First published: Tue Jul 17 2018(Updated: )
An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap_quote_string in imap/util.c does not leave room for quote characters, leading to a stack-based buffer overflow.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/mutt | 2.0.5-4.1+deb11u3 2.2.12-0.1~deb12u1 2.2.9-1+deb12u1 2.2.13-1 | |
debian/neomutt | 20201127+dfsg.1-1.2 20220429+dfsg1-4.1 20250113+dfsg-1 | |
Mutt | <1.10.1 | |
NeoMutt | <20180716 | |
Ubuntu Linux Kernel | =12.04 | |
Ubuntu Linux Kernel | =14.04 | |
Ubuntu Linux Kernel | =16.04 | |
Ubuntu Linux Kernel | =18.04 | |
Debian | =8.0 | |
Debian | =9.0 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-14352 is critical, with a severity value of 9.8.
The affected software versions of CVE-2018-14352 are Mutt versions before 1.10.1 and NeoMutt versions before 2018-07-16.
CVE-2018-14352 allows an attacker to execute arbitrary code or cause a denial-of-service condition through a stack-based buffer overflow in Mutt and NeoMutt.
To fix CVE-2018-14352, you should update Mutt to version 1.10.1 or later, and NeoMutt to version 2018-07-16 or later.
You can find more information about CVE-2018-14352 on the Mutt website and the GitHub and GitLab repositories for Mutt and NeoMutt.