First published: Thu Nov 27 2014(Updated: )
A heap-based buffer overflow flaw was reported in the mutt_substrdup() function in Mutt. Opening a specially-crafted mail message could cause mutt to crash or, potentially, execute arbitrary code. CVE request: <a href="http://www.openwall.com/lists/oss-security/2014/11/27/5">http://www.openwall.com/lists/oss-security/2014/11/27/5</a> In testing on Fedora, "set weed=no" had to be set in the user's .muttrc before the issue presented.
Affected Software | Affected Version | How to fix |
---|---|---|
Mutt |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1168463 is classified as high due to the potential for arbitrary code execution.
To fix REDHAT-BUG-1168463, update Mutt to the latest version that addresses the heap-based buffer overflow flaw.
The impact of REDHAT-BUG-1168463 on Mutt users includes the risk of the application crashing or the possibility of arbitrary code execution when opening crafted email messages.
Versions of Mutt prior to the security update addressing REDHAT-BUG-1168463 may be affected by this vulnerability.
REDHAT-BUG-1168463 is a heap-based buffer overflow vulnerability in the mutt_substrdup() function.