Bugzilla – Bug 49470
VUL-0: CVE-2004-0078: bufferoverflow in mutt
Last modified: 2021-10-04 08:29:50 UTC
* Thomas Roessler <roessler@does-not-exist.org> [Feb 11. 2004 16:05]: > Mutt-1.4.2 has just been released; this version fixes a buffer > overflow that can be triggered by incoming messages. There are > reports about spam that has actually triggered this problem and > crashed mutt. > > It is recommended that users of mutt versions prior to 1.4.2 upgrade > to this version, or apply the patch included below. > > Users of "unstable" mutt versions after 1.3.28 (including 1.5.*) do > not need to upgrade, as this problem had been fixed in the unstable > branch in February 2002; unfortunately, the fix was not backported > before 1.4 was released. I've submitted fixed packages for 8.1, 8.2 and 9.0 which carry the affected version.
<!-- SBZ_reproduce --> See description
And also patchinfos are submitted
<!-- SBZ_reopen -->Reopened by draht@suse.de at Wed Feb 11 18:03:48 2004, took initial reporter mmj@suse.de to cc
That doesn't make this bug fixed. Re-Opening...
...and re-assigning.
What is wrong with the fixed package, Roman?
Oh, the package is fine, but for as long as the packages are not out, we shouldn't close the bug yet. :-)
*oompf* Now I get it....
laufzettel submitted
packages approved.
CVE-2004-0078
CVE-2004-0078: CVSS v2 Base Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)