ID CVE-2004-0078
Summary Buffer overflow in the index menu code (menu_pad_string of menu.c) for Mutt 1.4.1 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via certain mail messages.
References
Vulnerable Configurations
  • cpe:2.3:a:mutt:mutt:1.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:mutt:mutt:1.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:mutt:mutt:1.2.5:*:*:*:*:*:*:*
    cpe:2.3:a:mutt:mutt:1.2.5:*:*:*:*:*:*:*
  • cpe:2.3:a:mutt:mutt:1.2.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:mutt:mutt:1.2.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:mutt:mutt:1.2.5.4:*:*:*:*:*:*:*
    cpe:2.3:a:mutt:mutt:1.2.5.4:*:*:*:*:*:*:*
  • cpe:2.3:a:mutt:mutt:1.2.5.5:*:*:*:*:*:*:*
    cpe:2.3:a:mutt:mutt:1.2.5.5:*:*:*:*:*:*:*
  • cpe:2.3:a:mutt:mutt:1.2.5.12:*:*:*:*:*:*:*
    cpe:2.3:a:mutt:mutt:1.2.5.12:*:*:*:*:*:*:*
  • cpe:2.3:a:mutt:mutt:1.2.5.12_ol:*:*:*:*:*:*:*
    cpe:2.3:a:mutt:mutt:1.2.5.12_ol:*:*:*:*:*:*:*
  • cpe:2.3:a:mutt:mutt:1.3.12:*:*:*:*:*:*:*
    cpe:2.3:a:mutt:mutt:1.3.12:*:*:*:*:*:*:*
  • cpe:2.3:a:mutt:mutt:1.3.12.1:*:*:*:*:*:*:*
    cpe:2.3:a:mutt:mutt:1.3.12.1:*:*:*:*:*:*:*
  • cpe:2.3:a:mutt:mutt:1.3.16:*:*:*:*:*:*:*
    cpe:2.3:a:mutt:mutt:1.3.16:*:*:*:*:*:*:*
  • cpe:2.3:a:mutt:mutt:1.3.17:*:*:*:*:*:*:*
    cpe:2.3:a:mutt:mutt:1.3.17:*:*:*:*:*:*:*
  • cpe:2.3:a:mutt:mutt:1.3.22:*:*:*:*:*:*:*
    cpe:2.3:a:mutt:mutt:1.3.22:*:*:*:*:*:*:*
  • cpe:2.3:a:mutt:mutt:1.3.24:*:*:*:*:*:*:*
    cpe:2.3:a:mutt:mutt:1.3.24:*:*:*:*:*:*:*
  • cpe:2.3:a:mutt:mutt:1.3.25:*:*:*:*:*:*:*
    cpe:2.3:a:mutt:mutt:1.3.25:*:*:*:*:*:*:*
  • cpe:2.3:a:mutt:mutt:1.3.27:*:*:*:*:*:*:*
    cpe:2.3:a:mutt:mutt:1.3.27:*:*:*:*:*:*:*
  • cpe:2.3:a:mutt:mutt:1.3.28:*:*:*:*:*:*:*
    cpe:2.3:a:mutt:mutt:1.3.28:*:*:*:*:*:*:*
  • cpe:2.3:a:mutt:mutt:1.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:mutt:mutt:1.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:mutt:mutt:1.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:mutt:mutt:1.4.1:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 10-10-2017 - 01:30)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
oval via4
  • accepted 2007-04-25T19:52:54.867-04:00
    class vulnerability
    contributors
    • name Jay Beale
      organization Bastille Linux
    • name Thomas R. Jones
      organization Maitreya Security
    description Buffer overflow in the index menu code (menu_pad_string of menu.c) for Mutt 1.4.1 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via certain mail messages.
    family unix
    id oval:org.mitre.oval:def:811
    status accepted
    submitted 2004-03-20T12:00:00.000-04:00
    title Red Hat Mutt BO in Index Menu
    version 37
  • accepted 2007-04-25T19:52:59.230-04:00
    class vulnerability
    contributors
    • name Jay Beale
      organization Bastille Linux
    • name Matt Busby
      organization The MITRE Corporation
    • name Thomas R. Jones
      organization Maitreya Security
    description Buffer overflow in the index menu code (menu_pad_string of menu.c) for Mutt 1.4.1 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via certain mail messages.
    family unix
    id oval:org.mitre.oval:def:838
    status accepted
    submitted 2004-03-20T12:00:00.000-04:00
    title Red Hat Enterprise 3 Mutt BO in Index Menu
    version 39
redhat via4
advisories
  • rhsa
    id RHSA-2004:050
  • rhsa
    id RHSA-2004:051
rpms
  • mutt-5:1.4.1-3.4
  • mutt-debuginfo-5:1.4.1-3.4
refmap via4
bid 9641
bugtraq
  • 20040211 Mutt-1.4.2 fixes buffer overflow.
  • 20040215 LNSA-#2004-0001: mutt remote crash
  • 20040309 [OpenPKG-SA-2004.005] OpenPKG Security Advisory (mutt)
caldera CSSA-2004-013.0
confirm http://bugs.debian.org/126336
mandrake MDKSA-2004:010
osvdb 3918
slackware SSA:2004-043
xf mutt-index-menu-bo(15134)
Last major update 10-10-2017 - 01:30
Published 03-03-2004 - 05:00
Last modified 10-10-2017 - 01:30
Back to Top