A flaw was found in mbsync before v1.3.6 and v1.4.2, where an unchecked pointer cast allows a malicious or compromised server to write an arbitrary integer value past the end of a heap-allocated structure by issuing an unexpected APPENDUID response. This could be plausibly exploited for remote code execution on the client.
The product does not correctly convert an object, resource, or structure from one type to a different type.
Link | Tags |
---|---|
http://www.openwall.com/lists/oss-security/2021/06/07/1 | mailing list third party advisory patch |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U75UFEWRAZYKVL5NHMPBUOLWN3WXTOEI/ | vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RPIDLIJKNRJHUVBCL7QGAPAAVPIHQGXK/ | vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1961710 | not applicable |
https://github.blog/2021-06-10-privilege-escalation-polkit-root-on-linux-with-bug/ | not applicable |
https://bugzilla.redhat.com/show_bug.cgi?id=1967397 | issue tracking third party advisory patch |
https://www.openwall.com/lists/oss-security/2021/06/07/1 | mailing list third party advisory patch |
https://lists.debian.org/debian-lts-announce/2022/07/msg00001.html | third party advisory mailing list |
https://security.gentoo.org/glsa/202208-15 | third party advisory vendor advisory |