CVE-2004-0078

Buffer overflow in the index menu code (menu_pad_string of menu.c) for Mutt 1.4.1 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via certain mail messages.
References
Link Resource
ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2004-013.0.txt
http://bugs.debian.org/126336
http://marc.info/?l=bugtraq&m=107651677817933&w=2
http://marc.info/?l=bugtraq&m=107696262905039&w=2
http://marc.info/?l=bugtraq&m=107884956930903&w=2
http://www.mandrakesoft.com/security/advisories?name=MDKSA-2004:010
http://www.osvdb.org/3918
http://www.redhat.com/support/errata/RHSA-2004-050.html Patch Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2004-051.html Patch Vendor Advisory
http://www.securityfocus.com/bid/9641 Patch Vendor Advisory
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2004&m=slackware-security.405053
https://exchange.xforce.ibmcloud.com/vulnerabilities/15134
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A811
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A838
ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2004-013.0.txt
http://bugs.debian.org/126336
http://marc.info/?l=bugtraq&m=107651677817933&w=2
http://marc.info/?l=bugtraq&m=107696262905039&w=2
http://marc.info/?l=bugtraq&m=107884956930903&w=2
http://www.mandrakesoft.com/security/advisories?name=MDKSA-2004:010
http://www.osvdb.org/3918
http://www.redhat.com/support/errata/RHSA-2004-050.html Patch Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2004-051.html Patch Vendor Advisory
http://www.securityfocus.com/bid/9641 Patch Vendor Advisory
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2004&m=slackware-security.405053
https://exchange.xforce.ibmcloud.com/vulnerabilities/15134
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A811
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A838
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mutt:mutt:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:mutt:mutt:1.2.5:*:*:*:*:*:*:*
cpe:2.3:a:mutt:mutt:1.2.5.1:*:*:*:*:*:*:*
cpe:2.3:a:mutt:mutt:1.2.5.4:*:*:*:*:*:*:*
cpe:2.3:a:mutt:mutt:1.2.5.5:*:*:*:*:*:*:*
cpe:2.3:a:mutt:mutt:1.2.5.12:*:*:*:*:*:*:*
cpe:2.3:a:mutt:mutt:1.2.5.12_ol:*:*:*:*:*:*:*
cpe:2.3:a:mutt:mutt:1.3.12:*:*:*:*:*:*:*
cpe:2.3:a:mutt:mutt:1.3.12.1:*:*:*:*:*:*:*
cpe:2.3:a:mutt:mutt:1.3.16:*:*:*:*:*:*:*
cpe:2.3:a:mutt:mutt:1.3.17:*:*:*:*:*:*:*
cpe:2.3:a:mutt:mutt:1.3.22:*:*:*:*:*:*:*
cpe:2.3:a:mutt:mutt:1.3.24:*:*:*:*:*:*:*
cpe:2.3:a:mutt:mutt:1.3.25:*:*:*:*:*:*:*
cpe:2.3:a:mutt:mutt:1.3.27:*:*:*:*:*:*:*
cpe:2.3:a:mutt:mutt:1.3.28:*:*:*:*:*:*:*
cpe:2.3:a:mutt:mutt:1.4.0:*:*:*:*:*:*:*
cpe:2.3:a:mutt:mutt:1.4.1:*:*:*:*:*:*:*

History

20 Nov 2024, 23:47

Type Values Removed Values Added
References () ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2004-013.0.txt - () ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2004-013.0.txt -
References () http://bugs.debian.org/126336 - () http://bugs.debian.org/126336 -
References () http://marc.info/?l=bugtraq&m=107651677817933&w=2 - () http://marc.info/?l=bugtraq&m=107651677817933&w=2 -
References () http://marc.info/?l=bugtraq&m=107696262905039&w=2 - () http://marc.info/?l=bugtraq&m=107696262905039&w=2 -
References () http://marc.info/?l=bugtraq&m=107884956930903&w=2 - () http://marc.info/?l=bugtraq&m=107884956930903&w=2 -
References () http://www.mandrakesoft.com/security/advisories?name=MDKSA-2004:010 - () http://www.mandrakesoft.com/security/advisories?name=MDKSA-2004:010 -
References () http://www.osvdb.org/3918 - () http://www.osvdb.org/3918 -
References () http://www.redhat.com/support/errata/RHSA-2004-050.html - Patch, Vendor Advisory () http://www.redhat.com/support/errata/RHSA-2004-050.html - Patch, Vendor Advisory
References () http://www.redhat.com/support/errata/RHSA-2004-051.html - Patch, Vendor Advisory () http://www.redhat.com/support/errata/RHSA-2004-051.html - Patch, Vendor Advisory
References () http://www.securityfocus.com/bid/9641 - Patch, Vendor Advisory () http://www.securityfocus.com/bid/9641 - Patch, Vendor Advisory
References () http://www.slackware.com/security/viewer.php?l=slackware-security&y=2004&m=slackware-security.405053 - () http://www.slackware.com/security/viewer.php?l=slackware-security&y=2004&m=slackware-security.405053 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/15134 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/15134 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A811 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A811 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A838 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A838 -

Information

Published : 2004-03-03 05:00

Updated : 2024-11-20 23:47


NVD link : CVE-2004-0078

Mitre link : CVE-2004-0078

CVE.ORG link : CVE-2004-0078


JSON object : View

Products Affected

mutt

  • mutt