CVE-2014-0467

Buffer overflow in copy.c in Mutt before 1.5.23 allows remote attackers to cause a denial of service (crash) via a crafted RFC2047 header line, related to address expansion.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:N/I:N/A:P
debianCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 81%
VendorProductVersion
muttmutt
𝑥
≤ 1.5.22
muttmutt
1.5
muttmutt
1.5.1
muttmutt
1.5.2
muttmutt
1.5.3
muttmutt
1.5.4
muttmutt
1.5.5
muttmutt
1.5.6
muttmutt
1.5.7
muttmutt
1.5.8
muttmutt
1.5.9
muttmutt
1.5.10
muttmutt
1.5.11
muttmutt
1.5.12
muttmutt
1.5.13
muttmutt
1.5.14
muttmutt
1.5.15
muttmutt
1.5.16
muttmutt
1.5.17
muttmutt
1.5.18
muttmutt
1.5.19
muttmutt
1.5.20
muttmutt
1.5.21
opensuseopensuse
11.4
opensuseopensuse
12.3
opensuseopensuse
13.1
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
mutt
bullseye (security)
2.0.5-4.1+deb11u3
fixed
bullseye
2.0.5-4.1+deb11u3
fixed
bookworm
2.2.12-0.1~deb12u1
fixed
bookworm (security)
2.2.9-1+deb12u1
fixed
sid
2.2.13-1
fixed
trixie
2.2.13-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
mutt
saucy
Fixed 1.5.21-6.4ubuntu1.1
released
quantal
Fixed 1.5.21-6ubuntu0.1
released
precise
Fixed 1.5.21-5ubuntu2.1
released
lucid
Fixed 1.5.20-7ubuntu1.2
released