Debian Mutt vulnerabilities

44 known vulnerabilities affecting debian/mutt.

Total CVEs
44
CISA KEV
0
Public exploits
1
Exploited in wild
0
Severity breakdown
CRITICAL14HIGH4MEDIUM10LOW16

Vulnerabilities

Page 2 of 3
CVE-2018-14354CRITICALCVSS 9.8fixed in mutt 1.10.1-1 (bookworm)2018
CVE-2018-14354 [CRITICAL] CVE-2018-14354: mutt - An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. The... An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. They allow remote IMAP servers to execute arbitrary commands via backquote characters, related to the mailboxes command associated with a manual subscription or unsubscription. Scope: local bookworm: resolved (fixed in 1.10.1-1) bullseye: resolved (fixed in 1.10.1-1) forky: resolved (fixed
debian
CVE-2018-14361CRITICALCVSS 9.8fixed in mutt 1.9.1-1 (bookworm)2018
CVE-2018-14361 [CRITICAL] CVE-2018-14361: mutt - An issue was discovered in NeoMutt before 2018-07-16. nntp.c proceeds even if me... An issue was discovered in NeoMutt before 2018-07-16. nntp.c proceeds even if memory allocation fails for messages data. Scope: local bookworm: resolved (fixed in 1.9.1-1) bullseye: resolved (fixed in 1.9.1-1) forky: resolved (fixed in 1.9.1-1) sid: resolved (fixed in 1.9.1-1) trixie: resolved (fixed in 1.9.1-1)
debian
CVE-2018-14360CRITICALCVSS 9.8fixed in mutt 1.9.1-1 (bookworm)2018
CVE-2018-14360 [CRITICAL] CVE-2018-14360: mutt - An issue was discovered in NeoMutt before 2018-07-16. nntp_add_group in newsrc.c... An issue was discovered in NeoMutt before 2018-07-16. nntp_add_group in newsrc.c has a stack-based buffer overflow because of incorrect sscanf usage. Scope: local bookworm: resolved (fixed in 1.9.1-1) bullseye: resolved (fixed in 1.9.1-1) forky: resolved (fixed in 1.9.1-1) sid: resolved (fixed in 1.9.1-1) trixie: resolved (fixed in 1.9.1-1)
debian
CVE-2018-14358CRITICALCVSS 9.8fixed in mutt 1.10.1-1 (bookworm)2018
CVE-2018-14358 [CRITICAL] CVE-2018-14358: mutt - An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. ima... An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/message.c has a stack-based buffer overflow for a FETCH response with a long RFC822.SIZE field. Scope: local bookworm: resolved (fixed in 1.10.1-1) bullseye: resolved (fixed in 1.10.1-1) forky: resolved (fixed in 1.10.1-1) sid: resolved (fixed in 1.10.1-1) trixie: resolved (fixed in 1
debian
CVE-2018-14362CRITICALCVSS 9.8fixed in mutt 1.10.1-1 (bookworm)2018
CVE-2018-14362 [CRITICAL] CVE-2018-14362: mutt - An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. pop... An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. pop.c does not forbid characters that may have unsafe interaction with message-cache pathnames, as demonstrated by a '/' character. Scope: local bookworm: resolved (fixed in 1.10.1-1) bullseye: resolved (fixed in 1.10.1-1) forky: resolved (fixed in 1.10.1-1) sid: resolved (fixed in 1.10.1-
debian
CVE-2018-14363HIGHCVSS 7.5fixed in mutt 1.9.1-1 (bookworm)2018
CVE-2018-14363 [HIGH] CVE-2018-14363: mutt - An issue was discovered in NeoMutt before 2018-07-16. newsrc.c does not properly... An issue was discovered in NeoMutt before 2018-07-16. newsrc.c does not properly restrict '/' characters that may have unsafe interaction with cache pathnames. Scope: local bookworm: resolved (fixed in 1.9.1-1) bullseye: resolved (fixed in 1.9.1-1) forky: resolved (fixed in 1.9.1-1) sid: resolved (fixed in 1.9.1-1) trixie: resolved (fixed in 1.9.1-1)
debian
CVE-2018-14355MEDIUMCVSS 5.3fixed in mutt 1.10.1-1 (bookworm)2018
CVE-2018-14355 [MEDIUM] CVE-2018-14355: mutt - An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. ima... An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/util.c mishandles ".." directory traversal in a mailbox name. Scope: local bookworm: resolved (fixed in 1.10.1-1) bullseye: resolved (fixed in 1.10.1-1) forky: resolved (fixed in 1.10.1-1) sid: resolved (fixed in 1.10.1-1) trixie: resolved (fixed in 1.10.1-1)
debian
CVE-2014-9116MEDIUMCVSS 5.0fixed in mutt 1.5.23-2 (bookworm)2014
CVE-2014-9116 [MEDIUM] CVE-2014-9116: mutt - The write_one_header function in mutt 1.5.23 does not properly handle newline ch... The write_one_header function in mutt 1.5.23 does not properly handle newline characters at the beginning of a header, which allows remote attackers to cause a denial of service (crash) via a header with an empty body, which triggers a heap-based buffer overflow in the mutt_substrdup function. Scope: local bookworm: resolved (fixed in 1.5.23-2) bullseye: resolved (fixe
debian
CVE-2014-0467MEDIUMCVSS 5.0fixed in mutt 1.5.22-2 (bookworm)2014
CVE-2014-0467 [MEDIUM] CVE-2014-0467: mutt - Buffer overflow in copy.c in Mutt before 1.5.23 allows remote attackers to cause... Buffer overflow in copy.c in Mutt before 1.5.23 allows remote attackers to cause a denial of service (crash) via a crafted RFC2047 header line, related to address expansion. Scope: local bookworm: resolved (fixed in 1.5.22-2) bullseye: resolved (fixed in 1.5.22-2) forky: resolved (fixed in 1.5.22-2) sid: resolved (fixed in 1.5.22-2) trixie: resolved (fixed in 1.5.22-2)
debian
CVE-2011-1429LOWCVSS 6.8fixed in mutt 1.5.21-5 (bookworm)2011
CVE-2011-1429 [MEDIUM] CVE-2011-1429: mutt - Mutt does not verify that the smtps server hostname matches the domain name of t... Mutt does not verify that the smtps server hostname matches the domain name of the subject of an X.509 certificate, which allows man-in-the-middle attackers to spoof an SSL SMTP server via an arbitrary certificate, a different vulnerability than CVE-2009-3766. Scope: local bookworm: resolved (fixed in 1.5.21-5) bullseye: resolved (fixed in 1.5.21-5) forky: resolved (fi
debian
CVE-2009-1390MEDIUMCVSS 6.8fixed in mutt 1.5.20-1 (bookworm)2009
CVE-2009-1390 [MEDIUM] CVE-2009-1390: mutt - Mutt 1.5.19, when linked against (1) OpenSSL (mutt_ssl.c) or (2) GnuTLS (mutt_ss... Mutt 1.5.19, when linked against (1) OpenSSL (mutt_ssl.c) or (2) GnuTLS (mutt_ssl_gnutls.c), allows connections when only one TLS certificate in the chain is accepted instead of verifying the entire chain, which allows remote attackers to spoof trusted servers via a man-in-the-middle attack. Scope: local bookworm: resolved (fixed in 1.5.20-1) bullseye: resolved (fixed
debian
CVE-2009-3766LOWCVSS 6.82009
CVE-2009-3766 [MEDIUM] CVE-2009-3766: mutt - mutt_ssl.c in mutt 1.5.16 and other versions before 1.5.19, when OpenSSL is used... mutt_ssl.c in mutt 1.5.16 and other versions before 1.5.19, when OpenSSL is used, does not verify the domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate. Scope: local bookworm: resolved bullseye: resolved forky: resolved sid: resolved trixie: resol
debian
CVE-2009-3765LOWCVSS 5.92009
CVE-2009-3765 [MEDIUM] CVE-2009-3765: mutt - mutt_ssl.c in mutt 1.5.19 and 1.5.20, when OpenSSL is used, does not properly ha... mutt_ssl.c in mutt 1.5.19 and 1.5.20, when OpenSSL is used, does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408. Scope:
debian
CVE-2007-1268LOWCVSS 5.02007
CVE-2007-1268 [MEDIUM] CVE-2007-1268: mutt - Mutt 1.5.13 and earlier does not properly use the --status-fd argument when invo... Mutt 1.5.13 and earlier does not properly use the --status-fd argument when invoking GnuPG, which prevents Mutt from visually distinguishing between signed and unsigned portions of OpenPGP messages with multiple components, which allows remote attackers to forge the contents of a message without detection. Scope: local bookworm: open bullseye: open forky: open sid: ope
debian
CVE-2007-2683LOWCVSS 3.5PoCfixed in mutt 1.5.15+20070608-1 (bookworm)2007
CVE-2007-2683 [LOW] CVE-2007-2683: mutt - Buffer overflow in Mutt 1.4.2 might allow local users to execute arbitrary code ... Buffer overflow in Mutt 1.4.2 might allow local users to execute arbitrary code via "&" characters in the GECOS field, which triggers the overflow during alias expansion. Scope: local bookworm: resolved (fixed in 1.5.15+20070608-1) bullseye: resolved (fixed in 1.5.15+20070608-1) forky: resolved (fixed in 1.5.15+20070608-1) sid: resolved (fixed in 1.5.15+20070608-1) trixie
debian
CVE-2007-1558LOWCVSS 2.6fixed in balsa 2.3.17-1 (bookworm)2007
CVE-2007-1558 [LOW] CVE-2007-1558: balsa - The APOP protocol allows remote attackers to guess the first 3 characters of a p... The APOP protocol allows remote attackers to guess the first 3 characters of a password via man-in-the-middle (MITM) attacks that use crafted message IDs and MD5 collisions. NOTE: this design-level issue potentially affects all products that use APOP, including (1) Thunderbird 1.x before 1.5.0.12 and 2.x before 2.0.0.4, (2) Evolution, (3) mutt, (4) fetchmail before 6.3.8
debian
CVE-2006-3242LOWCVSS 7.5fixed in mutt 1.5.11+cvs20060403-2 (bookworm)2006
CVE-2006-3242 [HIGH] CVE-2006-3242: mutt - Stack-based buffer overflow in the browse_get_namespace function in imap/browse.... Stack-based buffer overflow in the browse_get_namespace function in imap/browse.c of Mutt 1.4.2.1 and earlier allows remote attackers to cause a denial of service (crash) or execute arbitrary code via long namespaces received from the IMAP server. Scope: local bookworm: resolved (fixed in 1.5.11+cvs20060403-2) bullseye: resolved (fixed in 1.5.11+cvs20060403-2) forky: res
debian
CVE-2006-5298LOWCVSS 1.2fixed in mutt 1.5.13-1.1 (bookworm)2006
CVE-2006-5298 [LOW] CVE-2006-5298: mutt - The mutt_adv_mktemp function in the Mutt mail client 1.5.12 and earlier does not... The mutt_adv_mktemp function in the Mutt mail client 1.5.12 and earlier does not properly verify that temporary files have been created with restricted permissions, which might allow local users to create files with weak permissions via a race condition between the mktemp and safe_fopen function calls. Scope: local bookworm: resolved (fixed in 1.5.13-1.1) bullseye: resolv
debian
CVE-2006-5297LOWCVSS 1.2fixed in mutt 1.5.13-1.1 (bookworm)2006
CVE-2006-5297 [LOW] CVE-2006-5297: mutt - Race condition in the safe_open function in the Mutt mail client 1.5.12 and earl... Race condition in the safe_open function in the Mutt mail client 1.5.12 and earlier, when creating temporary files in an NFS filesystem, allows local users to overwrite arbitrary files due to limitations of the use of the O_EXCL flag on NFS filesystems. Scope: local bookworm: resolved (fixed in 1.5.13-1.1) bullseye: resolved (fixed in 1.5.13-1.1) forky: resolved (fixed in
debian
CVE-2005-2642LOWCVSS 7.52005
CVE-2005-2642 [HIGH] CVE-2005-2642: mutt - Buffer overflow in the mutt_decode_xbit function in Handler.c for Mutt 1.5.10 al... Buffer overflow in the mutt_decode_xbit function in Handler.c for Mutt 1.5.10 allows remote attackers to execute arbitrary code, possibly due to interactions with libiconv or gettext. Scope: local bookworm: resolved bullseye: resolved forky: resolved sid: resolved trixie: resolved
debian