
Cloud Vulnerability DB
A community-led vulnerabilities database
A critical vulnerability (CVE-2021-44143) was discovered in mbsync, a component of isync versions 1.4.0 through 1.4.3. The vulnerability stems from an unchecked condition where a malicious or compromised IMAP server could exploit a crafted mail message that lacks headers (starting with an empty line) to trigger a heap overflow (NVD, Openwall).
The vulnerability has been assigned a CVSS v3.1 Base Score of 9.8 (CRITICAL) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H. The issue is classified as CWE-787 (Out-of-bounds Write) and affects the message handling functionality in mbsync when processing mail messages without headers (NVD).
The vulnerability could potentially lead to remote code execution if successfully exploited. When triggered, the heap overflow condition could allow an attacker to execute arbitrary code through a compromised IMAP server (NVD, Debian Bug).
Users are advised to upgrade to isync version 1.4.4 or later, which contains fixes for this vulnerability. The fix was released in December 2021 and has been packaged for various distributions including Fedora, Debian, and Gentoo (Gentoo Advisory, Fedora Update).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."