CVE-2021-44143
high-risk
Published 2021-11-22
A flaw was found in mbsync in isync 1.4.0 through 1.4.3. Due to an unchecked condition, a malicious or compromised IMAP server could use a crafted mail message that lacks headers (i.e., one that starts with an empty line) to provoke a heap overflow, which could conceivably be exploited for remote code execution.
Do I need to act?
~
7.8% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Products (6)
Affected Vendors
References (14)
Third Party Advisory
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=999804
Third Party Advisory
https://security.gentoo.org/glsa/202208-15
Third Party Advisory
https://sourceforge.net/p/isync/isync/ref/master/tags/
Third Party Advisory
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=999804
Third Party Advisory
https://security.gentoo.org/glsa/202208-15
Third Party Advisory
https://sourceforge.net/p/isync/isync/ref/master/tags/
55
/ 100
high-risk
Severity
32/34 · Critical
Exploitability
10/34 · Low
Exposure
13/34 · Low