The write_one_header function in mutt 1.5.23 does not properly handle newline characters at the beginning of a header, which allows remote attackers to cause a denial of service (crash) via a header with an empty body, which triggers a heap-based buffer overflow in the mutt_substrdup function.
advisories.mageia.org/MGASA-2014-0509.html
dev.mutt.org/trac/ticket/3716
lists.opensuse.org/opensuse-security-announce/2015-01/msg00002.html
www.debian.org/security/2014/dsa-3083
www.mandriva.com/security/advisories?name=MDVSA-2014:245
www.mandriva.com/security/advisories?name=MDVSA-2015:078
www.openwall.com/lists/oss-security/2014/11/27/5
www.openwall.com/lists/oss-security/2014/11/27/9
www.securityfocus.com/bid/71334
www.securitytracker.com/id/1031266
bugs.debian.org/cgi-bin/bugreport.cgi?bug=771125
bugzilla.redhat.com/show_bug.cgi?id=1168463
security.gentoo.org/glsa/201701-04