FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The VUXML data was last processed by FreshPorts on 2024-04-18 11:12:36 UTC

List all Vulnerabilities, by package

List all Vulnerabilities, by date

k68

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
67c05283-5d62-11d8-80e3-0020ed76ef5aBuffer overflow in Mutt 1.4

Mutt 1.4 contains a buffer overflow that could be exploited with a specially formed message, causing Mutt to crash or possibly execute arbitrary code.


Discovery 2004-02-11
Entry 2004-02-12
mutt
ja-mutt
ge 1.4 lt 1.4.2

CVE-2004-0078
http://www.mutt.org/news.html
863f95d3-3df1-11dc-b3d3-0016179b2dd5mutt -- buffer overflow vulnerability

Securityfocus reports:

Mutt is prone to a local buffer-overflow vulnerability because it fails to properly bounds-check user-supplied input before using it in a memory copy operation. An attacker can exploit this issue to execute arbitrary code with the with the privileges of the victim. Failed exploit attempts will result in a denial of service.


Discovery 2007-05-28
Entry 2007-07-29
mutt
mutt-lite
ja-mutt
zh-mutt
< 1.4.2.3

24192
CVE-2007-2683
http://www.redhat.com/support/errata/RHSA-2007-0386.html
c3d43001-8064-11e4-801f-0022156e8794mutt -- denial of service via crafted mail message

NVD reports:

The write_one_header function in mutt 1.5.23 does not properly handle newline characters at the beginning of a header, which allows remote attackers to cause a denial of service (crash) via a header with an empty body, which triggers a heap-based buffer overflow in the mutt_substrdup function.


Discovery 2014-11-26
Entry 2014-12-23
mutt
ge 1.5.22 lt 1.5.23_7

ja-mutt
ge 1.5.22 lt 1.5.23_7

zh-mutt
ge 1.5.22 lt 1.5.23_7

71334
CVE-2014-9116
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=771125
http://dev.mutt.org/trac/ticket/3716
d2a43243-087b-11db-bc36-0008743bf21amutt -- Remote Buffer Overflow Vulnerability

SecurityFocus reports:

Mutt is prone to a remote buffer-overflow vulnerability. This issue is due to the application's failure to properly bounds-check user-supplied input before copying it to an insufficiently sized memory buffer.

This issue may allow remote attackers to execute arbitrary machine code in the context of the affected application. Failed exploit attempts will likely crash the application, denying further service to legitimate users.


Discovery 2006-06-26
Entry 2006-06-30
mutt
mutt-lite
le 1.4.2.1_2

mutt-devel
mutt-devel-lite
le 1.5.11_2

ja-mutt
le 1.4.2.1.j1

zh-mutt-devel
le 1.5.11_20040617

ja-mutt-devel
le 1.5.6.j1_2

mutt-ng
le 20060501

18642
http://dev.mutt.org/cgi-bin/gitweb.cgi?p=mutt/.git;a=commit;h=dc0272b749f0e2b102973b7ac43dbd3908507540