Lucene search

K
ubuntuUbuntuUSN-2147-1
HistoryMar 13, 2014 - 12:00 a.m.

Mutt vulnerability

2014-03-1300:00:00
ubuntu.com
31

7.9 High

AI Score

Confidence

Low

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.039 Low

EPSS

Percentile

91.9%

Releases

  • Ubuntu 13.10
  • Ubuntu 12.10
  • Ubuntu 12.04
  • Ubuntu 10.04

Packages

  • mutt - text-based mailreader supporting MIME, GPG, PGP and threading

Details

Beatrice Torracca and Evgeni Golov discovered a buffer overflow
in mutt while expanding addresses when parsing email headers. An
attacker could specially craft an email to cause mutt to crash,
resulting in a denial of service, or possibly execute arbitrary code
with the privileges of the user invoking mutt.

OSVersionArchitecturePackageVersionFilename
Ubuntu13.10noarchmutt-patched<Β 1.5.21-6.4ubuntu1.1UNKNOWN
Ubuntu13.10noarchmutt<Β 1.5.21-6.4ubuntu1.1UNKNOWN
Ubuntu13.10noarchmutt-dbg<Β 1.5.21-6.4ubuntu1.1UNKNOWN
Ubuntu12.10noarchmutt-patched<Β 1.5.21-6ubuntu0.1UNKNOWN
Ubuntu12.10noarchmutt<Β 1.5.21-6ubuntu0.1UNKNOWN
Ubuntu12.10noarchmutt-dbg<Β 1.5.21-6ubuntu0.1UNKNOWN
Ubuntu12.04noarchmutt-patched<Β 1.5.21-5ubuntu2.1UNKNOWN
Ubuntu12.04noarchmutt<Β 1.5.21-5ubuntu2.1UNKNOWN
Ubuntu12.04noarchmutt-dbg<Β 1.5.21-5ubuntu2.1UNKNOWN
Ubuntu10.04noarchmutt-patched<Β 1.5.20-7ubuntu1.2UNKNOWN
Rows per page:
1-10 of 121

7.9 High

AI Score

Confidence

Low

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.039 Low

EPSS

Percentile

91.9%