First published: Tue Jul 17 2018(Updated: )
An issue was discovered in NeoMutt before 2018-07-16. nntp_add_group in newsrc.c has a stack-based buffer overflow because of incorrect sscanf usage.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Neomutt Neomutt | <20180716 | |
debian/mutt | 1.10.1-2.1+deb10u6 1.10.1-2.1+deb10u7 2.0.5-4.1+deb11u3 2.2.12-0.1~deb12u1 2.2.9-1+deb12u1 2.2.12-0.1 | |
debian/neomutt | 20180716+dfsg.1-1+deb10u2 20180716+dfsg.1-1+deb10u1 20201127+dfsg.1-1.2 20220429+dfsg1-4.1 20231103+dfsg1-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-14360 is critical with a score of 9.8.
The affected software for CVE-2018-14360 is NeoMutt versions up to exclusive 20180716 and Debian Linux versions 8.0 and 9.0.
To fix CVE-2018-14360 in NeoMutt, update to version 20180716 or later.
To fix CVE-2018-14360 in Debian Linux, update to version 1.10.1-2.1+deb10u6 or later for Debian 10, and update to version 2.0.5-4.1+deb11u3 or later for Debian 11.
You can find more information about CVE-2018-14360 in the following references: [link1], [link2], [link3].