{"affected":[{"ecosystem_specific":{"binaries":[{"mutt":"1.10.1-3.3.4","mutt-doc":"1.10.1-3.3.4","mutt-lang":"1.10.1-3.3.4"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Basesystem 15","name":"mutt","purl":"pkg:rpm/suse/mutt&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.10.1-3.3.4"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for mutt fixes the following issues:\n\nSecurity issues fixed:\n\n- bsc#1101428: Mutt 1.10.1 security release update.\n- CVE-2018-14351: Fix imap/command.c that mishandles long IMAP status mailbox literal count size (bsc#1101583).\n- CVE-2018-14353: Fix imap_quote_string in imap/util.c that has an integer underflow (bsc#1101581).\n- CVE-2018-14362: Fix pop.c that does not forbid characters that may have unsafe interaction with message-cache pathnames (bsc#1101567).\n- CVE-2018-14354: Fix arbitrary command execution from remote IMAP servers via backquote characters (bsc#1101578).\n- CVE-2018-14352: Fix imap_quote_string in imap/util.c that does not leave room for quote characters (bsc#1101582).\n- CVE-2018-14356: Fix pop.c that mishandles a zero-length UID (bsc#1101576).\n- CVE-2018-14355: Fix imap/util.c that mishandles '..' directory traversal in a mailbox name (bsc#1101577).\n- CVE-2018-14349: Fix imap/command.c that mishandles a NO response without a message (bsc#1101589).\n- CVE-2018-14350: Fix imap/message.c that has a stack-based buffer overflow for a FETCH response with along INTERNALDATE field (bsc#1101588).\n- CVE-2018-14363: Fix newsrc.c that does not properlyrestrict '/' characters that may have unsafe interaction with cache pathnames (bsc#1101566).\n- CVE-2018-14359: Fix buffer overflow via base64 data (bsc#1101570).\n- CVE-2018-14358: Fix imap/message.c that has a stack-based buffer overflow for a FETCH response with along RFC822.SIZE field (bsc#1101571).\n- CVE-2018-14360: Fix nntp_add_group in newsrc.c that has a stack-based buffer overflow because of incorrect sscanf usage (bsc#1101569).\n- CVE-2018-14357: Fix that remote IMAP servers are allowed to execute arbitrary commands via backquote characters (bsc#1101573).\n- CVE-2018-14361: Fix that nntp.c proceeds even if memory allocation fails for messages data (bsc#1101568).\n\nBug fixes:\n\n- mutt reports as neomutt and incorrect version (bsc#1094717)\n","id":"SUSE-SU-2018:2085-1","modified":"2018-07-27T10:47:58Z","published":"2018-07-27T10:47:58Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2018/suse-su-20182085-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1094717"},{"type":"REPORT","url":"https://bugzilla.suse.com/1101428"},{"type":"REPORT","url":"https://bugzilla.suse.com/1101566"},{"type":"REPORT","url":"https://bugzilla.suse.com/1101567"},{"type":"REPORT","url":"https://bugzilla.suse.com/1101568"},{"type":"REPORT","url":"https://bugzilla.suse.com/1101569"},{"type":"REPORT","url":"https://bugzilla.suse.com/1101570"},{"type":"REPORT","url":"https://bugzilla.suse.com/1101571"},{"type":"REPORT","url":"https://bugzilla.suse.com/1101573"},{"type":"REPORT","url":"https://bugzilla.suse.com/1101576"},{"type":"REPORT","url":"https://bugzilla.suse.com/1101577"},{"type":"REPORT","url":"https://bugzilla.suse.com/1101578"},{"type":"REPORT","url":"https://bugzilla.suse.com/1101581"},{"type":"REPORT","url":"https://bugzilla.suse.com/1101582"},{"type":"REPORT","url":"https://bugzilla.suse.com/1101583"},{"type":"REPORT","url":"https://bugzilla.suse.com/1101588"},{"type":"REPORT","url":"https://bugzilla.suse.com/1101589"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-9116"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-14349"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-14350"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-14351"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-14352"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-14353"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-14354"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-14355"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-14356"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-14357"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-14358"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-14359"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-14360"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-14361"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-14362"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-14363"}],"related":["CVE-2014-9116","CVE-2018-14349","CVE-2018-14350","CVE-2018-14351","CVE-2018-14352","CVE-2018-14353","CVE-2018-14354","CVE-2018-14355","CVE-2018-14356","CVE-2018-14357","CVE-2018-14358","CVE-2018-14359","CVE-2018-14360","CVE-2018-14361","CVE-2018-14362","CVE-2018-14363"],"summary":"Security update for mutt","upstream":["CVE-2014-9116","CVE-2018-14349","CVE-2018-14350","CVE-2018-14351","CVE-2018-14352","CVE-2018-14353","CVE-2018-14354","CVE-2018-14355","CVE-2018-14356","CVE-2018-14357","CVE-2018-14358","CVE-2018-14359","CVE-2018-14360","CVE-2018-14361","CVE-2018-14362","CVE-2018-14363"]}