CVE-2014-0467

EUVD-2014-0505
Buffer overflow in copy.c in Mutt before 1.5.23 allows remote attackers to cause a denial of service (crash) via a crafted RFC2047 header line, related to address expansion.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
5 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:N/I:N/A:P
Base Score
CVSS 3.x
EPSS Score
Percentile: 82%
Affected Products (NVD)
VendorProductVersion
muttmutt
𝑥
≤ 1.5.22
muttmutt
1.5
muttmutt
1.5.1
muttmutt
1.5.2
muttmutt
1.5.3
muttmutt
1.5.4
muttmutt
1.5.5
muttmutt
1.5.6
muttmutt
1.5.7
muttmutt
1.5.8
muttmutt
1.5.9
muttmutt
1.5.10
muttmutt
1.5.11
muttmutt
1.5.12
muttmutt
1.5.13
muttmutt
1.5.14
muttmutt
1.5.15
muttmutt
1.5.16
muttmutt
1.5.17
muttmutt
1.5.18
muttmutt
1.5.19
muttmutt
1.5.20
muttmutt
1.5.21
opensuseopensuse
11.4
opensuseopensuse
12.3
opensuseopensuse
13.1
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
mutt
bookworm
2.2.12-0.1~deb12u1
fixed
bookworm (security)
2.2.9-1+deb12u1
fixed
bullseye
2.0.5-4.1+deb11u3
fixed
bullseye (security)
2.0.5-4.1+deb11u3
fixed
sid
2.2.13-1
fixed
trixie
2.2.13-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
mutt
lucid
Fixed 1.5.20-7ubuntu1.2
released
precise
Fixed 1.5.21-5ubuntu2.1
released
quantal
Fixed 1.5.21-6ubuntu0.1
released
saucy
Fixed 1.5.21-6.4ubuntu1.1
released