First published: Wed Nov 26 2014(Updated: )
A heap-based buffer overflow flaw was reported in the mutt_substrdup() function in Mutt. Opening a specially-crafted mail message could cause mutt to crash or, potentially, execute arbitrary code. CVE request: <a href="http://www.openwall.com/lists/oss-security/2014/11/27/5">http://www.openwall.com/lists/oss-security/2014/11/27/5</a> In testing on Fedora, "set weed=no" had to be set in the user's .muttrc before the issue presented.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/mutt | <=1.5.23-1.1<=1.5.21-6.2+deb7u2 | 1.5.23-2 1.5.20-9+squeeze4 1.5.21-6.2+deb7u3 |
SUSE Linux Enterprise Desktop | =12 | |
SUSE SUSE Linux Enterprise Server | =12 | |
Mutt Mutt | =1.5.23 | |
Debian Debian Linux | =7.0 | |
Mageia Mageia | =4.0 | |
debian/mutt | 2.0.5-4.1+deb11u3 2.2.12-0.1~deb12u1 2.2.9-1+deb12u1 2.2.13-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.