source: "cve@mitre.org", url: "http://www.gentoo.org/security/en/glsa/glsa-200710-17.xml", }, { source: "cve@mitre.org", url: "http://www.novell.com/linux/security/advisories/2007_19_sr.html", }, { source: "cve@mitre.org", tags: [ "Patch", ], url: "http://www.securityfocus.com/bid/25777", }, { source: "cve@mitre.org", url: "http://www.vupen.com/english/advisories/2007/3263", }, { source: "cve@mitre.org", url: "https://bugzilla.redhat.com/show_bug.cgi?id=297581", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", ], url: "http://bugs.gentoo.org/show_bug.cgi?id=193179", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://bugzilla.gnome.org/show_bug.cgi?id=474366", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", ], url: "http://mail.gnome.org/archives/balsa-list/2007-September/msg00010.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://osvdb.org/40585", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/26947", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/26987", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/27272", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.gentoo.org/security/en/glsa/glsa-200710-17.xml", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.novell.com/linux/security/advisories/2007_19_sr.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", ], url: "http://www.securityfocus.com/bid/25777", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.vupen.com/english/advisories/2007/3263", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://bugzilla.redhat.com/show_bug.cgi?id=297581", }, ], sourceIdentifier: "cve@mitre.org", vendorComments: [ { comment: "Not vulnerable. This issue did not affect version of balsa as shipped with Red Hat Enterprise Linux 2.1.", lastModified: "2008-01-09T00:00:00", organization: "Red Hat", }, ], vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-119", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
cve-2007-5007
Vulnerability from cvelistv5
Published
2007-09-20 20:00
Modified
2024-08-07 15:17
Severity ?
EPSS score ?
Summary
Stack-based buffer overflow in the ir_fetch_seq function in balsa before 2.3.20 might allow remote IMAP servers to execute arbitrary code via a long response to a FETCH command.
References
▼ | URL | Tags |
---|---|---|
http://bugs.gentoo.org/show_bug.cgi?id=193179 | x_refsource_CONFIRM | |
https://bugzilla.redhat.com/show_bug.cgi?id=297581 | x_refsource_CONFIRM | |
http://www.novell.com/linux/security/advisories/2007_19_sr.html | vendor-advisory, x_refsource_SUSE | |
http://www.securityfocus.com/bid/25777 | vdb-entry, x_refsource_BID | |
http://bugzilla.gnome.org/show_bug.cgi?id=474366 | x_refsource_CONFIRM | |
http://secunia.com/advisories/26987 | third-party-advisory, x_refsource_SECUNIA | |
http://mail.gnome.org/archives/balsa-list/2007-September/msg00010.html | mailing-list, x_refsource_MLIST | |
http://www.vupen.com/english/advisories/2007/3263 | vdb-entry, x_refsource_VUPEN | |
http://secunia.com/advisories/27272 | third-party-advisory, x_refsource_SECUNIA | |
http://osvdb.org/40585 | vdb-entry, x_refsource_OSVDB | |
http://www.gentoo.org/security/en/glsa/glsa-200710-17.xml | vendor-advisory, x_refsource_GENTOO | |
http://secunia.com/advisories/26947 | third-party-advisory, x_refsource_SECUNIA |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-07T15:17:27.993Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://bugs.gentoo.org/show_bug.cgi?id=193179", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=297581", }, { name: "SUSE-SR:2007:019", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://www.novell.com/linux/security/advisories/2007_19_sr.html", }, { name: "25777", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/25777", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://bugzilla.gnome.org/show_bug.cgi?id=474366", }, { name: "26987", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/26987", }, { name: "[ANNOUNCE] 20070907 balsa-2.3.20 released", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://mail.gnome.org/archives/balsa-list/2007-September/msg00010.html", }, { name: "ADV-2007-3263", tags: [ "vdb-entry", "x_refsource_VUPEN", "x_transferred", ], url: "http://www.vupen.com/english/advisories/2007/3263", }, { name: "27272", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/27272", }, { name: "40585", tags: [ "vdb-entry", "x_refsource_OSVDB", "x_transferred", ], url: "http://osvdb.org/40585", }, { name: "GLSA-200710-17", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "http://www.gentoo.org/security/en/glsa/glsa-200710-17.xml", }, { name: "26947", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/26947", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2007-09-20T00:00:00", descriptions: [ { lang: "en", value: "Stack-based buffer overflow in the ir_fetch_seq function in balsa before 2.3.20 might allow remote IMAP servers to execute arbitrary code via a long response to a FETCH command.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2007-09-28T09:00:00", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://bugs.gentoo.org/show_bug.cgi?id=193179", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=297581", }, { name: "SUSE-SR:2007:019", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://www.novell.com/linux/security/advisories/2007_19_sr.html", }, { name: "25777", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/25777", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://bugzilla.gnome.org/show_bug.cgi?id=474366", }, { name: "26987", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/26987", }, { name: "[ANNOUNCE] 20070907 balsa-2.3.20 released", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://mail.gnome.org/archives/balsa-list/2007-September/msg00010.html", }, { name: "ADV-2007-3263", tags: [ "vdb-entry", "x_refsource_VUPEN", ], url: "http://www.vupen.com/english/advisories/2007/3263", }, { name: "27272", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/27272", }, { name: "40585", tags: [ "vdb-entry", "x_refsource_OSVDB", ], url: "http://osvdb.org/40585", }, { name: "GLSA-200710-17", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "http://www.gentoo.org/security/en/glsa/glsa-200710-17.xml", }, { name: "26947", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/26947", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2007-5007", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Stack-based buffer overflow in the ir_fetch_seq function in balsa before 2.3.20 might allow remote IMAP servers to execute arbitrary code via a long response to a FETCH command.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "http://bugs.gentoo.org/show_bug.cgi?id=193179", refsource: "CONFIRM", url: "http://bugs.gentoo.org/show_bug.cgi?id=193179", }, { name: "https://bugzilla.redhat.com/show_bug.cgi?id=297581", refsource: "CONFIRM", url: "https://bugzilla.redhat.com/show_bug.cgi?id=297581", }, { name: "SUSE-SR:2007:019", refsource: "SUSE", url: "http://www.novell.com/linux/security/advisories/2007_19_sr.html", }, { name: "25777", refsource: "BID", url: "http://www.securityfocus.com/bid/25777", }, { name: "http://bugzilla.gnome.org/show_bug.cgi?id=474366", refsource: "CONFIRM", url: "http://bugzilla.gnome.org/show_bug.cgi?id=474366", }, { name: "26987", refsource: "SECUNIA", url: "http://secunia.com/advisories/26987", }, { name: "[ANNOUNCE] 20070907 balsa-2.3.20 released", refsource: "MLIST", url: "http://mail.gnome.org/archives/balsa-list/2007-September/msg00010.html", }, { name: "ADV-2007-3263", refsource: "VUPEN", url: "http://www.vupen.com/english/advisories/2007/3263", }, { name: "27272", refsource: "SECUNIA", url: "http://secunia.com/advisories/27272", }, { name: "40585", refsource: "OSVDB", url: "http://osvdb.org/40585", }, { name: "GLSA-200710-17", refsource: "GENTOO", url: "http://www.gentoo.org/security/en/glsa/glsa-200710-17.xml", }, { name: "26947", refsource: "SECUNIA", url: "http://secunia.com/advisories/26947", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2007-5007", datePublished: "2007-09-20T20:00:00", dateReserved: "2007-09-20T00:00:00", dateUpdated: "2024-08-07T15:17:27.993Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-16118
Vulnerability from cvelistv5
Published
2020-07-29 17:58
Modified
2024-08-04 13:37
Severity ?
EPSS score ?
Summary
In GNOME Balsa before 2.6.0, a malicious server operator or man in the middle can trigger a NULL pointer dereference and client crash by sending a PREAUTH response to imap_mbox_connect in libbalsa/imap/imap-handle.c.
References
▼ | URL | Tags |
---|---|---|
https://gitlab.gnome.org/GNOME/balsa/-/issues/23 | x_refsource_MISC | |
https://gitlab.gnome.org/GNOME/balsa/-/commit/4e245d758e1c826a01080d40c22ca8706f0339e5 | x_refsource_MISC | |
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00035.html | vendor-advisory, x_refsource_SUSE | |
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00045.html | vendor-advisory, x_refsource_SUSE |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T13:37:53.604Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://gitlab.gnome.org/GNOME/balsa/-/issues/23", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://gitlab.gnome.org/GNOME/balsa/-/commit/4e245d758e1c826a01080d40c22ca8706f0339e5", }, { name: "openSUSE-SU-2020:1207", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00035.html", }, { name: "openSUSE-SU-2020:1230", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00045.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "In GNOME Balsa before 2.6.0, a malicious server operator or man in the middle can trigger a NULL pointer dereference and client crash by sending a PREAUTH response to imap_mbox_connect in libbalsa/imap/imap-handle.c.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-08-18T11:06:16", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://gitlab.gnome.org/GNOME/balsa/-/issues/23", }, { tags: [ "x_refsource_MISC", ], url: "https://gitlab.gnome.org/GNOME/balsa/-/commit/4e245d758e1c826a01080d40c22ca8706f0339e5", }, { name: "openSUSE-SU-2020:1207", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00035.html", }, { name: "openSUSE-SU-2020:1230", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00045.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2020-16118", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "In GNOME Balsa before 2.6.0, a malicious server operator or man in the middle can trigger a NULL pointer dereference and client crash by sending a PREAUTH response to imap_mbox_connect in libbalsa/imap/imap-handle.c.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://gitlab.gnome.org/GNOME/balsa/-/issues/23", refsource: "MISC", url: "https://gitlab.gnome.org/GNOME/balsa/-/issues/23", }, { name: "https://gitlab.gnome.org/GNOME/balsa/-/commit/4e245d758e1c826a01080d40c22ca8706f0339e5", refsource: "MISC", url: "https://gitlab.gnome.org/GNOME/balsa/-/commit/4e245d758e1c826a01080d40c22ca8706f0339e5", }, { name: "openSUSE-SU-2020:1207", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00035.html", }, { name: "openSUSE-SU-2020:1230", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00045.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2020-16118", datePublished: "2020-07-29T17:58:51", dateReserved: "2020-07-29T00:00:00", dateUpdated: "2024-08-04T13:37:53.604Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-13645
Vulnerability from cvelistv5
Published
2020-05-28 11:55
Modified
2024-08-04 12:25
Severity ?
EPSS score ?
Summary
In GNOME glib-networking through 2.64.2, the implementation of GTlsClientConnection skips hostname verification of the server's TLS certificate if the application fails to specify the expected server identity. This is in contrast to its intended documented behavior, to fail the certificate verification. Applications that fail to provide the server identity, including Balsa before 2.5.11 and 2.6.x before 2.6.1, accept a TLS certificate if the certificate is valid for any host.
References
▼ | URL | Tags |
---|---|---|
https://gitlab.gnome.org/GNOME/glib-networking/-/issues/135 | x_refsource_MISC | |
https://gitlab.gnome.org/GNOME/balsa/-/issues/34 | x_refsource_MISC | |
https://security.netapp.com/advisory/ntap-20200608-0004/ | x_refsource_CONFIRM | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TQEQJQ4XFMFCFJTEXKL2ZO3UELBPCKSK/ | vendor-advisory, x_refsource_FEDORA | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HLEX2IP62SU6WJ4SK3U766XGLQK3J62O/ | vendor-advisory, x_refsource_FEDORA | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LRCUM22YEWWKNMN2BP5LTVDM5P4VWIXS/ | vendor-advisory, x_refsource_FEDORA | |
https://usn.ubuntu.com/4405-1/ | vendor-advisory, x_refsource_UBUNTU | |
https://security.gentoo.org/glsa/202007-50 | vendor-advisory, x_refsource_GENTOO |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T12:25:16.135Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://gitlab.gnome.org/GNOME/glib-networking/-/issues/135", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://gitlab.gnome.org/GNOME/balsa/-/issues/34", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20200608-0004/", }, { name: "FEDORA-2020-98ebbd1397", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TQEQJQ4XFMFCFJTEXKL2ZO3UELBPCKSK/", }, { name: "FEDORA-2020-cadbc5992f", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HLEX2IP62SU6WJ4SK3U766XGLQK3J62O/", }, { name: "FEDORA-2020-a83c8cd358", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LRCUM22YEWWKNMN2BP5LTVDM5P4VWIXS/", }, { name: "USN-4405-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/4405-1/", }, { name: "GLSA-202007-50", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/202007-50", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "In GNOME glib-networking through 2.64.2, the implementation of GTlsClientConnection skips hostname verification of the server's TLS certificate if the application fails to specify the expected server identity. This is in contrast to its intended documented behavior, to fail the certificate verification. Applications that fail to provide the server identity, including Balsa before 2.5.11 and 2.6.x before 2.6.1, accept a TLS certificate if the certificate is valid for any host.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-07-27T03:06:08", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://gitlab.gnome.org/GNOME/glib-networking/-/issues/135", }, { tags: [ "x_refsource_MISC", ], url: "https://gitlab.gnome.org/GNOME/balsa/-/issues/34", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://security.netapp.com/advisory/ntap-20200608-0004/", }, { name: "FEDORA-2020-98ebbd1397", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TQEQJQ4XFMFCFJTEXKL2ZO3UELBPCKSK/", }, { name: "FEDORA-2020-cadbc5992f", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HLEX2IP62SU6WJ4SK3U766XGLQK3J62O/", }, { name: "FEDORA-2020-a83c8cd358", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LRCUM22YEWWKNMN2BP5LTVDM5P4VWIXS/", }, { name: "USN-4405-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/4405-1/", }, { name: "GLSA-202007-50", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/202007-50", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2020-13645", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "In GNOME glib-networking through 2.64.2, the implementation of GTlsClientConnection skips hostname verification of the server's TLS certificate if the application fails to specify the expected server identity. This is in contrast to its intended documented behavior, to fail the certificate verification. Applications that fail to provide the server identity, including Balsa before 2.5.11 and 2.6.x before 2.6.1, accept a TLS certificate if the certificate is valid for any host.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://gitlab.gnome.org/GNOME/glib-networking/-/issues/135", refsource: "MISC", url: "https://gitlab.gnome.org/GNOME/glib-networking/-/issues/135", }, { name: "https://gitlab.gnome.org/GNOME/balsa/-/issues/34", refsource: "MISC", url: "https://gitlab.gnome.org/GNOME/balsa/-/issues/34", }, { name: "https://security.netapp.com/advisory/ntap-20200608-0004/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20200608-0004/", }, { name: "FEDORA-2020-98ebbd1397", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TQEQJQ4XFMFCFJTEXKL2ZO3UELBPCKSK/", }, { name: "FEDORA-2020-cadbc5992f", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HLEX2IP62SU6WJ4SK3U766XGLQK3J62O/", }, { name: "FEDORA-2020-a83c8cd358", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LRCUM22YEWWKNMN2BP5LTVDM5P4VWIXS/", }, { name: "USN-4405-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4405-1/", }, { name: "GLSA-202007-50", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/202007-50", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2020-13645", datePublished: "2020-05-28T11:55:39", dateReserved: "2020-05-28T00:00:00", dateUpdated: "2024-08-04T12:25:16.135Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }