First published: Fri Mar 14 2014(Updated: )
Buffer overflow in copy.c in Mutt before 1.5.23 allows remote attackers to cause a denial of service (crash) via a crafted RFC2047 header line, related to address expansion.
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/mutt | 2.0.5-4.1+deb11u3 2.2.12-0.1~deb12u1 2.2.9-1+deb12u1 2.2.13-1 | |
Mutt | <=1.5.22 | |
Mutt | =1.5 | |
Mutt | =1.5.1 | |
Mutt | =1.5.2 | |
Mutt | =1.5.3 | |
Mutt | =1.5.4 | |
Mutt | =1.5.5 | |
Mutt | =1.5.6 | |
Mutt | =1.5.7 | |
Mutt | =1.5.8 | |
Mutt | =1.5.9 | |
Mutt | =1.5.10 | |
Mutt | =1.5.11 | |
Mutt | =1.5.12 | |
Mutt | =1.5.13 | |
Mutt | =1.5.14 | |
Mutt | =1.5.15 | |
Mutt | =1.5.16 | |
Mutt | =1.5.17 | |
Mutt | =1.5.18 | |
Mutt | =1.5.19 | |
Mutt | =1.5.20 | |
Mutt | =1.5.21 | |
SUSE Linux | =11.4 | |
SUSE Linux | =12.3 | |
SUSE Linux | =13.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0467 has been classified as a denial of service vulnerability due to a buffer overflow issue.
To fix CVE-2014-0467, upgrade your Mutt installation to version 1.5.23 or later.
Versions of Mutt prior to 1.5.23, including all versions up to and including 1.5.22, are affected by CVE-2014-0467.
Yes, CVE-2014-0467 can be exploited remotely through crafted RFC2047 header lines.
The potential consequences of CVE-2014-0467 include application crashes and denial of service for users of affected Mutt versions.