CVE-2014-9116

NameCVE-2014-9116
DescriptionThe write_one_header function in mutt 1.5.23 does not properly handle newline characters at the beginning of a header, which allows remote attackers to cause a denial of service (crash) via a header with an empty body, which triggers a heap-based buffer overflow in the mutt_substrdup function.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-100-1, DSA-3083-1
Debian Bugs771125

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
mutt (PTS)buster1.10.1-2.1+deb10u6fixed
buster (security)1.10.1-2.1+deb10u7fixed
bullseye (security), bullseye2.0.5-4.1+deb11u3fixed
bookworm2.2.12-0.1~deb12u1fixed
bookworm (security)2.2.9-1+deb12u1fixed
sid, trixie2.2.12-0.1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
muttsourcesqueeze1.5.20-9+squeeze4DLA-100-1
muttsourcewheezy1.5.21-6.2+deb7u3DSA-3083-1
muttsource(unstable)1.5.23-2771125

Notes

Detailed analysis in https://bugzilla.redhat.com/show_bug.cgi?id=1168463#c4
Upstream bugreport: http://dev.mutt.org/trac/ticket/3716

Search for package or bug name: Reporting problems