CVE-2014-9116

NameCVE-2014-9116
DescriptionThe write_one_header function in mutt 1.5.23 does not properly handle newline characters at the beginning of a header, which allows remote attackers to cause a denial of service (crash) via a header with an empty body, which triggers a heap-based buffer overflow in the mutt_substrdup function.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-100-1, DSA-3083-1
NVD severitymedium (attack range: remote)
Debian Bugs771125

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
mutt (PTS)wheezy, wheezy (security)1.5.21-6.2+deb7u3fixed
jessie1.5.23-3fixed
stretch1.7.2-1fixed
buster1.9.1-5fixed
sid1.9.2-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
muttsource(unstable)1.5.23-2medium771125
muttsourcesqueeze1.5.20-9+squeeze4mediumDLA-100-1
muttsourcewheezy1.5.21-6.2+deb7u3mediumDSA-3083-1

Notes

Detailed analysis in https://bugzilla.redhat.com/show_bug.cgi?id=1168463#c4
Upstream bugreport: http://dev.mutt.org/trac/ticket/3716

Search for package or bug name: Reporting problems