mutt is vulnerable to arbitrary code execution. A stack-based buffer overflow in the function imap_quote_string
in imap/util.c
allow an attacker to execute arbitrary code on the host OS via quote characters.
www.mutt.org/news.html
github.com/neomutt/neomutt/commit/e27b65b3bf8defa34db58919496056caf3850cd4
gitlab.com/muttmua/mutt/commit/e0131852c6059107939893016c8ff56b6e42865d
lists.debian.org/debian-lts-announce/2018/08/msg00001.html
neomutt.org/2018/07/16/release
security.gentoo.org/glsa/201810-07
usn.ubuntu.com/3719-1/
usn.ubuntu.com/3719-2/
usn.ubuntu.com/3719-3/
www.debian.org/security/2018/dsa-4277