First published: Fri Mar 14 2014(Updated: )
Buffer overflow in copy.c in Mutt before 1.5.23 allows remote attackers to cause a denial of service (crash) via a crafted RFC2047 header line, related to address expansion.
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mutt Mutt | <=1.5.22 | |
Mutt Mutt | =1.5 | |
Mutt Mutt | =1.5.1 | |
Mutt Mutt | =1.5.2 | |
Mutt Mutt | =1.5.3 | |
Mutt Mutt | =1.5.4 | |
Mutt Mutt | =1.5.5 | |
Mutt Mutt | =1.5.6 | |
Mutt Mutt | =1.5.7 | |
Mutt Mutt | =1.5.8 | |
Mutt Mutt | =1.5.9 | |
Mutt Mutt | =1.5.10 | |
Mutt Mutt | =1.5.11 | |
Mutt Mutt | =1.5.12 | |
Mutt Mutt | =1.5.13 | |
Mutt Mutt | =1.5.14 | |
Mutt Mutt | =1.5.15 | |
Mutt Mutt | =1.5.16 | |
Mutt Mutt | =1.5.17 | |
Mutt Mutt | =1.5.18 | |
Mutt Mutt | =1.5.19 | |
Mutt Mutt | =1.5.20 | |
Mutt Mutt | =1.5.21 | |
openSUSE openSUSE | =11.4 | |
openSUSE openSUSE | =12.3 | |
openSUSE openSUSE | =13.1 | |
debian/mutt | 2.0.5-4.1+deb11u3 2.2.12-0.1~deb12u1 2.2.9-1+deb12u1 2.2.13-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.