Lucene search

K
archlinuxArchLinuxASA-202106-27
HistoryJun 09, 2021 - 12:00 a.m.

[ASA-202106-27] isync: arbitrary code execution

2021-06-0900:00:00
security.archlinux.org
114
isync
arbitrary code execution
package upgrade
remote code execution

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.004

Percentile

73.2%

Arch Linux Security Advisory ASA-202106-27

Severity: Medium
Date : 2021-06-09
CVE-ID : CVE-2021-3578
Package : isync
Type : arbitrary code execution
Remote : Yes
Link : https://security.archlinux.org/AVG-2042

Summary

The package isync before version 1.4.2-1 is vulnerable to arbitrary
code execution.

Resolution

Upgrade to 1.4.2-1.

pacman -Syu “isync>=1.4.2-1”

The problem has been fixed upstream in version 1.4.2.

Workaround

None.

Description

A security issue was found in mbsync before version 1.4.2, where an
unchecked pointer cast allows a malicious or compromised server to
write an arbitrary integer value past the end of a heap-allocated
structure by issuing an unexpected APPENDUID response. This could be
plausibly exploited for remote code execution on the client.

Impact

A remote server could cause arbitrary code execution on the mbsync
client using a crafted APPENDUID response.

References

https://sourceforge.net/p/isync/mailman/message/37297759/
https://sourceforge.net/p/isync/isync/ci/589d2ed4283130108df5495b5510d822282e1300/
https://security.archlinux.org/CVE-2021-3578

OSVersionArchitecturePackageVersionFilename
ArchLinuxanyanyisync< 1.4.2-1UNKNOWN

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.004

Percentile

73.2%