CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
AI Score
Confidence
High
EPSS
Percentile
92.3%
RITLabs The Bat! before 3.0.0.15 displays certain important headers from encapsulated data in message/partial MIME messages, instead of the real headers, which is in violation of RFC2046 header merging rules and allows remote attackers to spoof the origin of e-mail by sending a fragmented message, as demonstrated using spoofed Received: and Message-ID: headers.
Vendor | Product | Version | CPE |
---|---|---|---|
ritlabs | the_bat | 3.0 | cpe:2.3:a:ritlabs:the_bat:3.0:*:*:*:*:*:*:* |
ritlabs | the_bat | 3.0.0.7 | cpe:2.3:a:ritlabs:the_bat:3.0.0.7:*:*:*:*:*:*:* |
ritlabs | the_bat | 3.0.0.8 | cpe:2.3:a:ritlabs:the_bat:3.0.0.8:*:*:*:*:*:*:* |
ritlabs | the_bat | 3.0.0.9 | cpe:2.3:a:ritlabs:the_bat:3.0.0.9:*:*:*:*:*:*:* |
ritlabs | the_bat | 3.0.0.10 | cpe:2.3:a:ritlabs:the_bat:3.0.0.10:*:*:*:*:*:*:* |
ritlabs | the_bat | 3.0.0.11 | cpe:2.3:a:ritlabs:the_bat:3.0.0.11:*:*:*:*:*:*:* |
ritlabs | the_bat | 3.0.0.12 | cpe:2.3:a:ritlabs:the_bat:3.0.0.12:*:*:*:*:*:*:* |
ritlabs | the_bat | 3.0.0.14 | cpe:2.3:a:ritlabs:the_bat:3.0.0.14:*:*:*:*:*:*:* |
lists.grok.org.uk/pipermail/full-disclosure/2006-February/041973.html
secunia.com/advisories/18713
www.security.nnov.ru/advisories/thebatspoof.asp
www.securityfocus.com/archive/1/424129/100/0/threaded
www.securityfocus.com/bid/16515
exchange.xforce.ibmcloud.com/vulnerabilities/24535
www.ritlabs.com/bt/bug_view_advanced_page.php?bug_id=0003029