Show filters
5 Total Results
Displaying 1-5 of 5
Sort by:
Attacker Value
Unknown

CVE-2020-16118

Disclosure Date: July 29, 2020 (last updated February 21, 2025)
In GNOME Balsa before 2.6.0, a malicious server operator or man in the middle can trigger a NULL pointer dereference and client crash by sending a PREAUTH response to imap_mbox_connect in libbalsa/imap/imap-handle.c.
Attacker Value
Unknown

CVE-2020-13645

Disclosure Date: May 28, 2020 (last updated February 21, 2025)
In GNOME glib-networking through 2.64.2, the implementation of GTlsClientConnection skips hostname verification of the server's TLS certificate if the application fails to specify the expected server identity. This is in contrast to its intended documented behavior, to fail the certificate verification. Applications that fail to provide the server identity, including Balsa before 2.5.11 and 2.6.x before 2.6.1, accept a TLS certificate if the certificate is valid for any host.
Attacker Value
Unknown

CVE-2007-5007

Disclosure Date: December 12, 2007 (last updated October 04, 2023)
Stack-based buffer overflow in the ir_fetch_seq function in balsa before 2.3.20 might allow remote IMAP servers to execute arbitrary code via a long response to a FETCH command.
0
Attacker Value
Unknown

CVE-2003-0300

Disclosure Date: June 16, 2003 (last updated February 22, 2025)
The IMAP Client for Sylpheed 0.8.11 allows remote malicious IMAP servers to cause a denial of service (crash) via certain large literal size values that cause either integer signedness errors or integer overflow errors.
0
Attacker Value
Unknown

CVE-2003-0299

Disclosure Date: June 16, 2003 (last updated February 22, 2025)
The IMAP Client, as used in mutt 1.4.1 and Balsa 2.0.10, allows remote malicious IMAP servers to cause a denial of service and possibly execute arbitrary code via certain large mailbox size values that cause either integer signedness errors or integer overflow errors.
0