CVE-2021-3657

Source
https://nvd.nist.gov/vuln/detail/CVE-2021-3657
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-3657.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2021-3657
Related
Published
2022-02-18T18:15:09Z
Modified
2025-01-08T08:00:31.727311Z
Downstream
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

A flaw was found in mbsync versions prior to 1.4.4. Due to inadequate handling of extremely large (>=2GiB) IMAP literals, malicious or compromised IMAP servers, and hypothetically even external email senders, could cause several different buffer overflows, which could conceivably be exploited for remote code execution.

References

Affected packages

Debian:11 / isync

Package

Name
isync
Purl
pkg:deb/debian/isync?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.3.0-2.2+deb11u1

Affected versions

1.*

1.3.0-2.2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / isync

Package

Name
isync
Purl
pkg:deb/debian/isync?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.4.4-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / isync

Package

Name
isync
Purl
pkg:deb/debian/isync?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.4.4-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}