{ "id": "CVE-2014-0467", "sourceIdentifier": "security@debian.org", "published": "2014-03-14T15:55:05.637", "lastModified": "2018-10-30T16:27:34.687", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", "value": "Buffer overflow in copy.c in Mutt before 1.5.23 allows remote attackers to cause a denial of service (crash) via a crafted RFC2047 header line, related to address expansion." }, { "lang": "es", "value": "Desbordamiento de buffer en copy.c en Mutt anterior a 1.5.23 permite a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda) a trav\u00e9s de una l\u00ednea de cabecera RFC2047 manipulada, relacionado con la expansi\u00f3n de direcci\u00f3n." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0 }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-119" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:mutt:mutt:*:*:*:*:*:*:*:*", "versionEndIncluding": "1.5.22", "matchCriteriaId": "FA6A52BC-0914-4D26-BB4B-FB81621582B8" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mutt:mutt:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "8C9BFED5-6D19-4B2E-8F1E-8262C908F1C6" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mutt:mutt:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "A6A82602-1948-47C8-8F55-58B2BC602DD5" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mutt:mutt:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "704F1CE0-6A42-42D9-A5EA-DA385D9C437A" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mutt:mutt:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "6AA1A4E0-9405-408C-B15B-D9FDB797081A" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mutt:mutt:1.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "A3FCC90B-E7EB-4467-90BE-6A75489DF719" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mutt:mutt:1.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "D55642D8-06F7-4274-ABF1-6EA9EC8E22BB" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mutt:mutt:1.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "E55271CE-1724-46F7-8E97-FD9D918ED4F4" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mutt:mutt:1.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "22ED4127-38FF-4271-A443-9C5ED0C9A5AB" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mutt:mutt:1.5.8:*:*:*:*:*:*:*", "matchCriteriaId": "2F8A1007-8993-4637-9DC6-2D1FF4216FC4" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mutt:mutt:1.5.9:*:*:*:*:*:*:*", "matchCriteriaId": "F4234D39-57E4-4C90-A1C2-23F08801CF74" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mutt:mutt:1.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "3E9C0F76-89D9-483A-8EF6-638C4B2FE1DB" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mutt:mutt:1.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "98E2B705-7739-4671-9D34-6644BA85FF03" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mutt:mutt:1.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "74C786A0-E910-4C49-B0CC-FAD26E7141D2" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mutt:mutt:1.5.13:*:*:*:*:*:*:*", "matchCriteriaId": "E70B1F82-CD76-4204-BBAD-56447CB759ED" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mutt:mutt:1.5.14:*:*:*:*:*:*:*", "matchCriteriaId": "0AC099BE-9FD3-4B1C-9DC8-2C3C553C617C" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mutt:mutt:1.5.15:*:*:*:*:*:*:*", "matchCriteriaId": "DBD01EFC-261E-4F3E-8A5A-FD2A53BF1A8A" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mutt:mutt:1.5.16:*:*:*:*:*:*:*", "matchCriteriaId": "2CD5E120-7D45-4B4F-A97F-69EF1A07C137" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mutt:mutt:1.5.17:*:*:*:*:*:*:*", "matchCriteriaId": "11DAD8B2-2DE4-43C0-B425-7F9D6E6BE40A" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mutt:mutt:1.5.18:*:*:*:*:*:*:*", "matchCriteriaId": "FFF70DC6-9B24-4E48-B917-11FF64F751F1" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mutt:mutt:1.5.19:*:*:*:*:*:*:*", "matchCriteriaId": "89C33B31-B9BC-4E43-8221-219380B4B682" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mutt:mutt:1.5.20:*:*:*:*:*:*:*", "matchCriteriaId": "591AA471-643C-49FB-8922-F91774946177" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mutt:mutt:1.5.21:*:*:*:*:*:*:*", "matchCriteriaId": "925C4B83-A399-4DF1-BCAE-45EEAF522371" } ] } ] }, { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*", "matchCriteriaId": "DE554781-1EB9-446E-911F-6C11970C47F4" }, { "vulnerable": true, "criteria": "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*", "matchCriteriaId": "DFBF430B-0832-44B0-AA0E-BA9E467F7668" }, { "vulnerable": true, "criteria": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "matchCriteriaId": "A10BC294-9196-425F-9FB0-B1625465B47F" } ] } ] } ], "references": [ { "url": "http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00001.html", "source": "security@debian.org" }, { "url": "http://lists.opensuse.org/opensuse-updates/2014-03/msg00083.html", "source": "security@debian.org" }, { "url": "http://lists.opensuse.org/opensuse-updates/2014-03/msg00085.html", "source": "security@debian.org" }, { "url": "http://rhn.redhat.com/errata/RHSA-2014-0304.html", "source": "security@debian.org" }, { "url": "http://www.debian.org/security/2014/dsa-2874", "source": "security@debian.org" }, { "url": "http://www.mutt.org/doc/devel/ChangeLog", "source": "security@debian.org" }, { "url": "http://www.securityfocus.com/bid/66165", "source": "security@debian.org" }, { "url": "http://www.securitytracker.com/id/1029919", "source": "security@debian.org" }, { "url": "http://www.ubuntu.com/usn/USN-2147-1", "source": "security@debian.org" } ] }