CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
AI Score
Confidence
High
EPSS
Percentile
86.8%
The write_one_header function in mutt 1.5.23 does not properly handle newline characters at the beginning of a header, which allows remote attackers to cause a denial of service (crash) via a header with an empty body, which triggers a heap-based buffer overflow in the mutt_substrdup function.
Vendor | Product | Version | CPE |
---|---|---|---|
suse | linux_enterprise_desktop | 12 | cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:* |
suse | suse_linux_enterprise_server | 12 | cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:* |
mutt | mutt | 1.5.23 | cpe:2.3:a:mutt:mutt:1.5.23:*:*:*:*:*:*:* |
debian | debian_linux | 7.0 | cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:* |
mageia | mageia | 4.0 | cpe:2.3:o:mageia:mageia:4.0:*:*:*:*:*:*:* |
advisories.mageia.org/MGASA-2014-0509.html
dev.mutt.org/trac/ticket/3716
lists.opensuse.org/opensuse-security-announce/2015-01/msg00002.html
www.debian.org/security/2014/dsa-3083
www.mandriva.com/security/advisories?name=MDVSA-2014:245
www.mandriva.com/security/advisories?name=MDVSA-2015:078
www.openwall.com/lists/oss-security/2014/11/27/5
www.openwall.com/lists/oss-security/2014/11/27/9
www.securityfocus.com/bid/71334
www.securitytracker.com/id/1031266
bugs.debian.org/cgi-bin/bugreport.cgi?bug=771125
bugzilla.redhat.com/show_bug.cgi?id=1168463
security.gentoo.org/glsa/201701-04