Vulnerability Description
In imap_scan_tree_recursive in Claws Mail through 3.17.6, a malicious IMAP server can trigger stack consumption because of unlimited recursion into subdirectories during a rebuild of the folder tree.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Claws-Mail | Claws-Mail | <= 3.17.6 |
| Fedoraproject | Fedora | 31 |
Related Weaknesses (CWE)
References
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://www.thewildbeast.co.uk/claws-mail/bugzilla/show_bug.cgi?id=4313ExploitIssue TrackingThird Party Advisory
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://www.thewildbeast.co.uk/claws-mail/bugzilla/show_bug.cgi?id=4313ExploitIssue TrackingThird Party Advisory
FAQ
What is CVE-2020-16094?
CVE-2020-16094 is a vulnerability with a CVSS score of 7.5 (HIGH). In imap_scan_tree_recursive in Claws Mail through 3.17.6, a malicious IMAP server can trigger stack consumption because of unlimited recursion into subdirectories during a rebuild of the folder tree.
How severe is CVE-2020-16094?
CVE-2020-16094 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-16094?
Check the references section above for vendor advisories and patch information. Affected products include: Claws-Mail Claws-Mail, Fedoraproject Fedora.