7.9 High
AI Score
Confidence
Low
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
0.039 Low
EPSS
Percentile
91.9%
Beatrice Torracca and Evgeni Golov discovered a buffer overflow
in mutt while expanding addresses when parsing email headers. An
attacker could specially craft an email to cause mutt to crash,
resulting in a denial of service, or possibly execute arbitrary code
with the privileges of the user invoking mutt.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 13.10 | noarch | mutt-patched | <Β 1.5.21-6.4ubuntu1.1 | UNKNOWN |
Ubuntu | 13.10 | noarch | mutt | <Β 1.5.21-6.4ubuntu1.1 | UNKNOWN |
Ubuntu | 13.10 | noarch | mutt-dbg | <Β 1.5.21-6.4ubuntu1.1 | UNKNOWN |
Ubuntu | 12.10 | noarch | mutt-patched | <Β 1.5.21-6ubuntu0.1 | UNKNOWN |
Ubuntu | 12.10 | noarch | mutt | <Β 1.5.21-6ubuntu0.1 | UNKNOWN |
Ubuntu | 12.10 | noarch | mutt-dbg | <Β 1.5.21-6ubuntu0.1 | UNKNOWN |
Ubuntu | 12.04 | noarch | mutt-patched | <Β 1.5.21-5ubuntu2.1 | UNKNOWN |
Ubuntu | 12.04 | noarch | mutt | <Β 1.5.21-5ubuntu2.1 | UNKNOWN |
Ubuntu | 12.04 | noarch | mutt-dbg | <Β 1.5.21-5ubuntu2.1 | UNKNOWN |
Ubuntu | 10.04 | noarch | mutt-patched | <Β 1.5.20-7ubuntu1.2 | UNKNOWN |