Bug 1181221 (CVE-2021-3181) - VUL-0: CVE-2021-3181: mutt,neomutt: recipient parsing memory leak
Summary: VUL-0: CVE-2021-3181: mutt,neomutt: recipient parsing memory leak
Status: RESOLVED FIXED
Alias: CVE-2021-3181
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Minor
Target Milestone: ---
Assignee: David Sterba
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/275782/
Whiteboard: CVSSv3.1:SUSE:CVE-2021-3181:6.5:(AV:N...
Keywords:
Depends on:
Blocks:
 
Reported: 2021-01-21 09:58 UTC by Robert Frohl
Modified: 2024-05-10 12:20 UTC (History)
5 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Robert Frohl 2021-01-21 09:58:32 UTC
CVE-2021-3181

rfc822.c in Mutt through 2.0.4 allows remote attackers to cause a denial of
service (mailbox unavailability) by sending email messages with sequences of
semicolon characters in RFC822 address fields (aka terminators of empty groups).
A small email message from the attacker can cause large memory consumption, and
the victim may then be unable to see email messages from other persons.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3181
http://seclists.org/oss-sec/2021/q1/58
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3181
https://gitlab.com/muttmua/mutt/-/commit/4a2becbdb4422aaffe3ce314991b9d670b7adf17
https://gitlab.com/muttmua/mutt/-/commit/939b02b33ae29bc0d642570c1dcfd4b339037d19
https://gitlab.com/muttmua/mutt/-/commit/d4305208955c5cdd9fe96dfa61e7c1e14e176a14
https://gitlab.com/muttmua/mutt/-/issues/323
Comment 1 Robert Frohl 2021-01-21 09:59:45 UTC
tracking as affected:

- SUSE:SLE-11:Update/mutt
- SUSE:SLE-12:Update/mutt
- SUSE:SLE-15:Update/mutt
Comment 2 Dr. Werner Fink 2021-01-21 10:38:39 UTC
(In reply to Robert Frohl from comment #1)
> tracking as affected:
> 
> - SUSE:SLE-11:Update/mutt
> - SUSE:SLE-12:Update/mutt
> - SUSE:SLE-15:Update/mutt

and factory as well
Comment 4 Andreas Stieger 2021-01-22 16:58:38 UTC
Fixed in mutt 2.0.5 https://build.opensuse.org/request/show/866082
cc neomutt maintainers
Comment 5 Swamp Workflow Management 2021-01-22 17:19:05 UTC
SUSE-SU-2021:0195-1: An update that fixes one vulnerability is now available.

Category: security (moderate)
Bug References: 1181221
CVE References: CVE-2021-3181
JIRA References: 
Sources used:
SUSE Linux Enterprise Module for Basesystem 15-SP2 (src):    mutt-1.10.1-3.20.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 6 Swamp Workflow Management 2021-01-22 17:20:46 UTC
SUSE-SU-2021:0196-1: An update that fixes one vulnerability is now available.

Category: security (moderate)
Bug References: 1181221
CVE References: CVE-2021-3181
JIRA References: 
Sources used:
SUSE Linux Enterprise Server 12-SP5 (src):    mutt-1.10.1-55.24.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 7 Dr. Werner Fink 2021-01-25 07:57:51 UTC
+Fri Jan 22 16:52:40 UTC 2021 - Andreas Stieger <andreas.stieger@gmx.de>
+
+- mutt 2.0.5:
+  * CVE-2021-3181: recipient parsing memory leak (boo#1181221)
+  * fix other memory leak in IMAP code
+  * Fix color overlay when HAVE_COLOR is unset

Thanks Andreas!
Comment 8 Swamp Workflow Management 2021-01-25 23:15:28 UTC
openSUSE-SU-2021:0161-1: An update that fixes one vulnerability is now available.

Category: security (moderate)
Bug References: 1181221
CVE References: CVE-2021-3181
JIRA References: 
Sources used:
openSUSE Leap 15.1 (src):    mutt-1.10.1-lp151.2.15.1
Comment 9 Swamp Workflow Management 2021-01-25 23:16:24 UTC
openSUSE-SU-2021:0162-1: An update that fixes one vulnerability is now available.

Category: security (moderate)
Bug References: 1181221
CVE References: CVE-2021-3181
JIRA References: 
Sources used:
openSUSE Leap 15.2 (src):    mutt-1.10.1-lp152.3.15.1
Comment 10 OBSbugzilla Bot 2023-09-29 10:35:15 UTC
This is an autogenerated message for OBS integration:
This bug (1181221) was mentioned in
https://build.opensuse.org/request/show/1114300 Factory / mutt