First published: Tue Nov 16 2021(Updated: )
A flaw was found in mbsync in isync 1.4.0 through 1.4.3. Due to an unchecked condition, a malicious or compromised IMAP server could use a crafted mail message that lacks headers (i.e., one that starts with an empty line) to provoke a heap overflow, which could conceivably be exploited for remote code execution.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/isync | 1.3.0-2.2+deb11u1 1.4.4-5 | |
isync | >=1.4.0<=1.4.3 | |
Debian | =9.0 | |
Debian | =10.0 | |
Debian | =11.0 | |
Fedora | =34 | |
Fedora | =35 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-44143 has been classified with high severity due to the potential for a heap overflow vulnerability.
To fix CVE-2021-44143, upgrade isync to version 1.4.4-5 or later.
CVE-2021-44143 affects isync versions from 1.4.0 to 1.4.3.
Exploitation of CVE-2021-44143 could lead to remote code execution through a crafted mail message.
Yes, Debian systems running versions 9.0, 10.0, 11.0 and Fedora versions 34, 35 are affected by CVE-2021-44143.