First published: Wed Nov 26 2014(Updated: )
A heap-based buffer overflow flaw was reported in the mutt_substrdup() function in Mutt. Opening a specially-crafted mail message could cause mutt to crash or, potentially, execute arbitrary code. CVE request: <a href="http://www.openwall.com/lists/oss-security/2014/11/27/5">http://www.openwall.com/lists/oss-security/2014/11/27/5</a> In testing on Fedora, "set weed=no" had to be set in the user's .muttrc before the issue presented.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/mutt | <=1.5.23-1.1<=1.5.21-6.2+deb7u2 | 1.5.23-2 1.5.20-9+squeeze4 1.5.21-6.2+deb7u3 |
debian/mutt | 2.0.5-4.1+deb11u3 2.2.12-0.1~deb12u1 2.2.9-1+deb12u1 2.2.13-1 | |
SUSE Linux Enterprise Desktop with Beagle | =12 | |
SUSE Linux Enterprise Server | =12 | |
Mutt Mutt | =1.5.23 | |
Debian GNU/Linux | =7.0 | |
Mageia | =4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-9116 has a high severity rating due to the potential for arbitrary code execution and crashes.
To fix CVE-2014-9116, users should upgrade their Mutt package to a version that is not vulnerable, specifically versions 1.5.23-2 or later.
CVE-2014-9116 affects specific versions of the Mutt email client across various Linux distributions such as Debian and SUSE.
CVE-2014-9116 is classified as a heap-based buffer overflow vulnerability.
While CVE-2014-9116 primarily allows for arbitrary code execution, it could potentially lead to data loss depending on the executed code.