CVE-2014-9116

NameCVE-2014-9116
DescriptionThe write_one_header function in mutt 1.5.23 does not properly handle newline characters at the beginning of a header, which allows remote attackers to cause a denial of service (crash) via a header with an empty body, which triggers a heap-based buffer overflow in the mutt_substrdup function.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-100-1, DSA-3083-1
NVD severitymedium
Debian Bugs771125

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
mutt (PTS)stretch1.7.2-1+deb9u3fixed
stretch (security)1.7.2-1+deb9u5fixed
buster, buster (security)1.10.1-2.1+deb10u5fixed
bullseye2.0.5-1fixed
sid2.0.5-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
muttsourcesqueeze1.5.20-9+squeeze4DLA-100-1
muttsourcewheezy1.5.21-6.2+deb7u3DSA-3083-1
muttsource(unstable)1.5.23-2771125

Notes

Detailed analysis in https://bugzilla.redhat.com/show_bug.cgi?id=1168463#c4
Upstream bugreport: http://dev.mutt.org/trac/ticket/3716

Search for package or bug name: Reporting problems