First published: Tue Jul 17 2018(Updated: )
An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. They have a buffer overflow via base64 data.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mutt Mutt | <1.10.1 | |
Neomutt Neomutt | <20180716 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
debian/mutt | 2.0.5-4.1+deb11u3 2.2.12-0.1~deb12u1 2.2.9-1+deb12u1 2.2.13-1 | |
debian/neomutt | 20201127+dfsg.1-1.2 20220429+dfsg1-4.1 20241002+dfsg-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2018-14359.
The severity level of CVE-2018-14359 is critical with a severity value of 9.8.
The affected software for CVE-2018-14359 includes Mutt before version 1.10.1 and NeoMutt before version 2018-07-16.
To fix CVE-2018-14359, you should update Mutt to version 1.10.1 or higher, or update NeoMutt to version 2018-07-16 or higher.
You can find more information about CVE-2018-14359 at the following references: [http://www.mutt.org/news.html](http://www.mutt.org/news.html), [https://github.com/neomutt/neomutt/commit/6f163e07ae68654d7ac5268cbb7565f6df79ad85](https://github.com/neomutt/neomutt/commit/6f163e07ae68654d7ac5268cbb7565f6df79ad85), [https://gitlab.com/muttmua/mutt/commit/3d9028fec8f4d08db2251096307c0bbbebce669a](https://gitlab.com/muttmua/mutt/commit/3d9028fec8f4d08db2251096307c0bbbebce669a).