Описание
The write_one_header function in mutt 1.5.23 does not properly handle newline characters at the beginning of a header, which allows remote attackers to cause a denial of service (crash) via a header with an empty body, which triggers a heap-based buffer overflow in the mutt_substrdup function.
The write_one_header function in mutt 1.5.23 does not properly handle newline characters at the beginning of a header, which allows remote attackers to cause a denial of service (crash) via a header with an empty body, which triggers a heap-based buffer overflow in the mutt_substrdup function.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2014-9116
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=771125
- https://bugzilla.redhat.com/show_bug.cgi?id=1168463
- https://security.gentoo.org/glsa/201701-04
- http://advisories.mageia.org/MGASA-2014-0509.html
- http://dev.mutt.org/trac/ticket/3716
- http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00002.html
- http://www.debian.org/security/2014/dsa-3083
- http://www.mandriva.com/security/advisories?name=MDVSA-2014:245
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:078
- http://www.openwall.com/lists/oss-security/2014/11/27/5
- http://www.openwall.com/lists/oss-security/2014/11/27/9
- http://www.securityfocus.com/bid/71334
- http://www.securitytracker.com/id/1031266
Связанные уязвимости
The write_one_header function in mutt 1.5.23 does not properly handle newline characters at the beginning of a header, which allows remote attackers to cause a denial of service (crash) via a header with an empty body, which triggers a heap-based buffer overflow in the mutt_substrdup function.
The write_one_header function in mutt 1.5.23 does not properly handle newline characters at the beginning of a header, which allows remote attackers to cause a denial of service (crash) via a header with an empty body, which triggers a heap-based buffer overflow in the mutt_substrdup function.
The write_one_header function in mutt 1.5.23 does not properly handle newline characters at the beginning of a header, which allows remote attackers to cause a denial of service (crash) via a header with an empty body, which triggers a heap-based buffer overflow in the mutt_substrdup function.
The write_one_header function in mutt 1.5.23 does not properly handle ...