An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. They have a buffer overflow via base64 data.
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
Link | Tags |
---|---|
https://usn.ubuntu.com/3719-3/ | third party advisory vendor advisory |
https://gitlab.com/muttmua/mutt/commit/3d9028fec8f4d08db2251096307c0bbbebce669a | third party advisory patch |
https://www.debian.org/security/2018/dsa-4277 | third party advisory vendor advisory |
https://usn.ubuntu.com/3719-2/ | third party advisory vendor advisory |
https://lists.debian.org/debian-lts-announce/2018/08/msg00001.html | third party advisory mailing list |
https://security.gentoo.org/glsa/201810-07 | third party advisory vendor advisory |
http://www.mutt.org/news.html | release notes vendor advisory |
https://neomutt.org/2018/07/16/release | release notes vendor advisory |
https://usn.ubuntu.com/3719-1/ | third party advisory vendor advisory |
https://github.com/neomutt/neomutt/commit/6f163e07ae68654d7ac5268cbb7565f6df79ad85 | third party advisory patch |