CVE-2003-0140

Buffer overflow in Mutt 1.4.0 and possibly earlier versions, 1.5.x up to 1.5.3, and other programs that use Mutt code such as Balsa before 2.0.10, allows a remote malicious IMAP server to cause a denial of service (crash) and possibly execute arbitrary code via a crafted folder.
References
Link Resource
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000626
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000630
http://marc.info/?l=bugtraq&m=104817995421439&w=2
http://marc.info/?l=bugtraq&m=104818814931378&w=2
http://marc.info/?l=bugtraq&m=104852190605988&w=2
http://marc.info/?l=bugtraq&m=105171507629573&w=2
http://www.coresecurity.com/common/showdoc.php?idx=310&idxseccion=10
http://www.debian.org/security/2003/dsa-268
http://www.gentoo.org/security/en/glsa/glsa-200303-19.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2003:041
http://www.novell.com/linux/security/advisories/2003_020_mutt.html
http://www.redhat.com/support/errata/RHSA-2003-109.html
http://www.securityfocus.com/archive/1/315679 Vendor Advisory
http://www.securityfocus.com/bid/7120 Patch Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/11583
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A434
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000626
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000630
http://marc.info/?l=bugtraq&m=104817995421439&w=2
http://marc.info/?l=bugtraq&m=104818814931378&w=2
http://marc.info/?l=bugtraq&m=104852190605988&w=2
http://marc.info/?l=bugtraq&m=105171507629573&w=2
http://www.coresecurity.com/common/showdoc.php?idx=310&idxseccion=10
http://www.debian.org/security/2003/dsa-268
http://www.gentoo.org/security/en/glsa/glsa-200303-19.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2003:041
http://www.novell.com/linux/security/advisories/2003_020_mutt.html
http://www.redhat.com/support/errata/RHSA-2003-109.html
http://www.securityfocus.com/archive/1/315679 Vendor Advisory
http://www.securityfocus.com/bid/7120 Patch Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/11583
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A434
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mutt:mutt:1.3.12:*:*:*:*:*:*:*
cpe:2.3:a:mutt:mutt:1.3.16:*:*:*:*:*:*:*
cpe:2.3:a:mutt:mutt:1.3.17:*:*:*:*:*:*:*
cpe:2.3:a:mutt:mutt:1.3.22:*:*:*:*:*:*:*
cpe:2.3:a:mutt:mutt:1.3.24:*:*:*:*:*:*:*
cpe:2.3:a:mutt:mutt:1.3.25:*:*:*:*:*:*:*
cpe:2.3:a:mutt:mutt:1.3.27:*:*:*:*:*:*:*
cpe:2.3:a:mutt:mutt:1.4.0:*:*:*:*:*:*:*
cpe:2.3:a:mutt:mutt:1.5.3:*:*:*:*:*:*:*

History

20 Nov 2024, 23:44

Type Values Removed Values Added
References () http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000626 - () http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000626 -
References () http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000630 - () http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000630 -
References () http://marc.info/?l=bugtraq&m=104817995421439&w=2 - () http://marc.info/?l=bugtraq&m=104817995421439&w=2 -
References () http://marc.info/?l=bugtraq&m=104818814931378&w=2 - () http://marc.info/?l=bugtraq&m=104818814931378&w=2 -
References () http://marc.info/?l=bugtraq&m=104852190605988&w=2 - () http://marc.info/?l=bugtraq&m=104852190605988&w=2 -
References () http://marc.info/?l=bugtraq&m=105171507629573&w=2 - () http://marc.info/?l=bugtraq&m=105171507629573&w=2 -
References () http://www.coresecurity.com/common/showdoc.php?idx=310&idxseccion=10 - () http://www.coresecurity.com/common/showdoc.php?idx=310&idxseccion=10 -
References () http://www.debian.org/security/2003/dsa-268 - () http://www.debian.org/security/2003/dsa-268 -
References () http://www.gentoo.org/security/en/glsa/glsa-200303-19.xml - () http://www.gentoo.org/security/en/glsa/glsa-200303-19.xml -
References () http://www.mandriva.com/security/advisories?name=MDKSA-2003:041 - () http://www.mandriva.com/security/advisories?name=MDKSA-2003:041 -
References () http://www.novell.com/linux/security/advisories/2003_020_mutt.html - () http://www.novell.com/linux/security/advisories/2003_020_mutt.html -
References () http://www.redhat.com/support/errata/RHSA-2003-109.html - () http://www.redhat.com/support/errata/RHSA-2003-109.html -
References () http://www.securityfocus.com/archive/1/315679 - Vendor Advisory () http://www.securityfocus.com/archive/1/315679 - Vendor Advisory
References () http://www.securityfocus.com/bid/7120 - Patch, Vendor Advisory () http://www.securityfocus.com/bid/7120 - Patch, Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/11583 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/11583 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A434 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A434 -

Information

Published : 2003-03-24 05:00

Updated : 2024-11-20 23:44


NVD link : CVE-2003-0140

Mitre link : CVE-2003-0140

CVE.ORG link : CVE-2003-0140


JSON object : View

Products Affected

mutt

  • mutt