Date: Mon, 7 Jun 2021 13:46:43 +0200 From: Oswald Buddenhagen <oswald.buddenhagen@....de> To: isync-devel@...ts.sourceforge.net Cc: oss-security@...ts.openwall.com Subject: CVE-2021-3578: possible remote code execution in isync/mbsync description: A flaw was found in mbsync before v1.3.6 and v1.4.2, where an unchecked pointer cast allows a malicious or compromised server to write an arbitrary integer value past the end of a heap-allocated structure by issuing an unexpected APPENDUID response. This could be plausibly exploited for remote code execution on the client. mitigation: upgrade to the freshly released v1.3.6 or v1.4.2 available from https://sourceforge.net/projects/isync/files/isync/ , or apply the matching attached patch. credit: This problem was found by Lukas Braun <koomi@...hbit.net> using a fuzzer. View attachment "fix-handling-of-unexpected-APPENDUID-response-code--1.3.patch" of type "text/x-diff" (3187 bytes) View attachment "fix-handling-of-unexpected-APPENDUID-response-code--1.4.patch" of type "text/x-diff" (3167 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.