A flaw was found in mbsync in isync 1.4.0 through 1.4.3. Due to an unchecked condition, a malicious or compromised IMAP server could use a crafted mail message that lacks headers (i.e., one that starts with an empty line) to provoke a heap overflow, which could conceivably be exploited for remote code execution.
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=999804 | third party advisory |
https://sourceforge.net/p/isync/isync/ref/master/tags/ | third party advisory |
https://sourceforge.net/p/isync/isync/commit_browser | third party advisory patch |
http://www.openwall.com/lists/oss-security/2021/12/03/2 | mailing list |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CYZ2GNB4ZO2T27D2XNUWMCS3THZYSJQU/ | vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LCBSY7OZ57XNC6ZYXF6WU5KBSWITZVDX/ | vendor advisory |
https://security.gentoo.org/glsa/202208-15 | third party advisory vendor advisory |