Un problema è stato scoperto nel Mutt prima 1.10.1 e NeoMutt prima 2018/07/16. imap / message.c ha un buffer overflow stack-based una risposta FETCH con un campo INTERNALDATE lunga. |
http://www.securityfocus.com/bid/104931 https://www.debian.org/security/2018/dsa-4277 https://security.gentoo.org/glsa/201810-07 http://www.mutt.org/news.html https://github.com/neomutt/neomutt/commit/1b0f0d0988e6df4e32e9f4bf8780846ea95d4485 https://gitlab.com/muttmua/mutt/commit/3287534daa3beac68e2e83ca4b4fe8a3148ff870 https://neomutt.org/2018/07/16/release https://lists.debian.org/debian-lts-announce/2018/08/msg00001.html https://usn.ubuntu.com/3719-1/ https://usn.ubuntu.com/3719-2/ https://usn.ubuntu.com/3719-3/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14350 |
Vulnerabilità: CVE-2018-14350
