CVE-2014-9116

The write_one_header function in mutt 1.5.23 does not properly handle newline characters at the beginning of a header, which allows remote attackers to cause a denial of service (crash) via a header with an empty body, which triggers a heap-based buffer overflow in the mutt_substrdup function.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:N/I:N/A:P
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 82%
VendorProductVersion
muttmutt
1.5.23
debiandebian_linux
7.0
mageiamageia
4.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
mutt
bullseye (security)
2.0.5-4.1+deb11u3
fixed
bullseye
2.0.5-4.1+deb11u3
fixed
bookworm
2.2.12-0.1~deb12u1
fixed
bookworm (security)
2.2.9-1+deb12u1
fixed
sid
2.2.13-1
fixed
trixie
2.2.13-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
mutt
utopic
Fixed 1.5.23-1.1ubuntu0.2
released
trusty
Fixed 1.5.21-6.4ubuntu2.1
released
precise
Fixed 1.5.21-5ubuntu2.2
released
lucid
Fixed 1.5.20-7ubuntu1.3
released