Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2018-14358
Vulnerability from cvelistv5
Published
2018-07-17 17:00
Modified
2024-08-05 09:29
Severity ?
EPSS score ?
Summary
An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/message.c has a stack-based buffer overflow for a FETCH response with a long RFC822.SIZE field.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T09:29:50.097Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "USN-3719-3", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3719-3/", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://gitlab.com/muttmua/mutt/commit/3287534daa3beac68e2e83ca4b4fe8a3148ff870", }, { name: "DSA-4277", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "https://www.debian.org/security/2018/dsa-4277", }, { name: "[debian-lts-announce] 20180802 [SECURITY] [DLA 1455-1] mutt security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2018/08/msg00001.html", }, { name: "GLSA-201810-07", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201810-07", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://www.mutt.org/news.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://neomutt.org/2018/07/16/release", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/neomutt/neomutt/commit/1b0f0d0988e6df4e32e9f4bf8780846ea95d4485", }, { name: "USN-3719-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3719-1/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2018-07-17T00:00:00", descriptions: [ { lang: "en", value: "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/message.c has a stack-based buffer overflow for a FETCH response with a long RFC822.SIZE field.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-10-31T09:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "USN-3719-3", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3719-3/", }, { tags: [ "x_refsource_MISC", ], url: "https://gitlab.com/muttmua/mutt/commit/3287534daa3beac68e2e83ca4b4fe8a3148ff870", }, { name: "DSA-4277", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "https://www.debian.org/security/2018/dsa-4277", }, { name: "[debian-lts-announce] 20180802 [SECURITY] [DLA 1455-1] mutt security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2018/08/msg00001.html", }, { name: "GLSA-201810-07", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201810-07", }, { tags: [ "x_refsource_MISC", ], url: "http://www.mutt.org/news.html", }, { tags: [ "x_refsource_MISC", ], url: "https://neomutt.org/2018/07/16/release", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/neomutt/neomutt/commit/1b0f0d0988e6df4e32e9f4bf8780846ea95d4485", }, { name: "USN-3719-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3719-1/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2018-14358", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/message.c has a stack-based buffer overflow for a FETCH response with a long RFC822.SIZE field.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "USN-3719-3", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3719-3/", }, { name: "https://gitlab.com/muttmua/mutt/commit/3287534daa3beac68e2e83ca4b4fe8a3148ff870", refsource: "MISC", url: "https://gitlab.com/muttmua/mutt/commit/3287534daa3beac68e2e83ca4b4fe8a3148ff870", }, { name: "DSA-4277", refsource: "DEBIAN", url: "https://www.debian.org/security/2018/dsa-4277", }, { name: "[debian-lts-announce] 20180802 [SECURITY] [DLA 1455-1] mutt security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2018/08/msg00001.html", }, { name: "GLSA-201810-07", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201810-07", }, { name: "http://www.mutt.org/news.html", refsource: "MISC", url: "http://www.mutt.org/news.html", }, { name: "https://neomutt.org/2018/07/16/release", refsource: "MISC", url: "https://neomutt.org/2018/07/16/release", }, { name: "https://github.com/neomutt/neomutt/commit/1b0f0d0988e6df4e32e9f4bf8780846ea95d4485", refsource: "MISC", url: "https://github.com/neomutt/neomutt/commit/1b0f0d0988e6df4e32e9f4bf8780846ea95d4485", }, { name: "USN-3719-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3719-1/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2018-14358", datePublished: "2018-07-17T17:00:00", dateReserved: "2018-07-17T00:00:00", dateUpdated: "2024-08-05T09:29:50.097Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { nvd: "{\"cve\":{\"id\":\"CVE-2018-14358\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2018-07-17T17:29:00.747\",\"lastModified\":\"2024-11-21T03:48:54.650\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/message.c has a stack-based buffer overflow for a FETCH response with a long RFC822.SIZE field.\"},{\"lang\":\"es\",\"value\":\"Se ha descubierto un problema en Mutt en versiones anteriores a la 1.10.1 y NeoMutt en versiones anteriores al 2018-07-16. imap/message.c tiene un desbordamiento de búfer basado en pila para una respuesta FETCH con un campo RFC822.SIZE largo.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":true,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mutt:mutt:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.10.1\",\"matchCriteriaId\":\"2FA2C3A6-423C-4BE5-8FA7-0241384D58D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:neomutt:neomutt:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"20180716\",\"matchCriteriaId\":\"1C15CCD1-1752-4913-9506-32035B52A513\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"B5A6F2F3-4894-4392-8296-3B8DD2679084\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"}]}]}],\"references\":[{\"url\":\"http://www.mutt.org/news.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://github.com/neomutt/neomutt/commit/1b0f0d0988e6df4e32e9f4bf8780846ea95d4485\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://gitlab.com/muttmua/mutt/commit/3287534daa3beac68e2e83ca4b4fe8a3148ff870\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/08/msg00001.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://neomutt.org/2018/07/16/release\",\"source\":\"cve@mitre.org\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201810-07\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3719-1/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3719-3/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2018/dsa-4277\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.mutt.org/news.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://github.com/neomutt/neomutt/commit/1b0f0d0988e6df4e32e9f4bf8780846ea95d4485\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://gitlab.com/muttmua/mutt/commit/3287534daa3beac68e2e83ca4b4fe8a3148ff870\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/08/msg00001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://neomutt.org/2018/07/16/release\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201810-07\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3719-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3719-3/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2018/dsa-4277\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}", }, }
ghsa-4ch4-m86j-485w
Vulnerability from github
Published
2022-05-13 01:26
Modified
2022-05-13 01:26
Severity ?
Details
An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/message.c has a stack-based buffer overflow for a FETCH response with a long RFC822.SIZE field.
{ affected: [], aliases: [ "CVE-2018-14358", ], database_specific: { cwe_ids: [ "CWE-787", ], github_reviewed: false, github_reviewed_at: null, nvd_published_at: "2018-07-17T17:29:00Z", severity: "CRITICAL", }, details: "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/message.c has a stack-based buffer overflow for a FETCH response with a long RFC822.SIZE field.", id: "GHSA-4ch4-m86j-485w", modified: "2022-05-13T01:26:29Z", published: "2022-05-13T01:26:29Z", references: [ { type: "ADVISORY", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-14358", }, { type: "WEB", url: "https://github.com/neomutt/neomutt/commit/1b0f0d0988e6df4e32e9f4bf8780846ea95d4485", }, { type: "WEB", url: "https://gitlab.com/muttmua/mutt/commit/3287534daa3beac68e2e83ca4b4fe8a3148ff870", }, { type: "WEB", url: "https://lists.debian.org/debian-lts-announce/2018/08/msg00001.html", }, { type: "WEB", url: "https://neomutt.org/2018/07/16/release", }, { type: "WEB", url: "https://security.gentoo.org/glsa/201810-07", }, { type: "WEB", url: "https://usn.ubuntu.com/3719-1", }, { type: "WEB", url: "https://usn.ubuntu.com/3719-3", }, { type: "WEB", url: "https://www.debian.org/security/2018/dsa-4277", }, { type: "WEB", url: "http://www.mutt.org/news.html", }, ], schema_version: "1.4.0", severity: [ { score: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", type: "CVSS_V3", }, ], }
suse-su-2018:2084-1
Vulnerability from csaf_suse
Published
2018-07-27 10:45
Modified
2018-07-27 10:45
Summary
Security update for mutt
Notes
Title of the patch
Security update for mutt
Description of the patch
This update for mutt fixes the following issues:
Security issues fixed:
- bsc#1101428: Mutt 1.10.1 security release update.
- CVE-2018-14351: Fix imap/command.c that mishandles long IMAP status mailbox literal count size (bsc#1101583).
- CVE-2018-14353: Fix imap_quote_string in imap/util.c that has an integer underflow (bsc#1101581).
- CVE-2018-14362: Fix pop.c that does not forbid characters that may have unsafe interaction with message-cache pathnames (bsc#1101567).
- CVE-2018-14354: Fix arbitrary command execution from remote IMAP servers via backquote characters (bsc#1101578).
- CVE-2018-14352: Fix imap_quote_string in imap/util.c that does not leave room for quote characters (bsc#1101582).
- CVE-2018-14356: Fix pop.c that mishandles a zero-length UID (bsc#1101576).
- CVE-2018-14355: Fix imap/util.c that mishandles '..' directory traversal in a mailbox name (bsc#1101577).
- CVE-2018-14349: Fix imap/command.c that mishandles a NO response without a message (bsc#1101589).
- CVE-2018-14350: Fix imap/message.c that has a stack-based buffer overflow for a FETCH response with along INTERNALDATE field (bsc#1101588).
- CVE-2018-14363: Fix newsrc.c that does not properlyrestrict '/' characters that may have unsafe interaction with cache pathnames (bsc#1101566).
- CVE-2018-14359: Fix buffer overflow via base64 data (bsc#1101570).
- CVE-2018-14358: Fix imap/message.c that has a stack-based buffer overflow for a FETCH response with along RFC822.SIZE field (bsc#1101571).
- CVE-2018-14360: Fix nntp_add_group in newsrc.c that has a stack-based buffer overflow because of incorrect sscanf usage (bsc#1101569).
- CVE-2018-14357: Fix that remote IMAP servers are allowed to execute arbitrary commands via backquote characters (bsc#1101573).
- CVE-2018-14361: Fix that nntp.c proceeds even if memory allocation fails for messages data (bsc#1101568).
Bug fixes:
- mutt reports as neomutt and incorrect version (bsc#1094717)
- No sidebar available in mutt 1.6.1 from Tumbleweed snapshot 20160517 (bsc#980830)
- mutt-1.6.1 unusable when built with --enable-sidebar (bsc#982129)
- (neo)mutt displaying times in Zulu time (bsc#1061343)
- mutt unconditionally segfaults when displaying a message (bsc#986534)
Patchnames
SUSE-SLE-DESKTOP-12-SP3-2018-1415,SUSE-SLE-SERVER-12-SP3-2018-1415
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for mutt", title: "Title of the patch", }, { category: "description", text: "This update for mutt fixes the following issues:\n\nSecurity issues fixed:\n\n- bsc#1101428: Mutt 1.10.1 security release update.\n- CVE-2018-14351: Fix imap/command.c that mishandles long IMAP status mailbox literal count size (bsc#1101583).\n- CVE-2018-14353: Fix imap_quote_string in imap/util.c that has an integer underflow (bsc#1101581).\n- CVE-2018-14362: Fix pop.c that does not forbid characters that may have unsafe interaction with message-cache pathnames (bsc#1101567).\n- CVE-2018-14354: Fix arbitrary command execution from remote IMAP servers via backquote characters (bsc#1101578).\n- CVE-2018-14352: Fix imap_quote_string in imap/util.c that does not leave room for quote characters (bsc#1101582).\n- CVE-2018-14356: Fix pop.c that mishandles a zero-length UID (bsc#1101576).\n- CVE-2018-14355: Fix imap/util.c that mishandles '..' directory traversal in a mailbox name (bsc#1101577).\n- CVE-2018-14349: Fix imap/command.c that mishandles a NO response without a message (bsc#1101589).\n- CVE-2018-14350: Fix imap/message.c that has a stack-based buffer overflow for a FETCH response with along INTERNALDATE field (bsc#1101588).\n- CVE-2018-14363: Fix newsrc.c that does not properlyrestrict '/' characters that may have unsafe interaction with cache pathnames (bsc#1101566).\n- CVE-2018-14359: Fix buffer overflow via base64 data (bsc#1101570).\n- CVE-2018-14358: Fix imap/message.c that has a stack-based buffer overflow for a FETCH response with along RFC822.SIZE field (bsc#1101571).\n- CVE-2018-14360: Fix nntp_add_group in newsrc.c that has a stack-based buffer overflow because of incorrect sscanf usage (bsc#1101569).\n- CVE-2018-14357: Fix that remote IMAP servers are allowed to execute arbitrary commands via backquote characters (bsc#1101573).\n- CVE-2018-14361: Fix that nntp.c proceeds even if memory allocation fails for messages data (bsc#1101568).\n\nBug fixes:\n\n- mutt reports as neomutt and incorrect version (bsc#1094717)\n- No sidebar available in mutt 1.6.1 from Tumbleweed snapshot 20160517 (bsc#980830)\n- mutt-1.6.1 unusable when built with --enable-sidebar (bsc#982129)\n- (neo)mutt displaying times in Zulu time (bsc#1061343)\n- mutt unconditionally segfaults when displaying a message (bsc#986534)\n", title: "Description of the patch", }, { category: "details", text: "SUSE-SLE-DESKTOP-12-SP3-2018-1415,SUSE-SLE-SERVER-12-SP3-2018-1415", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2084-1.json", }, { category: "self", summary: "URL for SUSE-SU-2018:2084-1", url: "https://www.suse.com/support/update/announcement/2018/suse-su-20182084-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2018:2084-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2018-July/004326.html", }, { category: "self", summary: "SUSE Bug 1061343", url: "https://bugzilla.suse.com/1061343", }, { category: "self", summary: "SUSE Bug 1094717", url: "https://bugzilla.suse.com/1094717", }, { category: "self", summary: "SUSE Bug 1101428", url: "https://bugzilla.suse.com/1101428", }, { category: "self", summary: "SUSE Bug 1101566", url: "https://bugzilla.suse.com/1101566", }, { category: "self", summary: "SUSE Bug 1101567", url: "https://bugzilla.suse.com/1101567", }, { category: "self", summary: "SUSE Bug 1101568", url: "https://bugzilla.suse.com/1101568", }, { category: "self", summary: "SUSE Bug 1101569", url: "https://bugzilla.suse.com/1101569", }, { category: "self", summary: "SUSE Bug 1101570", url: "https://bugzilla.suse.com/1101570", }, { category: "self", summary: "SUSE Bug 1101571", url: "https://bugzilla.suse.com/1101571", }, { category: "self", summary: "SUSE Bug 1101573", url: "https://bugzilla.suse.com/1101573", }, { category: "self", summary: "SUSE Bug 1101576", url: "https://bugzilla.suse.com/1101576", }, { category: "self", summary: "SUSE Bug 1101577", url: "https://bugzilla.suse.com/1101577", }, { category: "self", summary: "SUSE Bug 1101578", url: "https://bugzilla.suse.com/1101578", }, { category: "self", summary: "SUSE Bug 1101581", url: "https://bugzilla.suse.com/1101581", }, { category: "self", summary: "SUSE Bug 1101582", url: "https://bugzilla.suse.com/1101582", }, { category: "self", summary: "SUSE Bug 1101583", url: "https://bugzilla.suse.com/1101583", }, { category: "self", summary: "SUSE Bug 1101588", url: "https://bugzilla.suse.com/1101588", }, { category: "self", summary: "SUSE Bug 1101589", url: "https://bugzilla.suse.com/1101589", }, { category: "self", summary: "SUSE Bug 980830", url: "https://bugzilla.suse.com/980830", }, { category: "self", summary: "SUSE Bug 982129", url: "https://bugzilla.suse.com/982129", }, { category: "self", summary: "SUSE Bug 986534", url: "https://bugzilla.suse.com/986534", }, { category: "self", summary: "SUSE CVE CVE-2014-9116 page", url: "https://www.suse.com/security/cve/CVE-2014-9116/", }, { category: "self", summary: "SUSE CVE CVE-2018-14349 page", url: "https://www.suse.com/security/cve/CVE-2018-14349/", }, { category: "self", summary: "SUSE CVE CVE-2018-14350 page", url: "https://www.suse.com/security/cve/CVE-2018-14350/", }, { category: "self", summary: "SUSE CVE CVE-2018-14351 page", url: "https://www.suse.com/security/cve/CVE-2018-14351/", }, { category: "self", summary: "SUSE CVE CVE-2018-14352 page", url: "https://www.suse.com/security/cve/CVE-2018-14352/", }, { category: "self", summary: "SUSE CVE CVE-2018-14353 page", url: "https://www.suse.com/security/cve/CVE-2018-14353/", }, { category: "self", summary: "SUSE CVE CVE-2018-14354 page", url: "https://www.suse.com/security/cve/CVE-2018-14354/", }, { category: "self", summary: "SUSE CVE CVE-2018-14355 page", url: "https://www.suse.com/security/cve/CVE-2018-14355/", }, { category: "self", summary: "SUSE CVE CVE-2018-14356 page", url: "https://www.suse.com/security/cve/CVE-2018-14356/", }, { category: "self", summary: "SUSE CVE CVE-2018-14357 page", url: "https://www.suse.com/security/cve/CVE-2018-14357/", }, { category: "self", summary: "SUSE CVE CVE-2018-14358 page", url: "https://www.suse.com/security/cve/CVE-2018-14358/", }, { category: "self", summary: "SUSE CVE CVE-2018-14359 page", url: "https://www.suse.com/security/cve/CVE-2018-14359/", }, { category: "self", summary: "SUSE CVE CVE-2018-14360 page", url: "https://www.suse.com/security/cve/CVE-2018-14360/", }, { category: "self", summary: "SUSE CVE CVE-2018-14361 page", url: "https://www.suse.com/security/cve/CVE-2018-14361/", }, { category: "self", summary: "SUSE CVE CVE-2018-14362 page", url: "https://www.suse.com/security/cve/CVE-2018-14362/", }, { category: "self", summary: "SUSE CVE CVE-2018-14363 page", url: "https://www.suse.com/security/cve/CVE-2018-14363/", }, ], title: "Security update for mutt", tracking: { current_release_date: "2018-07-27T10:45:47Z", generator: { date: "2018-07-27T10:45:47Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2018:2084-1", initial_release_date: "2018-07-27T10:45:47Z", revision_history: [ { date: "2018-07-27T10:45:47Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "mutt-1.10.1-55.3.1.aarch64", product: { name: "mutt-1.10.1-55.3.1.aarch64", product_id: "mutt-1.10.1-55.3.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "mutt-1.10.1-55.3.1.ppc64le", product: { name: "mutt-1.10.1-55.3.1.ppc64le", product_id: "mutt-1.10.1-55.3.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "mutt-1.10.1-55.3.1.s390x", product: { name: "mutt-1.10.1-55.3.1.s390x", product_id: "mutt-1.10.1-55.3.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "mutt-1.10.1-55.3.1.x86_64", product: { name: "mutt-1.10.1-55.3.1.x86_64", product_id: "mutt-1.10.1-55.3.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Desktop 12 SP3", product: { name: "SUSE Linux Enterprise Desktop 12 SP3", product_id: "SUSE Linux Enterprise Desktop 12 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sled:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP3", product: { name: "SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sles:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp3", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "mutt-1.10.1-55.3.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3", product_id: "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", }, product_reference: "mutt-1.10.1-55.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP3", }, { category: "default_component_of", full_product_name: { name: "mutt-1.10.1-55.3.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", }, product_reference: "mutt-1.10.1-55.3.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "mutt-1.10.1-55.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", }, product_reference: "mutt-1.10.1-55.3.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "mutt-1.10.1-55.3.1.s390x as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", }, product_reference: "mutt-1.10.1-55.3.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "mutt-1.10.1-55.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", }, product_reference: "mutt-1.10.1-55.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "mutt-1.10.1-55.3.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", }, product_reference: "mutt-1.10.1-55.3.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "mutt-1.10.1-55.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", }, product_reference: "mutt-1.10.1-55.3.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "mutt-1.10.1-55.3.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", }, product_reference: "mutt-1.10.1-55.3.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "mutt-1.10.1-55.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64", }, product_reference: "mutt-1.10.1-55.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, ], }, vulnerabilities: [ { cve: "CVE-2014-9116", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-9116", }, ], notes: [ { category: "general", text: "The write_one_header function in mutt 1.5.23 does not properly handle newline characters at the beginning of a header, which allows remote attackers to cause a denial of service (crash) via a header with an empty body, which triggers a heap-based buffer overflow in the mutt_substrdup function.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-9116", url: "https://www.suse.com/security/cve/CVE-2014-9116", }, { category: "external", summary: "SUSE Bug 907453 for CVE-2014-9116", url: "https://bugzilla.suse.com/907453", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-07-27T10:45:47Z", details: "moderate", }, ], title: "CVE-2014-9116", }, { cve: "CVE-2018-14349", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14349", }, ], notes: [ { category: "general", text: "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/command.c mishandles a NO response without a message.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14349", url: "https://www.suse.com/security/cve/CVE-2018-14349", }, { category: "external", summary: "SUSE Bug 1101428 for CVE-2018-14349", url: "https://bugzilla.suse.com/1101428", }, { category: "external", summary: "SUSE Bug 1101589 for CVE-2018-14349", url: "https://bugzilla.suse.com/1101589", }, { category: "external", summary: "SUSE Bug 1101593 for CVE-2018-14349", url: "https://bugzilla.suse.com/1101593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-07-27T10:45:47Z", details: "moderate", }, ], title: "CVE-2018-14349", }, { cve: "CVE-2018-14350", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14350", }, ], notes: [ { category: "general", text: "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/message.c has a stack-based buffer overflow for a FETCH response with a long INTERNALDATE field.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14350", url: "https://www.suse.com/security/cve/CVE-2018-14350", }, { category: "external", summary: "SUSE Bug 1101428 for CVE-2018-14350", url: "https://bugzilla.suse.com/1101428", }, { category: "external", summary: "SUSE Bug 1101588 for CVE-2018-14350", url: "https://bugzilla.suse.com/1101588", }, { category: "external", summary: "SUSE Bug 1101593 for CVE-2018-14350", url: "https://bugzilla.suse.com/1101593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-07-27T10:45:47Z", details: "moderate", }, ], title: "CVE-2018-14350", }, { cve: "CVE-2018-14351", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14351", }, ], notes: [ { category: "general", text: "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/command.c mishandles a long IMAP status mailbox literal count size.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14351", url: "https://www.suse.com/security/cve/CVE-2018-14351", }, { category: "external", summary: "SUSE Bug 1101428 for CVE-2018-14351", url: "https://bugzilla.suse.com/1101428", }, { category: "external", summary: "SUSE Bug 1101583 for CVE-2018-14351", url: "https://bugzilla.suse.com/1101583", }, { category: "external", summary: "SUSE Bug 1101593 for CVE-2018-14351", url: "https://bugzilla.suse.com/1101593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.3, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-07-27T10:45:47Z", details: "important", }, ], title: "CVE-2018-14351", }, { cve: "CVE-2018-14352", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14352", }, ], notes: [ { category: "general", text: "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap_quote_string in imap/util.c does not leave room for quote characters, leading to a stack-based buffer overflow.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14352", url: "https://www.suse.com/security/cve/CVE-2018-14352", }, { category: "external", summary: "SUSE Bug 1101428 for CVE-2018-14352", url: "https://bugzilla.suse.com/1101428", }, { category: "external", summary: "SUSE Bug 1101582 for CVE-2018-14352", url: "https://bugzilla.suse.com/1101582", }, { category: "external", summary: "SUSE Bug 1101593 for CVE-2018-14352", url: "https://bugzilla.suse.com/1101593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-07-27T10:45:47Z", details: "moderate", }, ], title: "CVE-2018-14352", }, { cve: "CVE-2018-14353", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14353", }, ], notes: [ { category: "general", text: "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap_quote_string in imap/util.c has an integer underflow.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14353", url: "https://www.suse.com/security/cve/CVE-2018-14353", }, { category: "external", summary: "SUSE Bug 1101428 for CVE-2018-14353", url: "https://bugzilla.suse.com/1101428", }, { category: "external", summary: "SUSE Bug 1101581 for CVE-2018-14353", url: "https://bugzilla.suse.com/1101581", }, { category: "external", summary: "SUSE Bug 1101593 for CVE-2018-14353", url: "https://bugzilla.suse.com/1101593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-07-27T10:45:47Z", details: "moderate", }, ], title: "CVE-2018-14353", }, { cve: "CVE-2018-14354", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14354", }, ], notes: [ { category: "general", text: "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. They allow remote IMAP servers to execute arbitrary commands via backquote characters, related to the mailboxes command associated with a manual subscription or unsubscription.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14354", url: "https://www.suse.com/security/cve/CVE-2018-14354", }, { category: "external", summary: "SUSE Bug 1101428 for CVE-2018-14354", url: "https://bugzilla.suse.com/1101428", }, { category: "external", summary: "SUSE Bug 1101578 for CVE-2018-14354", url: "https://bugzilla.suse.com/1101578", }, { category: "external", summary: "SUSE Bug 1101581 for CVE-2018-14354", url: "https://bugzilla.suse.com/1101581", }, { category: "external", summary: "SUSE Bug 1101589 for CVE-2018-14354", url: "https://bugzilla.suse.com/1101589", }, { category: "external", summary: "SUSE Bug 1101593 for CVE-2018-14354", url: "https://bugzilla.suse.com/1101593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.6, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-07-27T10:45:47Z", details: "critical", }, ], title: "CVE-2018-14354", }, { cve: "CVE-2018-14355", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14355", }, ], notes: [ { category: "general", text: "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/util.c mishandles \"..\" directory traversal in a mailbox name.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14355", url: "https://www.suse.com/security/cve/CVE-2018-14355", }, { category: "external", summary: "SUSE Bug 1101428 for CVE-2018-14355", url: "https://bugzilla.suse.com/1101428", }, { category: "external", summary: "SUSE Bug 1101577 for CVE-2018-14355", url: "https://bugzilla.suse.com/1101577", }, { category: "external", summary: "SUSE Bug 1101593 for CVE-2018-14355", url: "https://bugzilla.suse.com/1101593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-07-27T10:45:47Z", details: "moderate", }, ], title: "CVE-2018-14355", }, { cve: "CVE-2018-14356", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14356", }, ], notes: [ { category: "general", text: "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. pop.c mishandles a zero-length UID.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14356", url: "https://www.suse.com/security/cve/CVE-2018-14356", }, { category: "external", summary: "SUSE Bug 1101428 for CVE-2018-14356", url: "https://bugzilla.suse.com/1101428", }, { category: "external", summary: "SUSE Bug 1101576 for CVE-2018-14356", url: "https://bugzilla.suse.com/1101576", }, { category: "external", summary: "SUSE Bug 1101589 for CVE-2018-14356", url: "https://bugzilla.suse.com/1101589", }, { category: "external", summary: "SUSE Bug 1101593 for CVE-2018-14356", url: "https://bugzilla.suse.com/1101593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-07-27T10:45:47Z", details: "moderate", }, ], title: "CVE-2018-14356", }, { cve: "CVE-2018-14357", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14357", }, ], notes: [ { category: "general", text: "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. They allow remote IMAP servers to execute arbitrary commands via backquote characters, related to the mailboxes command associated with an automatic subscription.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14357", url: "https://www.suse.com/security/cve/CVE-2018-14357", }, { category: "external", summary: "SUSE Bug 1101428 for CVE-2018-14357", url: "https://bugzilla.suse.com/1101428", }, { category: "external", summary: "SUSE Bug 1101573 for CVE-2018-14357", url: "https://bugzilla.suse.com/1101573", }, { category: "external", summary: "SUSE Bug 1101581 for CVE-2018-14357", url: "https://bugzilla.suse.com/1101581", }, { category: "external", summary: "SUSE Bug 1101589 for CVE-2018-14357", url: "https://bugzilla.suse.com/1101589", }, { category: "external", summary: "SUSE Bug 1101593 for CVE-2018-14357", url: "https://bugzilla.suse.com/1101593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.1, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-07-27T10:45:47Z", details: "important", }, ], title: "CVE-2018-14357", }, { cve: "CVE-2018-14358", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14358", }, ], notes: [ { category: "general", text: "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/message.c has a stack-based buffer overflow for a FETCH response with a long RFC822.SIZE field.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14358", url: "https://www.suse.com/security/cve/CVE-2018-14358", }, { category: "external", summary: "SUSE Bug 1101428 for CVE-2018-14358", url: "https://bugzilla.suse.com/1101428", }, { category: "external", summary: "SUSE Bug 1101571 for CVE-2018-14358", url: "https://bugzilla.suse.com/1101571", }, { category: "external", summary: "SUSE Bug 1101593 for CVE-2018-14358", url: "https://bugzilla.suse.com/1101593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-07-27T10:45:47Z", details: "moderate", }, ], title: "CVE-2018-14358", }, { cve: "CVE-2018-14359", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14359", }, ], notes: [ { category: "general", text: "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. They have a buffer overflow via base64 data.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14359", url: "https://www.suse.com/security/cve/CVE-2018-14359", }, { category: "external", summary: "SUSE Bug 1101428 for CVE-2018-14359", url: "https://bugzilla.suse.com/1101428", }, { category: "external", summary: "SUSE Bug 1101570 for CVE-2018-14359", url: "https://bugzilla.suse.com/1101570", }, { category: "external", summary: "SUSE Bug 1101589 for CVE-2018-14359", url: "https://bugzilla.suse.com/1101589", }, { category: "external", summary: "SUSE Bug 1101593 for CVE-2018-14359", url: "https://bugzilla.suse.com/1101593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-07-27T10:45:47Z", details: "moderate", }, ], title: "CVE-2018-14359", }, { cve: "CVE-2018-14360", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14360", }, ], notes: [ { category: "general", text: "An issue was discovered in NeoMutt before 2018-07-16. nntp_add_group in newsrc.c has a stack-based buffer overflow because of incorrect sscanf usage.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14360", url: "https://www.suse.com/security/cve/CVE-2018-14360", }, { category: "external", summary: "SUSE Bug 1101428 for CVE-2018-14360", url: "https://bugzilla.suse.com/1101428", }, { category: "external", summary: "SUSE Bug 1101569 for CVE-2018-14360", url: "https://bugzilla.suse.com/1101569", }, { category: "external", summary: "SUSE Bug 1101593 for CVE-2018-14360", url: "https://bugzilla.suse.com/1101593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-07-27T10:45:47Z", details: "critical", }, ], title: "CVE-2018-14360", }, { cve: "CVE-2018-14361", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14361", }, ], notes: [ { category: "general", text: "An issue was discovered in NeoMutt before 2018-07-16. nntp.c proceeds even if memory allocation fails for messages data.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14361", url: "https://www.suse.com/security/cve/CVE-2018-14361", }, { category: "external", summary: "SUSE Bug 1101428 for CVE-2018-14361", url: "https://bugzilla.suse.com/1101428", }, { category: "external", summary: "SUSE Bug 1101568 for CVE-2018-14361", url: "https://bugzilla.suse.com/1101568", }, { category: "external", summary: "SUSE Bug 1101593 for CVE-2018-14361", url: "https://bugzilla.suse.com/1101593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-07-27T10:45:47Z", details: "critical", }, ], title: "CVE-2018-14361", }, { cve: "CVE-2018-14362", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14362", }, ], notes: [ { category: "general", text: "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. pop.c does not forbid characters that may have unsafe interaction with message-cache pathnames, as demonstrated by a '/' character.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14362", url: "https://www.suse.com/security/cve/CVE-2018-14362", }, { category: "external", summary: "SUSE Bug 1101428 for CVE-2018-14362", url: "https://bugzilla.suse.com/1101428", }, { category: "external", summary: "SUSE Bug 1101567 for CVE-2018-14362", url: "https://bugzilla.suse.com/1101567", }, { category: "external", summary: "SUSE Bug 1101589 for CVE-2018-14362", url: "https://bugzilla.suse.com/1101589", }, { category: "external", summary: "SUSE Bug 1101593 for CVE-2018-14362", url: "https://bugzilla.suse.com/1101593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-07-27T10:45:47Z", details: "moderate", }, ], title: "CVE-2018-14362", }, { cve: "CVE-2018-14363", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14363", }, ], notes: [ { category: "general", text: "An issue was discovered in NeoMutt before 2018-07-16. newsrc.c does not properly restrict '/' characters that may have unsafe interaction with cache pathnames.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14363", url: "https://www.suse.com/security/cve/CVE-2018-14363", }, { category: "external", summary: "SUSE Bug 1101428 for CVE-2018-14363", url: "https://bugzilla.suse.com/1101428", }, { category: "external", summary: "SUSE Bug 1101566 for CVE-2018-14363", url: "https://bugzilla.suse.com/1101566", }, { category: "external", summary: "SUSE Bug 1101593 for CVE-2018-14363", url: "https://bugzilla.suse.com/1101593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-07-27T10:45:47Z", details: "important", }, ], title: "CVE-2018-14363", }, ], }
suse-su-2018:2403-1
Vulnerability from csaf_suse
Published
2018-08-17 06:54
Modified
2018-08-17 06:54
Summary
Security update for mutt
Notes
Title of the patch
Security update for mutt
Description of the patch
This update for mutt fixes the following issues:
Security issues fixed:
- CVE-2018-14352: Fix imap_quote_string in imap/util.c that does not leave room for quote characters (bsc#1101582).
- CVE-2018-14353: Fix imap_quote_string in imap/util.c that has an integer underflow (bsc#1101581).
- CVE-2018-14362: Fix pop.c that does not forbid characters that may have unsafe interaction with message-cache pathnames (bsc#1101567).
- CVE-2018-14354: Fix arbitrary command execution from remote IMAP servers via backquote characters (bsc#1101578).
- CVE-2018-14356: Fix pop.c that mishandles a zero-length UID (bsc#1101576).
- CVE-2018-14355: Fix imap/util.c that mishandles '..' directory traversal in a mailbox name (bsc#1101577).
- CVE-2018-14349: Fix imap/command.c that mishandles a NO response without a message (bsc#1101589).
- CVE-2018-14350: Fix imap/message.c that has a stack-based buffer overflow for a FETCH response with along INTERNALDATE field (bsc#1101588).
- CVE-2018-14357: Fix that remote IMAP servers are allowed to execute arbitrary commands via backquote characters (bsc#1101573).
- CVE-2018-14359: Fix buffer overflow via base64 data (bsc#1101570).
- CVE-2018-14358: Fix imap/message.c that has a stack-based buffer overflow for a FETCH response with along RFC822.SIZE field (bsc#1101571).
Bug fixes:
- bsc#936807: On entering a 70 character subject line in mutt, a tab is added to the text after 67 characters.
Patchnames
sleposp3-mutt-13736,slessp3-mutt-13736,slessp4-mutt-13736
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for mutt", title: "Title of the patch", }, { category: "description", text: "This update for mutt fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2018-14352: Fix imap_quote_string in imap/util.c that does not leave room for quote characters (bsc#1101582).\n- CVE-2018-14353: Fix imap_quote_string in imap/util.c that has an integer underflow (bsc#1101581).\n- CVE-2018-14362: Fix pop.c that does not forbid characters that may have unsafe interaction with message-cache pathnames (bsc#1101567).\n- CVE-2018-14354: Fix arbitrary command execution from remote IMAP servers via backquote characters (bsc#1101578).\n- CVE-2018-14356: Fix pop.c that mishandles a zero-length UID (bsc#1101576).\n- CVE-2018-14355: Fix imap/util.c that mishandles '..' directory traversal in a mailbox name (bsc#1101577).\n- CVE-2018-14349: Fix imap/command.c that mishandles a NO response without a message (bsc#1101589).\n- CVE-2018-14350: Fix imap/message.c that has a stack-based buffer overflow for a FETCH response with along INTERNALDATE field (bsc#1101588).\n- CVE-2018-14357: Fix that remote IMAP servers are allowed to execute arbitrary commands via backquote characters (bsc#1101573).\n- CVE-2018-14359: Fix buffer overflow via base64 data (bsc#1101570).\n- CVE-2018-14358: Fix imap/message.c that has a stack-based buffer overflow for a FETCH response with along RFC822.SIZE field (bsc#1101571).\n\n\nBug fixes:\n\n- bsc#936807: On entering a 70 character subject line in mutt, a tab is added to the text after 67 characters.\n", title: "Description of the patch", }, { category: "details", text: "sleposp3-mutt-13736,slessp3-mutt-13736,slessp4-mutt-13736", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2403-1.json", }, { category: "self", summary: "URL for SUSE-SU-2018:2403-1", url: "https://www.suse.com/support/update/announcement/2018/suse-su-20182403-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2018:2403-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2018-August/004462.html", }, { category: "self", summary: "SUSE Bug 1101567", url: "https://bugzilla.suse.com/1101567", }, { category: "self", summary: "SUSE Bug 1101570", url: "https://bugzilla.suse.com/1101570", }, { category: "self", summary: "SUSE Bug 1101571", url: "https://bugzilla.suse.com/1101571", }, { category: "self", summary: "SUSE Bug 1101573", url: "https://bugzilla.suse.com/1101573", }, { category: "self", summary: "SUSE Bug 1101576", url: "https://bugzilla.suse.com/1101576", }, { category: "self", summary: "SUSE Bug 1101577", url: "https://bugzilla.suse.com/1101577", }, { category: "self", summary: "SUSE Bug 1101578", url: "https://bugzilla.suse.com/1101578", }, { category: "self", summary: "SUSE Bug 1101581", url: "https://bugzilla.suse.com/1101581", }, { category: "self", summary: "SUSE Bug 1101582", url: "https://bugzilla.suse.com/1101582", }, { category: "self", summary: "SUSE Bug 1101588", url: "https://bugzilla.suse.com/1101588", }, { category: "self", summary: "SUSE Bug 1101589", url: "https://bugzilla.suse.com/1101589", }, { category: "self", summary: "SUSE Bug 936807", url: "https://bugzilla.suse.com/936807", }, { category: "self", summary: "SUSE CVE CVE-2018-14349 page", url: "https://www.suse.com/security/cve/CVE-2018-14349/", }, { category: "self", summary: "SUSE CVE CVE-2018-14350 page", url: "https://www.suse.com/security/cve/CVE-2018-14350/", }, { category: "self", summary: "SUSE CVE CVE-2018-14352 page", url: "https://www.suse.com/security/cve/CVE-2018-14352/", }, { category: "self", summary: "SUSE CVE CVE-2018-14353 page", url: "https://www.suse.com/security/cve/CVE-2018-14353/", }, { category: "self", summary: "SUSE CVE CVE-2018-14354 page", url: "https://www.suse.com/security/cve/CVE-2018-14354/", }, { category: "self", summary: "SUSE CVE CVE-2018-14355 page", url: "https://www.suse.com/security/cve/CVE-2018-14355/", }, { category: "self", summary: "SUSE CVE CVE-2018-14356 page", url: "https://www.suse.com/security/cve/CVE-2018-14356/", }, { category: "self", summary: "SUSE CVE CVE-2018-14357 page", url: "https://www.suse.com/security/cve/CVE-2018-14357/", }, { category: "self", summary: "SUSE CVE CVE-2018-14358 page", url: "https://www.suse.com/security/cve/CVE-2018-14358/", }, { category: "self", summary: "SUSE CVE CVE-2018-14359 page", url: "https://www.suse.com/security/cve/CVE-2018-14359/", }, { category: "self", summary: "SUSE CVE CVE-2018-14362 page", url: "https://www.suse.com/security/cve/CVE-2018-14362/", }, ], title: "Security update for mutt", tracking: { current_release_date: "2018-08-17T06:54:36Z", generator: { date: "2018-08-17T06:54:36Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2018:2403-1", initial_release_date: "2018-08-17T06:54:36Z", revision_history: [ { date: "2018-08-17T06:54:36Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "mutt-1.5.17-42.43.1.i586", product: { name: "mutt-1.5.17-42.43.1.i586", product_id: "mutt-1.5.17-42.43.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "mutt-1.5.17-42.43.1.ia64", product: { name: "mutt-1.5.17-42.43.1.ia64", product_id: "mutt-1.5.17-42.43.1.ia64", }, }, ], category: "architecture", name: "ia64", }, { branches: [ { category: "product_version", name: "mutt-1.5.17-42.43.1.ppc64", product: { name: "mutt-1.5.17-42.43.1.ppc64", product_id: "mutt-1.5.17-42.43.1.ppc64", }, }, ], category: "architecture", name: "ppc64", }, { branches: [ { category: "product_version", name: "mutt-1.5.17-42.43.1.s390x", product: { name: "mutt-1.5.17-42.43.1.s390x", product_id: "mutt-1.5.17-42.43.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "mutt-1.5.17-42.43.1.x86_64", product: { name: "mutt-1.5.17-42.43.1.x86_64", product_id: "mutt-1.5.17-42.43.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Point of Sale 11 SP3", product: { name: "SUSE Linux Enterprise Point of Sale 11 SP3", product_id: "SUSE Linux Enterprise Point of Sale 11 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sle-pos:11:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 11 SP3-LTSS", product: { name: "SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:suse_sles_ltss:11:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 11 SP3-TERADATA", product: { name: "SUSE Linux Enterprise Server 11 SP3-TERADATA", product_id: "SUSE Linux Enterprise Server 11 SP3-TERADATA", product_identification_helper: { cpe: "cpe:/o:suse:sles:11:sp3:teradata", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 11 SP4", product: { name: "SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4", product_identification_helper: { cpe: "cpe:/o:suse:suse_sles:11:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", product: { name: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:11:sp4", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "mutt-1.5.17-42.43.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", product_id: "SUSE Linux Enterprise Point of Sale 11 SP3:mutt-1.5.17-42.43.1.i586", }, product_reference: "mutt-1.5.17-42.43.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Point of Sale 11 SP3", }, { category: "default_component_of", full_product_name: { name: "mutt-1.5.17-42.43.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.i586", }, product_reference: "mutt-1.5.17-42.43.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "mutt-1.5.17-42.43.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.s390x", }, product_reference: "mutt-1.5.17-42.43.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "mutt-1.5.17-42.43.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.x86_64", }, product_reference: "mutt-1.5.17-42.43.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "mutt-1.5.17-42.43.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", product_id: "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.i586", }, product_reference: "mutt-1.5.17-42.43.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-TERADATA", }, { category: "default_component_of", full_product_name: { name: "mutt-1.5.17-42.43.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", product_id: "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.s390x", }, product_reference: "mutt-1.5.17-42.43.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-TERADATA", }, { category: "default_component_of", full_product_name: { name: "mutt-1.5.17-42.43.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", product_id: "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.x86_64", }, product_reference: "mutt-1.5.17-42.43.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-TERADATA", }, { category: "default_component_of", full_product_name: { name: "mutt-1.5.17-42.43.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.i586", }, product_reference: "mutt-1.5.17-42.43.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "mutt-1.5.17-42.43.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ia64", }, product_reference: "mutt-1.5.17-42.43.1.ia64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "mutt-1.5.17-42.43.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ppc64", }, product_reference: "mutt-1.5.17-42.43.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "mutt-1.5.17-42.43.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.s390x", }, product_reference: "mutt-1.5.17-42.43.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "mutt-1.5.17-42.43.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.x86_64", }, product_reference: "mutt-1.5.17-42.43.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "mutt-1.5.17-42.43.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.i586", }, product_reference: "mutt-1.5.17-42.43.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "mutt-1.5.17-42.43.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ia64", }, product_reference: "mutt-1.5.17-42.43.1.ia64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "mutt-1.5.17-42.43.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ppc64", }, product_reference: "mutt-1.5.17-42.43.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "mutt-1.5.17-42.43.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.s390x", }, product_reference: "mutt-1.5.17-42.43.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "mutt-1.5.17-42.43.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.x86_64", }, product_reference: "mutt-1.5.17-42.43.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, ], }, vulnerabilities: [ { cve: "CVE-2018-14349", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14349", }, ], notes: [ { category: "general", text: "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/command.c mishandles a NO response without a message.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Point of Sale 11 SP3:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14349", url: "https://www.suse.com/security/cve/CVE-2018-14349", }, { category: "external", summary: "SUSE Bug 1101428 for CVE-2018-14349", url: "https://bugzilla.suse.com/1101428", }, { category: "external", summary: "SUSE Bug 1101589 for CVE-2018-14349", url: "https://bugzilla.suse.com/1101589", }, { category: "external", summary: "SUSE Bug 1101593 for CVE-2018-14349", url: "https://bugzilla.suse.com/1101593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Point of Sale 11 SP3:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Point of Sale 11 SP3:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-08-17T06:54:36Z", details: "moderate", }, ], title: "CVE-2018-14349", }, { cve: "CVE-2018-14350", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14350", }, ], notes: [ { category: "general", text: "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/message.c has a stack-based buffer overflow for a FETCH response with a long INTERNALDATE field.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Point of Sale 11 SP3:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14350", url: "https://www.suse.com/security/cve/CVE-2018-14350", }, { category: "external", summary: "SUSE Bug 1101428 for CVE-2018-14350", url: "https://bugzilla.suse.com/1101428", }, { category: "external", summary: "SUSE Bug 1101588 for CVE-2018-14350", url: "https://bugzilla.suse.com/1101588", }, { category: "external", summary: "SUSE Bug 1101593 for CVE-2018-14350", url: "https://bugzilla.suse.com/1101593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Point of Sale 11 SP3:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Point of Sale 11 SP3:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-08-17T06:54:36Z", details: "moderate", }, ], title: "CVE-2018-14350", }, { cve: "CVE-2018-14352", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14352", }, ], notes: [ { category: "general", text: "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap_quote_string in imap/util.c does not leave room for quote characters, leading to a stack-based buffer overflow.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Point of Sale 11 SP3:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14352", url: "https://www.suse.com/security/cve/CVE-2018-14352", }, { category: "external", summary: "SUSE Bug 1101428 for CVE-2018-14352", url: "https://bugzilla.suse.com/1101428", }, { category: "external", summary: "SUSE Bug 1101582 for CVE-2018-14352", url: "https://bugzilla.suse.com/1101582", }, { category: "external", summary: "SUSE Bug 1101593 for CVE-2018-14352", url: "https://bugzilla.suse.com/1101593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Point of Sale 11 SP3:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Point of Sale 11 SP3:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-08-17T06:54:36Z", details: "moderate", }, ], title: "CVE-2018-14352", }, { cve: "CVE-2018-14353", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14353", }, ], notes: [ { category: "general", text: "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap_quote_string in imap/util.c has an integer underflow.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Point of Sale 11 SP3:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14353", url: "https://www.suse.com/security/cve/CVE-2018-14353", }, { category: "external", summary: "SUSE Bug 1101428 for CVE-2018-14353", url: "https://bugzilla.suse.com/1101428", }, { category: "external", summary: "SUSE Bug 1101581 for CVE-2018-14353", url: "https://bugzilla.suse.com/1101581", }, { category: "external", summary: "SUSE Bug 1101593 for CVE-2018-14353", url: "https://bugzilla.suse.com/1101593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Point of Sale 11 SP3:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Point of Sale 11 SP3:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-08-17T06:54:36Z", details: "moderate", }, ], title: "CVE-2018-14353", }, { cve: "CVE-2018-14354", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14354", }, ], notes: [ { category: "general", text: "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. They allow remote IMAP servers to execute arbitrary commands via backquote characters, related to the mailboxes command associated with a manual subscription or unsubscription.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Point of Sale 11 SP3:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14354", url: "https://www.suse.com/security/cve/CVE-2018-14354", }, { category: "external", summary: "SUSE Bug 1101428 for CVE-2018-14354", url: "https://bugzilla.suse.com/1101428", }, { category: "external", summary: "SUSE Bug 1101578 for CVE-2018-14354", url: "https://bugzilla.suse.com/1101578", }, { category: "external", summary: "SUSE Bug 1101581 for CVE-2018-14354", url: "https://bugzilla.suse.com/1101581", }, { category: "external", summary: "SUSE Bug 1101589 for CVE-2018-14354", url: "https://bugzilla.suse.com/1101589", }, { category: "external", summary: "SUSE Bug 1101593 for CVE-2018-14354", url: "https://bugzilla.suse.com/1101593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Point of Sale 11 SP3:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.6, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Point of Sale 11 SP3:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-08-17T06:54:36Z", details: "critical", }, ], title: "CVE-2018-14354", }, { cve: "CVE-2018-14355", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14355", }, ], notes: [ { category: "general", text: "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/util.c mishandles \"..\" directory traversal in a mailbox name.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Point of Sale 11 SP3:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14355", url: "https://www.suse.com/security/cve/CVE-2018-14355", }, { category: "external", summary: "SUSE Bug 1101428 for CVE-2018-14355", url: "https://bugzilla.suse.com/1101428", }, { category: "external", summary: "SUSE Bug 1101577 for CVE-2018-14355", url: "https://bugzilla.suse.com/1101577", }, { category: "external", summary: "SUSE Bug 1101593 for CVE-2018-14355", url: "https://bugzilla.suse.com/1101593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Point of Sale 11 SP3:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Point of Sale 11 SP3:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-08-17T06:54:36Z", details: "moderate", }, ], title: "CVE-2018-14355", }, { cve: "CVE-2018-14356", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14356", }, ], notes: [ { category: "general", text: "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. pop.c mishandles a zero-length UID.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Point of Sale 11 SP3:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14356", url: "https://www.suse.com/security/cve/CVE-2018-14356", }, { category: "external", summary: "SUSE Bug 1101428 for CVE-2018-14356", url: "https://bugzilla.suse.com/1101428", }, { category: "external", summary: "SUSE Bug 1101576 for CVE-2018-14356", url: "https://bugzilla.suse.com/1101576", }, { category: "external", summary: "SUSE Bug 1101589 for CVE-2018-14356", url: "https://bugzilla.suse.com/1101589", }, { category: "external", summary: "SUSE Bug 1101593 for CVE-2018-14356", url: "https://bugzilla.suse.com/1101593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Point of Sale 11 SP3:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Point of Sale 11 SP3:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-08-17T06:54:36Z", details: "moderate", }, ], title: "CVE-2018-14356", }, { cve: "CVE-2018-14357", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14357", }, ], notes: [ { category: "general", text: "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. They allow remote IMAP servers to execute arbitrary commands via backquote characters, related to the mailboxes command associated with an automatic subscription.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Point of Sale 11 SP3:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14357", url: "https://www.suse.com/security/cve/CVE-2018-14357", }, { category: "external", summary: "SUSE Bug 1101428 for CVE-2018-14357", url: "https://bugzilla.suse.com/1101428", }, { category: "external", summary: "SUSE Bug 1101573 for CVE-2018-14357", url: "https://bugzilla.suse.com/1101573", }, { category: "external", summary: "SUSE Bug 1101581 for CVE-2018-14357", url: "https://bugzilla.suse.com/1101581", }, { category: "external", summary: "SUSE Bug 1101589 for CVE-2018-14357", url: "https://bugzilla.suse.com/1101589", }, { category: "external", summary: "SUSE Bug 1101593 for CVE-2018-14357", url: "https://bugzilla.suse.com/1101593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Point of Sale 11 SP3:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.1, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Point of Sale 11 SP3:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-08-17T06:54:36Z", details: "important", }, ], title: "CVE-2018-14357", }, { cve: "CVE-2018-14358", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14358", }, ], notes: [ { category: "general", text: "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/message.c has a stack-based buffer overflow for a FETCH response with a long RFC822.SIZE field.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Point of Sale 11 SP3:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14358", url: "https://www.suse.com/security/cve/CVE-2018-14358", }, { category: "external", summary: "SUSE Bug 1101428 for CVE-2018-14358", url: "https://bugzilla.suse.com/1101428", }, { category: "external", summary: "SUSE Bug 1101571 for CVE-2018-14358", url: "https://bugzilla.suse.com/1101571", }, { category: "external", summary: "SUSE Bug 1101593 for CVE-2018-14358", url: "https://bugzilla.suse.com/1101593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Point of Sale 11 SP3:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Point of Sale 11 SP3:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-08-17T06:54:36Z", details: "moderate", }, ], title: "CVE-2018-14358", }, { cve: "CVE-2018-14359", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14359", }, ], notes: [ { category: "general", text: "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. They have a buffer overflow via base64 data.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Point of Sale 11 SP3:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14359", url: "https://www.suse.com/security/cve/CVE-2018-14359", }, { category: "external", summary: "SUSE Bug 1101428 for CVE-2018-14359", url: "https://bugzilla.suse.com/1101428", }, { category: "external", summary: "SUSE Bug 1101570 for CVE-2018-14359", url: "https://bugzilla.suse.com/1101570", }, { category: "external", summary: "SUSE Bug 1101589 for CVE-2018-14359", url: "https://bugzilla.suse.com/1101589", }, { category: "external", summary: "SUSE Bug 1101593 for CVE-2018-14359", url: "https://bugzilla.suse.com/1101593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Point of Sale 11 SP3:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Point of Sale 11 SP3:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-08-17T06:54:36Z", details: "moderate", }, ], title: "CVE-2018-14359", }, { cve: "CVE-2018-14362", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14362", }, ], notes: [ { category: "general", text: "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. pop.c does not forbid characters that may have unsafe interaction with message-cache pathnames, as demonstrated by a '/' character.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Point of Sale 11 SP3:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14362", url: "https://www.suse.com/security/cve/CVE-2018-14362", }, { category: "external", summary: "SUSE Bug 1101428 for CVE-2018-14362", url: "https://bugzilla.suse.com/1101428", }, { category: "external", summary: "SUSE Bug 1101567 for CVE-2018-14362", url: "https://bugzilla.suse.com/1101567", }, { category: "external", summary: "SUSE Bug 1101589 for CVE-2018-14362", url: "https://bugzilla.suse.com/1101589", }, { category: "external", summary: "SUSE Bug 1101593 for CVE-2018-14362", url: "https://bugzilla.suse.com/1101593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Point of Sale 11 SP3:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Point of Sale 11 SP3:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-08-17T06:54:36Z", details: "moderate", }, ], title: "CVE-2018-14362", }, ], }
suse-su-2018:2085-1
Vulnerability from csaf_suse
Published
2018-07-27 10:47
Modified
2018-07-27 10:47
Summary
Security update for mutt
Notes
Title of the patch
Security update for mutt
Description of the patch
This update for mutt fixes the following issues:
Security issues fixed:
- bsc#1101428: Mutt 1.10.1 security release update.
- CVE-2018-14351: Fix imap/command.c that mishandles long IMAP status mailbox literal count size (bsc#1101583).
- CVE-2018-14353: Fix imap_quote_string in imap/util.c that has an integer underflow (bsc#1101581).
- CVE-2018-14362: Fix pop.c that does not forbid characters that may have unsafe interaction with message-cache pathnames (bsc#1101567).
- CVE-2018-14354: Fix arbitrary command execution from remote IMAP servers via backquote characters (bsc#1101578).
- CVE-2018-14352: Fix imap_quote_string in imap/util.c that does not leave room for quote characters (bsc#1101582).
- CVE-2018-14356: Fix pop.c that mishandles a zero-length UID (bsc#1101576).
- CVE-2018-14355: Fix imap/util.c that mishandles '..' directory traversal in a mailbox name (bsc#1101577).
- CVE-2018-14349: Fix imap/command.c that mishandles a NO response without a message (bsc#1101589).
- CVE-2018-14350: Fix imap/message.c that has a stack-based buffer overflow for a FETCH response with along INTERNALDATE field (bsc#1101588).
- CVE-2018-14363: Fix newsrc.c that does not properlyrestrict '/' characters that may have unsafe interaction with cache pathnames (bsc#1101566).
- CVE-2018-14359: Fix buffer overflow via base64 data (bsc#1101570).
- CVE-2018-14358: Fix imap/message.c that has a stack-based buffer overflow for a FETCH response with along RFC822.SIZE field (bsc#1101571).
- CVE-2018-14360: Fix nntp_add_group in newsrc.c that has a stack-based buffer overflow because of incorrect sscanf usage (bsc#1101569).
- CVE-2018-14357: Fix that remote IMAP servers are allowed to execute arbitrary commands via backquote characters (bsc#1101573).
- CVE-2018-14361: Fix that nntp.c proceeds even if memory allocation fails for messages data (bsc#1101568).
Bug fixes:
- mutt reports as neomutt and incorrect version (bsc#1094717)
Patchnames
SUSE-SLE-Module-Basesystem-15-2018-1416
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for mutt", title: "Title of the patch", }, { category: "description", text: "This update for mutt fixes the following issues:\n\nSecurity issues fixed:\n\n- bsc#1101428: Mutt 1.10.1 security release update.\n- CVE-2018-14351: Fix imap/command.c that mishandles long IMAP status mailbox literal count size (bsc#1101583).\n- CVE-2018-14353: Fix imap_quote_string in imap/util.c that has an integer underflow (bsc#1101581).\n- CVE-2018-14362: Fix pop.c that does not forbid characters that may have unsafe interaction with message-cache pathnames (bsc#1101567).\n- CVE-2018-14354: Fix arbitrary command execution from remote IMAP servers via backquote characters (bsc#1101578).\n- CVE-2018-14352: Fix imap_quote_string in imap/util.c that does not leave room for quote characters (bsc#1101582).\n- CVE-2018-14356: Fix pop.c that mishandles a zero-length UID (bsc#1101576).\n- CVE-2018-14355: Fix imap/util.c that mishandles '..' directory traversal in a mailbox name (bsc#1101577).\n- CVE-2018-14349: Fix imap/command.c that mishandles a NO response without a message (bsc#1101589).\n- CVE-2018-14350: Fix imap/message.c that has a stack-based buffer overflow for a FETCH response with along INTERNALDATE field (bsc#1101588).\n- CVE-2018-14363: Fix newsrc.c that does not properlyrestrict '/' characters that may have unsafe interaction with cache pathnames (bsc#1101566).\n- CVE-2018-14359: Fix buffer overflow via base64 data (bsc#1101570).\n- CVE-2018-14358: Fix imap/message.c that has a stack-based buffer overflow for a FETCH response with along RFC822.SIZE field (bsc#1101571).\n- CVE-2018-14360: Fix nntp_add_group in newsrc.c that has a stack-based buffer overflow because of incorrect sscanf usage (bsc#1101569).\n- CVE-2018-14357: Fix that remote IMAP servers are allowed to execute arbitrary commands via backquote characters (bsc#1101573).\n- CVE-2018-14361: Fix that nntp.c proceeds even if memory allocation fails for messages data (bsc#1101568).\n\nBug fixes:\n\n- mutt reports as neomutt and incorrect version (bsc#1094717)\n", title: "Description of the patch", }, { category: "details", text: "SUSE-SLE-Module-Basesystem-15-2018-1416", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2085-1.json", }, { category: "self", summary: "URL for SUSE-SU-2018:2085-1", url: "https://www.suse.com/support/update/announcement/2018/suse-su-20182085-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2018:2085-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2018-July/004327.html", }, { category: "self", summary: "SUSE Bug 1094717", url: "https://bugzilla.suse.com/1094717", }, { category: "self", summary: "SUSE Bug 1101428", url: "https://bugzilla.suse.com/1101428", }, { category: "self", summary: "SUSE Bug 1101566", url: "https://bugzilla.suse.com/1101566", }, { category: "self", summary: "SUSE Bug 1101567", url: "https://bugzilla.suse.com/1101567", }, { category: "self", summary: "SUSE Bug 1101568", url: "https://bugzilla.suse.com/1101568", }, { category: "self", summary: "SUSE Bug 1101569", url: "https://bugzilla.suse.com/1101569", }, { category: "self", summary: "SUSE Bug 1101570", url: "https://bugzilla.suse.com/1101570", }, { category: "self", summary: "SUSE Bug 1101571", url: "https://bugzilla.suse.com/1101571", }, { category: "self", summary: "SUSE Bug 1101573", url: "https://bugzilla.suse.com/1101573", }, { category: "self", summary: "SUSE Bug 1101576", url: "https://bugzilla.suse.com/1101576", }, { category: "self", summary: "SUSE Bug 1101577", url: "https://bugzilla.suse.com/1101577", }, { category: "self", summary: "SUSE Bug 1101578", url: "https://bugzilla.suse.com/1101578", }, { category: "self", summary: "SUSE Bug 1101581", url: "https://bugzilla.suse.com/1101581", }, { category: "self", summary: "SUSE Bug 1101582", url: "https://bugzilla.suse.com/1101582", }, { category: "self", summary: "SUSE Bug 1101583", url: "https://bugzilla.suse.com/1101583", }, { category: "self", summary: "SUSE Bug 1101588", url: "https://bugzilla.suse.com/1101588", }, { category: "self", summary: "SUSE Bug 1101589", url: "https://bugzilla.suse.com/1101589", }, { category: "self", summary: "SUSE CVE CVE-2014-9116 page", url: "https://www.suse.com/security/cve/CVE-2014-9116/", }, { category: "self", summary: "SUSE CVE CVE-2018-14349 page", url: "https://www.suse.com/security/cve/CVE-2018-14349/", }, { category: "self", summary: "SUSE CVE CVE-2018-14350 page", url: "https://www.suse.com/security/cve/CVE-2018-14350/", }, { category: "self", summary: "SUSE CVE CVE-2018-14351 page", url: "https://www.suse.com/security/cve/CVE-2018-14351/", }, { category: "self", summary: "SUSE CVE CVE-2018-14352 page", url: "https://www.suse.com/security/cve/CVE-2018-14352/", }, { category: "self", summary: "SUSE CVE CVE-2018-14353 page", url: "https://www.suse.com/security/cve/CVE-2018-14353/", }, { category: "self", summary: "SUSE CVE CVE-2018-14354 page", url: "https://www.suse.com/security/cve/CVE-2018-14354/", }, { category: "self", summary: "SUSE CVE CVE-2018-14355 page", url: "https://www.suse.com/security/cve/CVE-2018-14355/", }, { category: "self", summary: "SUSE CVE CVE-2018-14356 page", url: "https://www.suse.com/security/cve/CVE-2018-14356/", }, { category: "self", summary: "SUSE CVE CVE-2018-14357 page", url: "https://www.suse.com/security/cve/CVE-2018-14357/", }, { category: "self", summary: "SUSE CVE CVE-2018-14358 page", url: "https://www.suse.com/security/cve/CVE-2018-14358/", }, { category: "self", summary: "SUSE CVE CVE-2018-14359 page", url: "https://www.suse.com/security/cve/CVE-2018-14359/", }, { category: "self", summary: "SUSE CVE CVE-2018-14360 page", url: "https://www.suse.com/security/cve/CVE-2018-14360/", }, { category: "self", summary: "SUSE CVE CVE-2018-14361 page", url: "https://www.suse.com/security/cve/CVE-2018-14361/", }, { category: "self", summary: "SUSE CVE CVE-2018-14362 page", url: "https://www.suse.com/security/cve/CVE-2018-14362/", }, { category: "self", summary: "SUSE CVE CVE-2018-14363 page", url: "https://www.suse.com/security/cve/CVE-2018-14363/", }, ], title: "Security update for mutt", tracking: { current_release_date: "2018-07-27T10:47:58Z", generator: { date: "2018-07-27T10:47:58Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2018:2085-1", initial_release_date: "2018-07-27T10:47:58Z", revision_history: [ { date: "2018-07-27T10:47:58Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "mutt-1.10.1-3.3.4.aarch64", product: { name: "mutt-1.10.1-3.3.4.aarch64", product_id: "mutt-1.10.1-3.3.4.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "mutt-doc-1.10.1-3.3.4.noarch", product: { name: "mutt-doc-1.10.1-3.3.4.noarch", product_id: "mutt-doc-1.10.1-3.3.4.noarch", }, }, { category: "product_version", name: "mutt-lang-1.10.1-3.3.4.noarch", product: { name: "mutt-lang-1.10.1-3.3.4.noarch", product_id: "mutt-lang-1.10.1-3.3.4.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "mutt-1.10.1-3.3.4.ppc64le", product: { name: "mutt-1.10.1-3.3.4.ppc64le", product_id: "mutt-1.10.1-3.3.4.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "mutt-1.10.1-3.3.4.s390x", product: { name: "mutt-1.10.1-3.3.4.s390x", product_id: "mutt-1.10.1-3.3.4.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "mutt-1.10.1-3.3.4.x86_64", product: { name: "mutt-1.10.1-3.3.4.x86_64", product_id: "mutt-1.10.1-3.3.4.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Basesystem 15", product: { name: "SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-basesystem:15", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "mutt-1.10.1-3.3.4.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", }, product_reference: "mutt-1.10.1-3.3.4.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "mutt-1.10.1-3.3.4.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", }, product_reference: "mutt-1.10.1-3.3.4.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "mutt-1.10.1-3.3.4.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", }, product_reference: "mutt-1.10.1-3.3.4.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "mutt-1.10.1-3.3.4.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", }, product_reference: "mutt-1.10.1-3.3.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "mutt-doc-1.10.1-3.3.4.noarch as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", }, product_reference: "mutt-doc-1.10.1-3.3.4.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "mutt-lang-1.10.1-3.3.4.noarch as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch", }, product_reference: "mutt-lang-1.10.1-3.3.4.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, ], }, vulnerabilities: [ { cve: "CVE-2014-9116", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-9116", }, ], notes: [ { category: "general", text: "The write_one_header function in mutt 1.5.23 does not properly handle newline characters at the beginning of a header, which allows remote attackers to cause a denial of service (crash) via a header with an empty body, which triggers a heap-based buffer overflow in the mutt_substrdup function.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch", ], }, references: [ { category: "external", summary: "CVE-2014-9116", url: "https://www.suse.com/security/cve/CVE-2014-9116", }, { category: "external", summary: "SUSE Bug 907453 for CVE-2014-9116", url: "https://bugzilla.suse.com/907453", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch", ], }, ], threats: [ { category: "impact", date: "2018-07-27T10:47:58Z", details: "moderate", }, ], title: "CVE-2014-9116", }, { cve: "CVE-2018-14349", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14349", }, ], notes: [ { category: "general", text: "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/command.c mishandles a NO response without a message.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch", ], }, references: [ { category: "external", summary: "CVE-2018-14349", url: "https://www.suse.com/security/cve/CVE-2018-14349", }, { category: "external", summary: "SUSE Bug 1101428 for CVE-2018-14349", url: "https://bugzilla.suse.com/1101428", }, { category: "external", summary: "SUSE Bug 1101589 for CVE-2018-14349", url: "https://bugzilla.suse.com/1101589", }, { category: "external", summary: "SUSE Bug 1101593 for CVE-2018-14349", url: "https://bugzilla.suse.com/1101593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch", ], }, ], threats: [ { category: "impact", date: "2018-07-27T10:47:58Z", details: "moderate", }, ], title: "CVE-2018-14349", }, { cve: "CVE-2018-14350", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14350", }, ], notes: [ { category: "general", text: "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/message.c has a stack-based buffer overflow for a FETCH response with a long INTERNALDATE field.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch", ], }, references: [ { category: "external", summary: "CVE-2018-14350", url: "https://www.suse.com/security/cve/CVE-2018-14350", }, { category: "external", summary: "SUSE Bug 1101428 for CVE-2018-14350", url: "https://bugzilla.suse.com/1101428", }, { category: "external", summary: "SUSE Bug 1101588 for CVE-2018-14350", url: "https://bugzilla.suse.com/1101588", }, { category: "external", summary: "SUSE Bug 1101593 for CVE-2018-14350", url: "https://bugzilla.suse.com/1101593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 6.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch", ], }, ], threats: [ { category: "impact", date: "2018-07-27T10:47:58Z", details: "moderate", }, ], title: "CVE-2018-14350", }, { cve: "CVE-2018-14351", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14351", }, ], notes: [ { category: "general", text: "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/command.c mishandles a long IMAP status mailbox literal count size.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch", ], }, references: [ { category: "external", summary: "CVE-2018-14351", url: "https://www.suse.com/security/cve/CVE-2018-14351", }, { category: "external", summary: "SUSE Bug 1101428 for CVE-2018-14351", url: "https://bugzilla.suse.com/1101428", }, { category: "external", summary: "SUSE Bug 1101583 for CVE-2018-14351", url: "https://bugzilla.suse.com/1101583", }, { category: "external", summary: "SUSE Bug 1101593 for CVE-2018-14351", url: "https://bugzilla.suse.com/1101593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.3, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch", ], }, ], threats: [ { category: "impact", date: "2018-07-27T10:47:58Z", details: "important", }, ], title: "CVE-2018-14351", }, { cve: "CVE-2018-14352", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14352", }, ], notes: [ { category: "general", text: "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap_quote_string in imap/util.c does not leave room for quote characters, leading to a stack-based buffer overflow.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch", ], }, references: [ { category: "external", summary: "CVE-2018-14352", url: "https://www.suse.com/security/cve/CVE-2018-14352", }, { category: "external", summary: "SUSE Bug 1101428 for CVE-2018-14352", url: "https://bugzilla.suse.com/1101428", }, { category: "external", summary: "SUSE Bug 1101582 for CVE-2018-14352", url: "https://bugzilla.suse.com/1101582", }, { category: "external", summary: "SUSE Bug 1101593 for CVE-2018-14352", url: "https://bugzilla.suse.com/1101593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 6.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch", ], }, ], threats: [ { category: "impact", date: "2018-07-27T10:47:58Z", details: "moderate", }, ], title: "CVE-2018-14352", }, { cve: "CVE-2018-14353", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14353", }, ], notes: [ { category: "general", text: "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap_quote_string in imap/util.c has an integer underflow.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch", ], }, references: [ { category: "external", summary: "CVE-2018-14353", url: "https://www.suse.com/security/cve/CVE-2018-14353", }, { category: "external", summary: "SUSE Bug 1101428 for CVE-2018-14353", url: "https://bugzilla.suse.com/1101428", }, { category: "external", summary: "SUSE Bug 1101581 for CVE-2018-14353", url: "https://bugzilla.suse.com/1101581", }, { category: "external", summary: "SUSE Bug 1101593 for CVE-2018-14353", url: "https://bugzilla.suse.com/1101593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 6.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch", ], }, ], threats: [ { category: "impact", date: "2018-07-27T10:47:58Z", details: "moderate", }, ], title: "CVE-2018-14353", }, { cve: "CVE-2018-14354", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14354", }, ], notes: [ { category: "general", text: "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. They allow remote IMAP servers to execute arbitrary commands via backquote characters, related to the mailboxes command associated with a manual subscription or unsubscription.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch", ], }, references: [ { category: "external", summary: "CVE-2018-14354", url: "https://www.suse.com/security/cve/CVE-2018-14354", }, { category: "external", summary: "SUSE Bug 1101428 for CVE-2018-14354", url: "https://bugzilla.suse.com/1101428", }, { category: "external", summary: "SUSE Bug 1101578 for CVE-2018-14354", url: "https://bugzilla.suse.com/1101578", }, { category: "external", summary: "SUSE Bug 1101581 for CVE-2018-14354", url: "https://bugzilla.suse.com/1101581", }, { category: "external", summary: "SUSE Bug 1101589 for CVE-2018-14354", url: "https://bugzilla.suse.com/1101589", }, { category: "external", summary: "SUSE Bug 1101593 for CVE-2018-14354", url: "https://bugzilla.suse.com/1101593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 9.6, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch", ], }, ], threats: [ { category: "impact", date: "2018-07-27T10:47:58Z", details: "critical", }, ], title: "CVE-2018-14354", }, { cve: "CVE-2018-14355", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14355", }, ], notes: [ { category: "general", text: "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/util.c mishandles \"..\" directory traversal in a mailbox name.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch", ], }, references: [ { category: "external", summary: "CVE-2018-14355", url: "https://www.suse.com/security/cve/CVE-2018-14355", }, { category: "external", summary: "SUSE Bug 1101428 for CVE-2018-14355", url: "https://bugzilla.suse.com/1101428", }, { category: "external", summary: "SUSE Bug 1101577 for CVE-2018-14355", url: "https://bugzilla.suse.com/1101577", }, { category: "external", summary: "SUSE Bug 1101593 for CVE-2018-14355", url: "https://bugzilla.suse.com/1101593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch", ], }, ], threats: [ { category: "impact", date: "2018-07-27T10:47:58Z", details: "moderate", }, ], title: "CVE-2018-14355", }, { cve: "CVE-2018-14356", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14356", }, ], notes: [ { category: "general", text: "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. pop.c mishandles a zero-length UID.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch", ], }, references: [ { category: "external", summary: "CVE-2018-14356", url: "https://www.suse.com/security/cve/CVE-2018-14356", }, { category: "external", summary: "SUSE Bug 1101428 for CVE-2018-14356", url: "https://bugzilla.suse.com/1101428", }, { category: "external", summary: "SUSE Bug 1101576 for CVE-2018-14356", url: "https://bugzilla.suse.com/1101576", }, { category: "external", summary: "SUSE Bug 1101589 for CVE-2018-14356", url: "https://bugzilla.suse.com/1101589", }, { category: "external", summary: "SUSE Bug 1101593 for CVE-2018-14356", url: "https://bugzilla.suse.com/1101593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch", ], }, ], threats: [ { category: "impact", date: "2018-07-27T10:47:58Z", details: "moderate", }, ], title: "CVE-2018-14356", }, { cve: "CVE-2018-14357", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14357", }, ], notes: [ { category: "general", text: "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. They allow remote IMAP servers to execute arbitrary commands via backquote characters, related to the mailboxes command associated with an automatic subscription.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch", ], }, references: [ { category: "external", summary: "CVE-2018-14357", url: "https://www.suse.com/security/cve/CVE-2018-14357", }, { category: "external", summary: "SUSE Bug 1101428 for CVE-2018-14357", url: "https://bugzilla.suse.com/1101428", }, { category: "external", summary: "SUSE Bug 1101573 for CVE-2018-14357", url: "https://bugzilla.suse.com/1101573", }, { category: "external", summary: "SUSE Bug 1101581 for CVE-2018-14357", url: "https://bugzilla.suse.com/1101581", }, { category: "external", summary: "SUSE Bug 1101589 for CVE-2018-14357", url: "https://bugzilla.suse.com/1101589", }, { category: "external", summary: "SUSE Bug 1101593 for CVE-2018-14357", url: "https://bugzilla.suse.com/1101593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.1, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch", ], }, ], threats: [ { category: "impact", date: "2018-07-27T10:47:58Z", details: "important", }, ], title: "CVE-2018-14357", }, { cve: "CVE-2018-14358", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14358", }, ], notes: [ { category: "general", text: "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/message.c has a stack-based buffer overflow for a FETCH response with a long RFC822.SIZE field.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch", ], }, references: [ { category: "external", summary: "CVE-2018-14358", url: "https://www.suse.com/security/cve/CVE-2018-14358", }, { category: "external", summary: "SUSE Bug 1101428 for CVE-2018-14358", url: "https://bugzilla.suse.com/1101428", }, { category: "external", summary: "SUSE Bug 1101571 for CVE-2018-14358", url: "https://bugzilla.suse.com/1101571", }, { category: "external", summary: "SUSE Bug 1101593 for CVE-2018-14358", url: "https://bugzilla.suse.com/1101593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 6.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch", ], }, ], threats: [ { category: "impact", date: "2018-07-27T10:47:58Z", details: "moderate", }, ], title: "CVE-2018-14358", }, { cve: "CVE-2018-14359", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14359", }, ], notes: [ { category: "general", text: "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. They have a buffer overflow via base64 data.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch", ], }, references: [ { category: "external", summary: "CVE-2018-14359", url: "https://www.suse.com/security/cve/CVE-2018-14359", }, { category: "external", summary: "SUSE Bug 1101428 for CVE-2018-14359", url: "https://bugzilla.suse.com/1101428", }, { category: "external", summary: "SUSE Bug 1101570 for CVE-2018-14359", url: "https://bugzilla.suse.com/1101570", }, { category: "external", summary: "SUSE Bug 1101589 for CVE-2018-14359", url: "https://bugzilla.suse.com/1101589", }, { category: "external", summary: "SUSE Bug 1101593 for CVE-2018-14359", url: "https://bugzilla.suse.com/1101593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 6.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch", ], }, ], threats: [ { category: "impact", date: "2018-07-27T10:47:58Z", details: "moderate", }, ], title: "CVE-2018-14359", }, { cve: "CVE-2018-14360", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14360", }, ], notes: [ { category: "general", text: "An issue was discovered in NeoMutt before 2018-07-16. nntp_add_group in newsrc.c has a stack-based buffer overflow because of incorrect sscanf usage.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch", ], }, references: [ { category: "external", summary: "CVE-2018-14360", url: "https://www.suse.com/security/cve/CVE-2018-14360", }, { category: "external", summary: "SUSE Bug 1101428 for CVE-2018-14360", url: "https://bugzilla.suse.com/1101428", }, { category: "external", summary: "SUSE Bug 1101569 for CVE-2018-14360", url: "https://bugzilla.suse.com/1101569", }, { category: "external", summary: "SUSE Bug 1101593 for CVE-2018-14360", url: "https://bugzilla.suse.com/1101593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch", ], }, ], threats: [ { category: "impact", date: "2018-07-27T10:47:58Z", details: "critical", }, ], title: "CVE-2018-14360", }, { cve: "CVE-2018-14361", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14361", }, ], notes: [ { category: "general", text: "An issue was discovered in NeoMutt before 2018-07-16. nntp.c proceeds even if memory allocation fails for messages data.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch", ], }, references: [ { category: "external", summary: "CVE-2018-14361", url: "https://www.suse.com/security/cve/CVE-2018-14361", }, { category: "external", summary: "SUSE Bug 1101428 for CVE-2018-14361", url: "https://bugzilla.suse.com/1101428", }, { category: "external", summary: "SUSE Bug 1101568 for CVE-2018-14361", url: "https://bugzilla.suse.com/1101568", }, { category: "external", summary: "SUSE Bug 1101593 for CVE-2018-14361", url: "https://bugzilla.suse.com/1101593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch", ], }, ], threats: [ { category: "impact", date: "2018-07-27T10:47:58Z", details: "critical", }, ], title: "CVE-2018-14361", }, { cve: "CVE-2018-14362", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14362", }, ], notes: [ { category: "general", text: "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. pop.c does not forbid characters that may have unsafe interaction with message-cache pathnames, as demonstrated by a '/' character.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch", ], }, references: [ { category: "external", summary: "CVE-2018-14362", url: "https://www.suse.com/security/cve/CVE-2018-14362", }, { category: "external", summary: "SUSE Bug 1101428 for CVE-2018-14362", url: "https://bugzilla.suse.com/1101428", }, { category: "external", summary: "SUSE Bug 1101567 for CVE-2018-14362", url: "https://bugzilla.suse.com/1101567", }, { category: "external", summary: "SUSE Bug 1101589 for CVE-2018-14362", url: "https://bugzilla.suse.com/1101589", }, { category: "external", summary: "SUSE Bug 1101593 for CVE-2018-14362", url: "https://bugzilla.suse.com/1101593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch", ], }, ], threats: [ { category: "impact", date: "2018-07-27T10:47:58Z", details: "moderate", }, ], title: "CVE-2018-14362", }, { cve: "CVE-2018-14363", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14363", }, ], notes: [ { category: "general", text: "An issue was discovered in NeoMutt before 2018-07-16. newsrc.c does not properly restrict '/' characters that may have unsafe interaction with cache pathnames.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch", ], }, references: [ { category: "external", summary: "CVE-2018-14363", url: "https://www.suse.com/security/cve/CVE-2018-14363", }, { category: "external", summary: "SUSE Bug 1101428 for CVE-2018-14363", url: "https://bugzilla.suse.com/1101428", }, { category: "external", summary: "SUSE Bug 1101566 for CVE-2018-14363", url: "https://bugzilla.suse.com/1101566", }, { category: "external", summary: "SUSE Bug 1101593 for CVE-2018-14363", url: "https://bugzilla.suse.com/1101593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch", ], }, ], threats: [ { category: "impact", date: "2018-07-27T10:47:58Z", details: "important", }, ], title: "CVE-2018-14363", }, ], }
suse-su-2019:1196-1
Vulnerability from csaf_suse
Published
2019-05-09 06:14
Modified
2019-05-09 06:14
Summary
Security update for mutt
Notes
Title of the patch
Security update for mutt
Description of the patch
This update for mutt fixes the following issues:
Security issues fixed:
- bsc#1101428: Mutt 1.10.1 security release update.
- CVE-2018-14351: Fix imap/command.c that mishandles long IMAP status mailbox literal count size (bsc#1101583).
- CVE-2018-14353: Fix imap_quote_string in imap/util.c that has an integer underflow (bsc#1101581).
- CVE-2018-14362: Fix pop.c that does not forbid characters that may have unsafe interaction with message-cache pathnames (bsc#1101567).
- CVE-2018-14354: Fix arbitrary command execution from remote IMAP servers via backquote characters (bsc#1101578).
- CVE-2018-14352: Fix imap_quote_string in imap/util.c that does not leave room for quote characters (bsc#1101582).
- CVE-2018-14356: Fix pop.c that mishandles a zero-length UID (bsc#1101576).
- CVE-2018-14355: Fix imap/util.c that mishandles '..' directory traversal in a mailbox name (bsc#1101577).
- CVE-2018-14349: Fix imap/command.c that mishandles a NO response without a message (bsc#1101589).
- CVE-2018-14350: Fix imap/message.c that has a stack-based buffer overflow for a FETCH response with along INTERNALDATE field (bsc#1101588).
- CVE-2018-14363: Fix newsrc.c that does not properlyrestrict '/' characters that may have unsafe interaction with cache pathnames (bsc#1101566).
- CVE-2018-14359: Fix buffer overflow via base64 data (bsc#1101570).
- CVE-2018-14358: Fix imap/message.c that has a stack-based buffer overflow for a FETCH response with along RFC822.SIZE field (bsc#1101571).
- CVE-2018-14360: Fix nntp_add_group in newsrc.c that has a stack-based buffer overflow because of incorrect sscanf usage (bsc#1101569).
- CVE-2018-14357: Fix that remote IMAP servers are allowed to execute arbitrary commands via backquote characters (bsc#1101573).
- CVE-2018-14361: Fix that nntp.c proceeds even if memory allocation fails for messages data (bsc#1101568).
Bug fixes:
- mutt reports as neomutt and incorrect version (bsc#1094717)
- No sidebar available in mutt 1.6.1 from Tumbleweed snapshot 20160517 (bsc#980830)
- mutt-1.6.1 unusable when built with --enable-sidebar (bsc#982129)
- (neo)mutt displaying times in Zulu time (bsc#1061343)
- mutt unconditionally segfaults when displaying a message (bsc#986534)
Patchnames
SUSE-2019-1196,SUSE-SLE-DESKTOP-12-SP3-2019-1196,SUSE-SLE-SERVER-12-SP3-2019-1196
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for mutt", title: "Title of the patch", }, { category: "description", text: "This update for mutt fixes the following issues:\n\nSecurity issues fixed:\n\n- bsc#1101428: Mutt 1.10.1 security release update.\n- CVE-2018-14351: Fix imap/command.c that mishandles long IMAP status mailbox literal count size (bsc#1101583).\n- CVE-2018-14353: Fix imap_quote_string in imap/util.c that has an integer underflow (bsc#1101581).\n- CVE-2018-14362: Fix pop.c that does not forbid characters that may have unsafe interaction with message-cache pathnames (bsc#1101567).\n- CVE-2018-14354: Fix arbitrary command execution from remote IMAP servers via backquote characters (bsc#1101578).\n- CVE-2018-14352: Fix imap_quote_string in imap/util.c that does not leave room for quote characters (bsc#1101582).\n- CVE-2018-14356: Fix pop.c that mishandles a zero-length UID (bsc#1101576).\n- CVE-2018-14355: Fix imap/util.c that mishandles '..' directory traversal in a mailbox name (bsc#1101577).\n- CVE-2018-14349: Fix imap/command.c that mishandles a NO response without a message (bsc#1101589).\n- CVE-2018-14350: Fix imap/message.c that has a stack-based buffer overflow for a FETCH response with along INTERNALDATE field (bsc#1101588).\n- CVE-2018-14363: Fix newsrc.c that does not properlyrestrict '/' characters that may have unsafe interaction with cache pathnames (bsc#1101566).\n- CVE-2018-14359: Fix buffer overflow via base64 data (bsc#1101570).\n- CVE-2018-14358: Fix imap/message.c that has a stack-based buffer overflow for a FETCH response with along RFC822.SIZE field (bsc#1101571).\n- CVE-2018-14360: Fix nntp_add_group in newsrc.c that has a stack-based buffer overflow because of incorrect sscanf usage (bsc#1101569).\n- CVE-2018-14357: Fix that remote IMAP servers are allowed to execute arbitrary commands via backquote characters (bsc#1101573).\n- CVE-2018-14361: Fix that nntp.c proceeds even if memory allocation fails for messages data (bsc#1101568).\n\nBug fixes:\n\n- mutt reports as neomutt and incorrect version (bsc#1094717)\n- No sidebar available in mutt 1.6.1 from Tumbleweed snapshot 20160517 (bsc#980830)\n- mutt-1.6.1 unusable when built with --enable-sidebar (bsc#982129)\n- (neo)mutt displaying times in Zulu time (bsc#1061343)\n- mutt unconditionally segfaults when displaying a message (bsc#986534)\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2019-1196,SUSE-SLE-DESKTOP-12-SP3-2019-1196,SUSE-SLE-SERVER-12-SP3-2019-1196", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_1196-1.json", }, { category: "self", summary: "URL for SUSE-SU-2019:1196-1", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20191196-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2019:1196-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2019-May/005432.html", }, { category: "self", summary: "SUSE Bug 1061343", url: "https://bugzilla.suse.com/1061343", }, { category: "self", summary: "SUSE Bug 1094717", url: "https://bugzilla.suse.com/1094717", }, { category: "self", summary: "SUSE Bug 1101428", url: "https://bugzilla.suse.com/1101428", }, { category: "self", summary: "SUSE Bug 1101566", url: "https://bugzilla.suse.com/1101566", }, { category: "self", summary: "SUSE Bug 1101567", url: "https://bugzilla.suse.com/1101567", }, { category: "self", summary: "SUSE Bug 1101568", url: "https://bugzilla.suse.com/1101568", }, { category: "self", summary: "SUSE Bug 1101569", url: "https://bugzilla.suse.com/1101569", }, { category: "self", summary: "SUSE Bug 1101570", url: "https://bugzilla.suse.com/1101570", }, { category: "self", summary: "SUSE Bug 1101571", url: "https://bugzilla.suse.com/1101571", }, { category: "self", summary: "SUSE Bug 1101573", url: "https://bugzilla.suse.com/1101573", }, { category: "self", summary: "SUSE Bug 1101576", url: "https://bugzilla.suse.com/1101576", }, { category: "self", summary: "SUSE Bug 1101577", url: "https://bugzilla.suse.com/1101577", }, { category: "self", summary: "SUSE Bug 1101578", url: "https://bugzilla.suse.com/1101578", }, { category: "self", summary: "SUSE Bug 1101581", url: "https://bugzilla.suse.com/1101581", }, { category: "self", summary: "SUSE Bug 1101582", url: "https://bugzilla.suse.com/1101582", }, { category: "self", summary: "SUSE Bug 1101583", url: "https://bugzilla.suse.com/1101583", }, { category: "self", summary: "SUSE Bug 1101588", url: "https://bugzilla.suse.com/1101588", }, { category: "self", summary: "SUSE Bug 1101589", url: "https://bugzilla.suse.com/1101589", }, { category: "self", summary: "SUSE Bug 980830", url: "https://bugzilla.suse.com/980830", }, { category: "self", summary: "SUSE Bug 982129", url: "https://bugzilla.suse.com/982129", }, { category: "self", summary: "SUSE Bug 986534", url: "https://bugzilla.suse.com/986534", }, { category: "self", summary: "SUSE CVE CVE-2014-9116 page", url: "https://www.suse.com/security/cve/CVE-2014-9116/", }, { category: "self", summary: "SUSE CVE CVE-2018-14349 page", url: "https://www.suse.com/security/cve/CVE-2018-14349/", }, { category: "self", summary: "SUSE CVE CVE-2018-14350 page", url: "https://www.suse.com/security/cve/CVE-2018-14350/", }, { category: "self", summary: "SUSE CVE CVE-2018-14351 page", url: "https://www.suse.com/security/cve/CVE-2018-14351/", }, { category: "self", summary: "SUSE CVE CVE-2018-14352 page", url: "https://www.suse.com/security/cve/CVE-2018-14352/", }, { category: "self", summary: "SUSE CVE CVE-2018-14353 page", url: "https://www.suse.com/security/cve/CVE-2018-14353/", }, { category: "self", summary: "SUSE CVE CVE-2018-14354 page", url: "https://www.suse.com/security/cve/CVE-2018-14354/", }, { category: "self", summary: "SUSE CVE CVE-2018-14355 page", url: "https://www.suse.com/security/cve/CVE-2018-14355/", }, { category: "self", summary: "SUSE CVE CVE-2018-14356 page", url: "https://www.suse.com/security/cve/CVE-2018-14356/", }, { category: "self", summary: "SUSE CVE CVE-2018-14357 page", url: "https://www.suse.com/security/cve/CVE-2018-14357/", }, { category: "self", summary: "SUSE CVE CVE-2018-14358 page", url: "https://www.suse.com/security/cve/CVE-2018-14358/", }, { category: "self", summary: "SUSE CVE CVE-2018-14359 page", url: "https://www.suse.com/security/cve/CVE-2018-14359/", }, { category: "self", summary: "SUSE CVE CVE-2018-14360 page", url: "https://www.suse.com/security/cve/CVE-2018-14360/", }, { category: "self", summary: "SUSE CVE CVE-2018-14361 page", url: "https://www.suse.com/security/cve/CVE-2018-14361/", }, { category: "self", summary: "SUSE CVE CVE-2018-14362 page", url: "https://www.suse.com/security/cve/CVE-2018-14362/", }, { category: "self", summary: "SUSE CVE CVE-2018-14363 page", url: "https://www.suse.com/security/cve/CVE-2018-14363/", }, ], title: "Security update for mutt", tracking: { current_release_date: "2019-05-09T06:14:33Z", generator: { date: "2019-05-09T06:14:33Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2019:1196-1", initial_release_date: "2019-05-09T06:14:33Z", revision_history: [ { date: "2019-05-09T06:14:33Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "mutt-1.10.1-55.6.1.aarch64", product: { name: "mutt-1.10.1-55.6.1.aarch64", product_id: "mutt-1.10.1-55.6.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "mutt-1.10.1-55.6.1.ppc64le", product: { name: "mutt-1.10.1-55.6.1.ppc64le", product_id: "mutt-1.10.1-55.6.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "mutt-1.10.1-55.6.1.s390x", product: { name: "mutt-1.10.1-55.6.1.s390x", product_id: "mutt-1.10.1-55.6.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "mutt-1.10.1-55.6.1.x86_64", product: { name: "mutt-1.10.1-55.6.1.x86_64", product_id: "mutt-1.10.1-55.6.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Desktop 12 SP3", product: { name: "SUSE Linux Enterprise Desktop 12 SP3", product_id: "SUSE Linux Enterprise Desktop 12 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sled:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP3", product: { name: "SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sles:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp3", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "mutt-1.10.1-55.6.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3", product_id: "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", }, product_reference: "mutt-1.10.1-55.6.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP3", }, { category: "default_component_of", full_product_name: { name: "mutt-1.10.1-55.6.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", }, product_reference: "mutt-1.10.1-55.6.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "mutt-1.10.1-55.6.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", }, product_reference: "mutt-1.10.1-55.6.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "mutt-1.10.1-55.6.1.s390x as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", }, product_reference: "mutt-1.10.1-55.6.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "mutt-1.10.1-55.6.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", }, product_reference: "mutt-1.10.1-55.6.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "mutt-1.10.1-55.6.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", }, product_reference: "mutt-1.10.1-55.6.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "mutt-1.10.1-55.6.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", }, product_reference: "mutt-1.10.1-55.6.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "mutt-1.10.1-55.6.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", }, product_reference: "mutt-1.10.1-55.6.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "mutt-1.10.1-55.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64", }, product_reference: "mutt-1.10.1-55.6.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, ], }, vulnerabilities: [ { cve: "CVE-2014-9116", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-9116", }, ], notes: [ { category: "general", text: "The write_one_header function in mutt 1.5.23 does not properly handle newline characters at the beginning of a header, which allows remote attackers to cause a denial of service (crash) via a header with an empty body, which triggers a heap-based buffer overflow in the mutt_substrdup function.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-9116", url: "https://www.suse.com/security/cve/CVE-2014-9116", }, { category: "external", summary: "SUSE Bug 907453 for CVE-2014-9116", url: "https://bugzilla.suse.com/907453", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-05-09T06:14:33Z", details: "moderate", }, ], title: "CVE-2014-9116", }, { cve: "CVE-2018-14349", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14349", }, ], notes: [ { category: "general", text: "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/command.c mishandles a NO response without a message.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14349", url: "https://www.suse.com/security/cve/CVE-2018-14349", }, { category: "external", summary: "SUSE Bug 1101428 for CVE-2018-14349", url: "https://bugzilla.suse.com/1101428", }, { category: "external", summary: "SUSE Bug 1101589 for CVE-2018-14349", url: "https://bugzilla.suse.com/1101589", }, { category: "external", summary: "SUSE Bug 1101593 for CVE-2018-14349", url: "https://bugzilla.suse.com/1101593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-05-09T06:14:33Z", details: "moderate", }, ], title: "CVE-2018-14349", }, { cve: "CVE-2018-14350", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14350", }, ], notes: [ { category: "general", text: "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/message.c has a stack-based buffer overflow for a FETCH response with a long INTERNALDATE field.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14350", url: "https://www.suse.com/security/cve/CVE-2018-14350", }, { category: "external", summary: "SUSE Bug 1101428 for CVE-2018-14350", url: "https://bugzilla.suse.com/1101428", }, { category: "external", summary: "SUSE Bug 1101588 for CVE-2018-14350", url: "https://bugzilla.suse.com/1101588", }, { category: "external", summary: "SUSE Bug 1101593 for CVE-2018-14350", url: "https://bugzilla.suse.com/1101593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-05-09T06:14:33Z", details: "moderate", }, ], title: "CVE-2018-14350", }, { cve: "CVE-2018-14351", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14351", }, ], notes: [ { category: "general", text: "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/command.c mishandles a long IMAP status mailbox literal count size.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14351", url: "https://www.suse.com/security/cve/CVE-2018-14351", }, { category: "external", summary: "SUSE Bug 1101428 for CVE-2018-14351", url: "https://bugzilla.suse.com/1101428", }, { category: "external", summary: "SUSE Bug 1101583 for CVE-2018-14351", url: "https://bugzilla.suse.com/1101583", }, { category: "external", summary: "SUSE Bug 1101593 for CVE-2018-14351", url: "https://bugzilla.suse.com/1101593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.3, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-05-09T06:14:33Z", details: "important", }, ], title: "CVE-2018-14351", }, { cve: "CVE-2018-14352", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14352", }, ], notes: [ { category: "general", text: "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap_quote_string in imap/util.c does not leave room for quote characters, leading to a stack-based buffer overflow.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14352", url: "https://www.suse.com/security/cve/CVE-2018-14352", }, { category: "external", summary: "SUSE Bug 1101428 for CVE-2018-14352", url: "https://bugzilla.suse.com/1101428", }, { category: "external", summary: "SUSE Bug 1101582 for CVE-2018-14352", url: "https://bugzilla.suse.com/1101582", }, { category: "external", summary: "SUSE Bug 1101593 for CVE-2018-14352", url: "https://bugzilla.suse.com/1101593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-05-09T06:14:33Z", details: "moderate", }, ], title: "CVE-2018-14352", }, { cve: "CVE-2018-14353", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14353", }, ], notes: [ { category: "general", text: "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap_quote_string in imap/util.c has an integer underflow.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14353", url: "https://www.suse.com/security/cve/CVE-2018-14353", }, { category: "external", summary: "SUSE Bug 1101428 for CVE-2018-14353", url: "https://bugzilla.suse.com/1101428", }, { category: "external", summary: "SUSE Bug 1101581 for CVE-2018-14353", url: "https://bugzilla.suse.com/1101581", }, { category: "external", summary: "SUSE Bug 1101593 for CVE-2018-14353", url: "https://bugzilla.suse.com/1101593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-05-09T06:14:33Z", details: "moderate", }, ], title: "CVE-2018-14353", }, { cve: "CVE-2018-14354", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14354", }, ], notes: [ { category: "general", text: "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. They allow remote IMAP servers to execute arbitrary commands via backquote characters, related to the mailboxes command associated with a manual subscription or unsubscription.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14354", url: "https://www.suse.com/security/cve/CVE-2018-14354", }, { category: "external", summary: "SUSE Bug 1101428 for CVE-2018-14354", url: "https://bugzilla.suse.com/1101428", }, { category: "external", summary: "SUSE Bug 1101578 for CVE-2018-14354", url: "https://bugzilla.suse.com/1101578", }, { category: "external", summary: "SUSE Bug 1101581 for CVE-2018-14354", url: "https://bugzilla.suse.com/1101581", }, { category: "external", summary: "SUSE Bug 1101589 for CVE-2018-14354", url: "https://bugzilla.suse.com/1101589", }, { category: "external", summary: "SUSE Bug 1101593 for CVE-2018-14354", url: "https://bugzilla.suse.com/1101593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.6, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-05-09T06:14:33Z", details: "critical", }, ], title: "CVE-2018-14354", }, { cve: "CVE-2018-14355", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14355", }, ], notes: [ { category: "general", text: "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/util.c mishandles \"..\" directory traversal in a mailbox name.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14355", url: "https://www.suse.com/security/cve/CVE-2018-14355", }, { category: "external", summary: "SUSE Bug 1101428 for CVE-2018-14355", url: "https://bugzilla.suse.com/1101428", }, { category: "external", summary: "SUSE Bug 1101577 for CVE-2018-14355", url: "https://bugzilla.suse.com/1101577", }, { category: "external", summary: "SUSE Bug 1101593 for CVE-2018-14355", url: "https://bugzilla.suse.com/1101593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-05-09T06:14:33Z", details: "moderate", }, ], title: "CVE-2018-14355", }, { cve: "CVE-2018-14356", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14356", }, ], notes: [ { category: "general", text: "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. pop.c mishandles a zero-length UID.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14356", url: "https://www.suse.com/security/cve/CVE-2018-14356", }, { category: "external", summary: "SUSE Bug 1101428 for CVE-2018-14356", url: "https://bugzilla.suse.com/1101428", }, { category: "external", summary: "SUSE Bug 1101576 for CVE-2018-14356", url: "https://bugzilla.suse.com/1101576", }, { category: "external", summary: "SUSE Bug 1101589 for CVE-2018-14356", url: "https://bugzilla.suse.com/1101589", }, { category: "external", summary: "SUSE Bug 1101593 for CVE-2018-14356", url: "https://bugzilla.suse.com/1101593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-05-09T06:14:33Z", details: "moderate", }, ], title: "CVE-2018-14356", }, { cve: "CVE-2018-14357", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14357", }, ], notes: [ { category: "general", text: "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. They allow remote IMAP servers to execute arbitrary commands via backquote characters, related to the mailboxes command associated with an automatic subscription.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14357", url: "https://www.suse.com/security/cve/CVE-2018-14357", }, { category: "external", summary: "SUSE Bug 1101428 for CVE-2018-14357", url: "https://bugzilla.suse.com/1101428", }, { category: "external", summary: "SUSE Bug 1101573 for CVE-2018-14357", url: "https://bugzilla.suse.com/1101573", }, { category: "external", summary: "SUSE Bug 1101581 for CVE-2018-14357", url: "https://bugzilla.suse.com/1101581", }, { category: "external", summary: "SUSE Bug 1101589 for CVE-2018-14357", url: "https://bugzilla.suse.com/1101589", }, { category: "external", summary: "SUSE Bug 1101593 for CVE-2018-14357", url: "https://bugzilla.suse.com/1101593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.1, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-05-09T06:14:33Z", details: "important", }, ], title: "CVE-2018-14357", }, { cve: "CVE-2018-14358", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14358", }, ], notes: [ { category: "general", text: "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/message.c has a stack-based buffer overflow for a FETCH response with a long RFC822.SIZE field.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14358", url: "https://www.suse.com/security/cve/CVE-2018-14358", }, { category: "external", summary: "SUSE Bug 1101428 for CVE-2018-14358", url: "https://bugzilla.suse.com/1101428", }, { category: "external", summary: "SUSE Bug 1101571 for CVE-2018-14358", url: "https://bugzilla.suse.com/1101571", }, { category: "external", summary: "SUSE Bug 1101593 for CVE-2018-14358", url: "https://bugzilla.suse.com/1101593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-05-09T06:14:33Z", details: "moderate", }, ], title: "CVE-2018-14358", }, { cve: "CVE-2018-14359", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14359", }, ], notes: [ { category: "general", text: "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. They have a buffer overflow via base64 data.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14359", url: "https://www.suse.com/security/cve/CVE-2018-14359", }, { category: "external", summary: "SUSE Bug 1101428 for CVE-2018-14359", url: "https://bugzilla.suse.com/1101428", }, { category: "external", summary: "SUSE Bug 1101570 for CVE-2018-14359", url: "https://bugzilla.suse.com/1101570", }, { category: "external", summary: "SUSE Bug 1101589 for CVE-2018-14359", url: "https://bugzilla.suse.com/1101589", }, { category: "external", summary: "SUSE Bug 1101593 for CVE-2018-14359", url: "https://bugzilla.suse.com/1101593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-05-09T06:14:33Z", details: "moderate", }, ], title: "CVE-2018-14359", }, { cve: "CVE-2018-14360", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14360", }, ], notes: [ { category: "general", text: "An issue was discovered in NeoMutt before 2018-07-16. nntp_add_group in newsrc.c has a stack-based buffer overflow because of incorrect sscanf usage.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14360", url: "https://www.suse.com/security/cve/CVE-2018-14360", }, { category: "external", summary: "SUSE Bug 1101428 for CVE-2018-14360", url: "https://bugzilla.suse.com/1101428", }, { category: "external", summary: "SUSE Bug 1101569 for CVE-2018-14360", url: "https://bugzilla.suse.com/1101569", }, { category: "external", summary: "SUSE Bug 1101593 for CVE-2018-14360", url: "https://bugzilla.suse.com/1101593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-05-09T06:14:33Z", details: "critical", }, ], title: "CVE-2018-14360", }, { cve: "CVE-2018-14361", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14361", }, ], notes: [ { category: "general", text: "An issue was discovered in NeoMutt before 2018-07-16. nntp.c proceeds even if memory allocation fails for messages data.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14361", url: "https://www.suse.com/security/cve/CVE-2018-14361", }, { category: "external", summary: "SUSE Bug 1101428 for CVE-2018-14361", url: "https://bugzilla.suse.com/1101428", }, { category: "external", summary: "SUSE Bug 1101568 for CVE-2018-14361", url: "https://bugzilla.suse.com/1101568", }, { category: "external", summary: "SUSE Bug 1101593 for CVE-2018-14361", url: "https://bugzilla.suse.com/1101593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-05-09T06:14:33Z", details: "critical", }, ], title: "CVE-2018-14361", }, { cve: "CVE-2018-14362", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14362", }, ], notes: [ { category: "general", text: "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. pop.c does not forbid characters that may have unsafe interaction with message-cache pathnames, as demonstrated by a '/' character.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14362", url: "https://www.suse.com/security/cve/CVE-2018-14362", }, { category: "external", summary: "SUSE Bug 1101428 for CVE-2018-14362", url: "https://bugzilla.suse.com/1101428", }, { category: "external", summary: "SUSE Bug 1101567 for CVE-2018-14362", url: "https://bugzilla.suse.com/1101567", }, { category: "external", summary: "SUSE Bug 1101589 for CVE-2018-14362", url: "https://bugzilla.suse.com/1101589", }, { category: "external", summary: "SUSE Bug 1101593 for CVE-2018-14362", url: "https://bugzilla.suse.com/1101593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-05-09T06:14:33Z", details: "moderate", }, ], title: "CVE-2018-14362", }, { cve: "CVE-2018-14363", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14363", }, ], notes: [ { category: "general", text: "An issue was discovered in NeoMutt before 2018-07-16. newsrc.c does not properly restrict '/' characters that may have unsafe interaction with cache pathnames.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14363", url: "https://www.suse.com/security/cve/CVE-2018-14363", }, { category: "external", summary: "SUSE Bug 1101428 for CVE-2018-14363", url: "https://bugzilla.suse.com/1101428", }, { category: "external", summary: "SUSE Bug 1101566 for CVE-2018-14363", url: "https://bugzilla.suse.com/1101566", }, { category: "external", summary: "SUSE Bug 1101593 for CVE-2018-14363", url: "https://bugzilla.suse.com/1101593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-05-09T06:14:33Z", details: "important", }, ], title: "CVE-2018-14363", }, ], }
opensuse-su-2024:11079-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
neomutt-20210205-3.3 on GA media
Notes
Title of the patch
neomutt-20210205-3.3 on GA media
Description of the patch
These are all security issues fixed in the neomutt-20210205-3.3 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-11079
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "neomutt-20210205-3.3 on GA media", title: "Title of the patch", }, { category: "description", text: "These are all security issues fixed in the neomutt-20210205-3.3 package on the GA media of openSUSE Tumbleweed.", title: "Description of the patch", }, { category: "details", text: "openSUSE-Tumbleweed-2024-11079", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11079-1.json", }, { category: "self", summary: "SUSE CVE CVE-2018-14349 page", url: "https://www.suse.com/security/cve/CVE-2018-14349/", }, { category: "self", summary: "SUSE CVE CVE-2018-14350 page", url: "https://www.suse.com/security/cve/CVE-2018-14350/", }, { category: "self", summary: "SUSE CVE CVE-2018-14351 page", url: "https://www.suse.com/security/cve/CVE-2018-14351/", }, { category: "self", summary: "SUSE CVE CVE-2018-14352 page", url: "https://www.suse.com/security/cve/CVE-2018-14352/", }, { category: "self", summary: "SUSE CVE CVE-2018-14353 page", url: "https://www.suse.com/security/cve/CVE-2018-14353/", }, { category: "self", summary: "SUSE CVE CVE-2018-14354 page", url: "https://www.suse.com/security/cve/CVE-2018-14354/", }, { category: "self", summary: "SUSE CVE CVE-2018-14355 page", url: "https://www.suse.com/security/cve/CVE-2018-14355/", }, { category: "self", summary: "SUSE CVE CVE-2018-14356 page", url: "https://www.suse.com/security/cve/CVE-2018-14356/", }, { category: "self", summary: "SUSE CVE CVE-2018-14357 page", url: "https://www.suse.com/security/cve/CVE-2018-14357/", }, { category: "self", summary: "SUSE CVE CVE-2018-14358 page", url: "https://www.suse.com/security/cve/CVE-2018-14358/", }, { category: "self", summary: "SUSE CVE CVE-2018-14359 page", url: "https://www.suse.com/security/cve/CVE-2018-14359/", }, { category: "self", summary: "SUSE CVE CVE-2018-14360 page", url: "https://www.suse.com/security/cve/CVE-2018-14360/", }, { category: "self", summary: "SUSE CVE CVE-2018-14361 page", url: "https://www.suse.com/security/cve/CVE-2018-14361/", }, { category: "self", summary: "SUSE CVE CVE-2018-14362 page", url: "https://www.suse.com/security/cve/CVE-2018-14362/", }, { category: "self", summary: "SUSE CVE CVE-2018-14363 page", url: "https://www.suse.com/security/cve/CVE-2018-14363/", }, { category: "self", summary: "SUSE CVE CVE-2020-14093 page", url: "https://www.suse.com/security/cve/CVE-2020-14093/", }, { category: "self", summary: "SUSE CVE CVE-2020-14154 page", url: "https://www.suse.com/security/cve/CVE-2020-14154/", }, { category: "self", summary: "SUSE CVE CVE-2020-14954 page", url: "https://www.suse.com/security/cve/CVE-2020-14954/", }, { category: "self", summary: "SUSE CVE CVE-2020-28896 page", url: "https://www.suse.com/security/cve/CVE-2020-28896/", }, ], title: "neomutt-20210205-3.3 on GA media", tracking: { current_release_date: "2024-06-15T00:00:00Z", generator: { date: "2024-06-15T00:00:00Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2024:11079-1", initial_release_date: "2024-06-15T00:00:00Z", revision_history: [ { date: "2024-06-15T00:00:00Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "neomutt-20210205-3.3.aarch64", product: { name: "neomutt-20210205-3.3.aarch64", product_id: "neomutt-20210205-3.3.aarch64", }, }, { category: "product_version", name: "neomutt-doc-20210205-3.3.aarch64", product: { name: "neomutt-doc-20210205-3.3.aarch64", product_id: "neomutt-doc-20210205-3.3.aarch64", }, }, { category: "product_version", name: "neomutt-lang-20210205-3.3.aarch64", product: { name: "neomutt-lang-20210205-3.3.aarch64", product_id: "neomutt-lang-20210205-3.3.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "neomutt-20210205-3.3.ppc64le", product: { name: "neomutt-20210205-3.3.ppc64le", product_id: "neomutt-20210205-3.3.ppc64le", }, }, { category: "product_version", name: "neomutt-doc-20210205-3.3.ppc64le", product: { name: "neomutt-doc-20210205-3.3.ppc64le", product_id: "neomutt-doc-20210205-3.3.ppc64le", }, }, { category: "product_version", name: "neomutt-lang-20210205-3.3.ppc64le", product: { name: "neomutt-lang-20210205-3.3.ppc64le", product_id: "neomutt-lang-20210205-3.3.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "neomutt-20210205-3.3.s390x", product: { name: "neomutt-20210205-3.3.s390x", product_id: "neomutt-20210205-3.3.s390x", }, }, { category: "product_version", name: "neomutt-doc-20210205-3.3.s390x", product: { name: "neomutt-doc-20210205-3.3.s390x", product_id: "neomutt-doc-20210205-3.3.s390x", }, }, { category: "product_version", name: "neomutt-lang-20210205-3.3.s390x", product: { name: "neomutt-lang-20210205-3.3.s390x", product_id: "neomutt-lang-20210205-3.3.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "neomutt-20210205-3.3.x86_64", product: { name: "neomutt-20210205-3.3.x86_64", product_id: "neomutt-20210205-3.3.x86_64", }, }, { category: "product_version", name: "neomutt-doc-20210205-3.3.x86_64", product: { name: "neomutt-doc-20210205-3.3.x86_64", product_id: "neomutt-doc-20210205-3.3.x86_64", }, }, { category: "product_version", name: "neomutt-lang-20210205-3.3.x86_64", product: { name: "neomutt-lang-20210205-3.3.x86_64", product_id: "neomutt-lang-20210205-3.3.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Tumbleweed", product: { name: "openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed", product_identification_helper: { cpe: "cpe:/o:opensuse:tumbleweed", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "neomutt-20210205-3.3.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", }, product_reference: "neomutt-20210205-3.3.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "neomutt-20210205-3.3.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", }, product_reference: "neomutt-20210205-3.3.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "neomutt-20210205-3.3.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", }, product_reference: "neomutt-20210205-3.3.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "neomutt-20210205-3.3.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", }, product_reference: "neomutt-20210205-3.3.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "neomutt-doc-20210205-3.3.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", }, product_reference: "neomutt-doc-20210205-3.3.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "neomutt-doc-20210205-3.3.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", }, product_reference: "neomutt-doc-20210205-3.3.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "neomutt-doc-20210205-3.3.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", }, product_reference: "neomutt-doc-20210205-3.3.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "neomutt-doc-20210205-3.3.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", }, product_reference: "neomutt-doc-20210205-3.3.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "neomutt-lang-20210205-3.3.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", }, product_reference: "neomutt-lang-20210205-3.3.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "neomutt-lang-20210205-3.3.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", }, product_reference: "neomutt-lang-20210205-3.3.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "neomutt-lang-20210205-3.3.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", }, product_reference: "neomutt-lang-20210205-3.3.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "neomutt-lang-20210205-3.3.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64", }, product_reference: "neomutt-lang-20210205-3.3.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, ], }, vulnerabilities: [ { cve: "CVE-2018-14349", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14349", }, ], notes: [ { category: "general", text: "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/command.c mishandles a NO response without a message.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14349", url: "https://www.suse.com/security/cve/CVE-2018-14349", }, { category: "external", summary: "SUSE Bug 1101428 for CVE-2018-14349", url: "https://bugzilla.suse.com/1101428", }, { category: "external", summary: "SUSE Bug 1101589 for CVE-2018-14349", url: "https://bugzilla.suse.com/1101589", }, { category: "external", summary: "SUSE Bug 1101593 for CVE-2018-14349", url: "https://bugzilla.suse.com/1101593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-14349", }, { cve: "CVE-2018-14350", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14350", }, ], notes: [ { category: "general", text: "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/message.c has a stack-based buffer overflow for a FETCH response with a long INTERNALDATE field.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14350", url: "https://www.suse.com/security/cve/CVE-2018-14350", }, { category: "external", summary: "SUSE Bug 1101428 for CVE-2018-14350", url: "https://bugzilla.suse.com/1101428", }, { category: "external", summary: "SUSE Bug 1101588 for CVE-2018-14350", url: "https://bugzilla.suse.com/1101588", }, { category: "external", summary: "SUSE Bug 1101593 for CVE-2018-14350", url: "https://bugzilla.suse.com/1101593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-14350", }, { cve: "CVE-2018-14351", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14351", }, ], notes: [ { category: "general", text: "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/command.c mishandles a long IMAP status mailbox literal count size.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14351", url: "https://www.suse.com/security/cve/CVE-2018-14351", }, { category: "external", summary: "SUSE Bug 1101428 for CVE-2018-14351", url: "https://bugzilla.suse.com/1101428", }, { category: "external", summary: "SUSE Bug 1101583 for CVE-2018-14351", url: "https://bugzilla.suse.com/1101583", }, { category: "external", summary: "SUSE Bug 1101593 for CVE-2018-14351", url: "https://bugzilla.suse.com/1101593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.3, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2018-14351", }, { cve: "CVE-2018-14352", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14352", }, ], notes: [ { category: "general", text: "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap_quote_string in imap/util.c does not leave room for quote characters, leading to a stack-based buffer overflow.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14352", url: "https://www.suse.com/security/cve/CVE-2018-14352", }, { category: "external", summary: "SUSE Bug 1101428 for CVE-2018-14352", url: "https://bugzilla.suse.com/1101428", }, { category: "external", summary: "SUSE Bug 1101582 for CVE-2018-14352", url: "https://bugzilla.suse.com/1101582", }, { category: "external", summary: "SUSE Bug 1101593 for CVE-2018-14352", url: "https://bugzilla.suse.com/1101593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-14352", }, { cve: "CVE-2018-14353", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14353", }, ], notes: [ { category: "general", text: "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap_quote_string in imap/util.c has an integer underflow.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14353", url: "https://www.suse.com/security/cve/CVE-2018-14353", }, { category: "external", summary: "SUSE Bug 1101428 for CVE-2018-14353", url: "https://bugzilla.suse.com/1101428", }, { category: "external", summary: "SUSE Bug 1101581 for CVE-2018-14353", url: "https://bugzilla.suse.com/1101581", }, { category: "external", summary: "SUSE Bug 1101593 for CVE-2018-14353", url: "https://bugzilla.suse.com/1101593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-14353", }, { cve: "CVE-2018-14354", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14354", }, ], notes: [ { category: "general", text: "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. They allow remote IMAP servers to execute arbitrary commands via backquote characters, related to the mailboxes command associated with a manual subscription or unsubscription.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14354", url: "https://www.suse.com/security/cve/CVE-2018-14354", }, { category: "external", summary: "SUSE Bug 1101428 for CVE-2018-14354", url: "https://bugzilla.suse.com/1101428", }, { category: "external", summary: "SUSE Bug 1101578 for CVE-2018-14354", url: "https://bugzilla.suse.com/1101578", }, { category: "external", summary: "SUSE Bug 1101581 for CVE-2018-14354", url: "https://bugzilla.suse.com/1101581", }, { category: "external", summary: "SUSE Bug 1101589 for CVE-2018-14354", url: "https://bugzilla.suse.com/1101589", }, { category: "external", summary: "SUSE Bug 1101593 for CVE-2018-14354", url: "https://bugzilla.suse.com/1101593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.6, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "critical", }, ], title: "CVE-2018-14354", }, { cve: "CVE-2018-14355", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14355", }, ], notes: [ { category: "general", text: "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/util.c mishandles \"..\" directory traversal in a mailbox name.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14355", url: "https://www.suse.com/security/cve/CVE-2018-14355", }, { category: "external", summary: "SUSE Bug 1101428 for CVE-2018-14355", url: "https://bugzilla.suse.com/1101428", }, { category: "external", summary: "SUSE Bug 1101577 for CVE-2018-14355", url: "https://bugzilla.suse.com/1101577", }, { category: "external", summary: "SUSE Bug 1101593 for CVE-2018-14355", url: "https://bugzilla.suse.com/1101593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-14355", }, { cve: "CVE-2018-14356", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14356", }, ], notes: [ { category: "general", text: "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. pop.c mishandles a zero-length UID.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14356", url: "https://www.suse.com/security/cve/CVE-2018-14356", }, { category: "external", summary: "SUSE Bug 1101428 for CVE-2018-14356", url: "https://bugzilla.suse.com/1101428", }, { category: "external", summary: "SUSE Bug 1101576 for CVE-2018-14356", url: "https://bugzilla.suse.com/1101576", }, { category: "external", summary: "SUSE Bug 1101589 for CVE-2018-14356", url: "https://bugzilla.suse.com/1101589", }, { category: "external", summary: "SUSE Bug 1101593 for CVE-2018-14356", url: "https://bugzilla.suse.com/1101593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-14356", }, { cve: "CVE-2018-14357", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14357", }, ], notes: [ { category: "general", text: "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. They allow remote IMAP servers to execute arbitrary commands via backquote characters, related to the mailboxes command associated with an automatic subscription.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14357", url: "https://www.suse.com/security/cve/CVE-2018-14357", }, { category: "external", summary: "SUSE Bug 1101428 for CVE-2018-14357", url: "https://bugzilla.suse.com/1101428", }, { category: "external", summary: "SUSE Bug 1101573 for CVE-2018-14357", url: "https://bugzilla.suse.com/1101573", }, { category: "external", summary: "SUSE Bug 1101581 for CVE-2018-14357", url: "https://bugzilla.suse.com/1101581", }, { category: "external", summary: "SUSE Bug 1101589 for CVE-2018-14357", url: "https://bugzilla.suse.com/1101589", }, { category: "external", summary: "SUSE Bug 1101593 for CVE-2018-14357", url: "https://bugzilla.suse.com/1101593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.1, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2018-14357", }, { cve: "CVE-2018-14358", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14358", }, ], notes: [ { category: "general", text: "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/message.c has a stack-based buffer overflow for a FETCH response with a long RFC822.SIZE field.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14358", url: "https://www.suse.com/security/cve/CVE-2018-14358", }, { category: "external", summary: "SUSE Bug 1101428 for CVE-2018-14358", url: "https://bugzilla.suse.com/1101428", }, { category: "external", summary: "SUSE Bug 1101571 for CVE-2018-14358", url: "https://bugzilla.suse.com/1101571", }, { category: "external", summary: "SUSE Bug 1101593 for CVE-2018-14358", url: "https://bugzilla.suse.com/1101593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-14358", }, { cve: "CVE-2018-14359", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14359", }, ], notes: [ { category: "general", text: "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. They have a buffer overflow via base64 data.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14359", url: "https://www.suse.com/security/cve/CVE-2018-14359", }, { category: "external", summary: "SUSE Bug 1101428 for CVE-2018-14359", url: "https://bugzilla.suse.com/1101428", }, { category: "external", summary: "SUSE Bug 1101570 for CVE-2018-14359", url: "https://bugzilla.suse.com/1101570", }, { category: "external", summary: "SUSE Bug 1101589 for CVE-2018-14359", url: "https://bugzilla.suse.com/1101589", }, { category: "external", summary: "SUSE Bug 1101593 for CVE-2018-14359", url: "https://bugzilla.suse.com/1101593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-14359", }, { cve: "CVE-2018-14360", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14360", }, ], notes: [ { category: "general", text: "An issue was discovered in NeoMutt before 2018-07-16. nntp_add_group in newsrc.c has a stack-based buffer overflow because of incorrect sscanf usage.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14360", url: "https://www.suse.com/security/cve/CVE-2018-14360", }, { category: "external", summary: "SUSE Bug 1101428 for CVE-2018-14360", url: "https://bugzilla.suse.com/1101428", }, { category: "external", summary: "SUSE Bug 1101569 for CVE-2018-14360", url: "https://bugzilla.suse.com/1101569", }, { category: "external", summary: "SUSE Bug 1101593 for CVE-2018-14360", url: "https://bugzilla.suse.com/1101593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "critical", }, ], title: "CVE-2018-14360", }, { cve: "CVE-2018-14361", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14361", }, ], notes: [ { category: "general", text: "An issue was discovered in NeoMutt before 2018-07-16. nntp.c proceeds even if memory allocation fails for messages data.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14361", url: "https://www.suse.com/security/cve/CVE-2018-14361", }, { category: "external", summary: "SUSE Bug 1101428 for CVE-2018-14361", url: "https://bugzilla.suse.com/1101428", }, { category: "external", summary: "SUSE Bug 1101568 for CVE-2018-14361", url: "https://bugzilla.suse.com/1101568", }, { category: "external", summary: "SUSE Bug 1101593 for CVE-2018-14361", url: "https://bugzilla.suse.com/1101593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "critical", }, ], title: "CVE-2018-14361", }, { cve: "CVE-2018-14362", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14362", }, ], notes: [ { category: "general", text: "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. pop.c does not forbid characters that may have unsafe interaction with message-cache pathnames, as demonstrated by a '/' character.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14362", url: "https://www.suse.com/security/cve/CVE-2018-14362", }, { category: "external", summary: "SUSE Bug 1101428 for CVE-2018-14362", url: "https://bugzilla.suse.com/1101428", }, { category: "external", summary: "SUSE Bug 1101567 for CVE-2018-14362", url: "https://bugzilla.suse.com/1101567", }, { category: "external", summary: "SUSE Bug 1101589 for CVE-2018-14362", url: "https://bugzilla.suse.com/1101589", }, { category: "external", summary: "SUSE Bug 1101593 for CVE-2018-14362", url: "https://bugzilla.suse.com/1101593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-14362", }, { cve: "CVE-2018-14363", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14363", }, ], notes: [ { category: "general", text: "An issue was discovered in NeoMutt before 2018-07-16. newsrc.c does not properly restrict '/' characters that may have unsafe interaction with cache pathnames.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14363", url: "https://www.suse.com/security/cve/CVE-2018-14363", }, { category: "external", summary: "SUSE Bug 1101428 for CVE-2018-14363", url: "https://bugzilla.suse.com/1101428", }, { category: "external", summary: "SUSE Bug 1101566 for CVE-2018-14363", url: "https://bugzilla.suse.com/1101566", }, { category: "external", summary: "SUSE Bug 1101593 for CVE-2018-14363", url: "https://bugzilla.suse.com/1101593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2018-14363", }, { cve: "CVE-2020-14093", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-14093", }, ], notes: [ { category: "general", text: "Mutt before 1.14.3 allows an IMAP fcc/postpone man-in-the-middle attack via a PREAUTH response.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-14093", url: "https://www.suse.com/security/cve/CVE-2020-14093", }, { category: "external", summary: "SUSE Bug 1172906 for CVE-2020-14093", url: "https://bugzilla.suse.com/1172906", }, { category: "external", summary: "SUSE Bug 1172935 for CVE-2020-14093", url: "https://bugzilla.suse.com/1172935", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-14093", }, { cve: "CVE-2020-14154", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-14154", }, ], notes: [ { category: "general", text: "Mutt before 1.14.3 proceeds with a connection even if, in response to a GnuTLS certificate prompt, the user rejects an expired intermediate certificate.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-14154", url: "https://www.suse.com/security/cve/CVE-2020-14154", }, { category: "external", summary: "SUSE Bug 1172906 for CVE-2020-14154", url: "https://bugzilla.suse.com/1172906", }, { category: "external", summary: "SUSE Bug 1172935 for CVE-2020-14154", url: "https://bugzilla.suse.com/1172935", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-14154", }, { cve: "CVE-2020-14954", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-14954", }, ], notes: [ { category: "general", text: "Mutt before 1.14.4 and NeoMutt before 2020-06-19 have a STARTTLS buffering issue that affects IMAP, SMTP, and POP3. When a server sends a \"begin TLS\" response, the client reads additional data (e.g., from a man-in-the-middle attacker) and evaluates it in a TLS context, aka \"response injection.\"", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-14954", url: "https://www.suse.com/security/cve/CVE-2020-14954", }, { category: "external", summary: "SUSE Bug 1173197 for CVE-2020-14954", url: "https://bugzilla.suse.com/1173197", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-14954", }, { cve: "CVE-2020-28896", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-28896", }, ], notes: [ { category: "general", text: "Mutt before 2.0.2 and NeoMutt before 2020-11-20 did not ensure that $ssl_force_tls was processed if an IMAP server's initial server response was invalid. The connection was not properly closed, and the code could continue attempting to authenticate. This could result in authentication credentials being exposed on an unencrypted connection, or to a machine-in-the-middle.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-28896", url: "https://www.suse.com/security/cve/CVE-2020-28896", }, { category: "external", summary: "SUSE Bug 1179035 for CVE-2020-28896", url: "https://bugzilla.suse.com/1179035", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-28896", }, ], }
opensuse-su-2024:11069-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
mutt-2.0.7-2.2 on GA media
Notes
Title of the patch
mutt-2.0.7-2.2 on GA media
Description of the patch
These are all security issues fixed in the mutt-2.0.7-2.2 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-11069
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "mutt-2.0.7-2.2 on GA media", title: "Title of the patch", }, { category: "description", text: "These are all security issues fixed in the mutt-2.0.7-2.2 package on the GA media of openSUSE Tumbleweed.", title: "Description of the patch", }, { category: "details", text: "openSUSE-Tumbleweed-2024-11069", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11069-1.json", }, { category: "self", summary: "SUSE CVE CVE-2007-1558 page", url: "https://www.suse.com/security/cve/CVE-2007-1558/", }, { category: "self", summary: "SUSE CVE CVE-2018-14349 page", url: "https://www.suse.com/security/cve/CVE-2018-14349/", }, { category: "self", summary: "SUSE CVE CVE-2018-14350 page", url: "https://www.suse.com/security/cve/CVE-2018-14350/", }, { category: "self", summary: "SUSE CVE CVE-2018-14351 page", url: "https://www.suse.com/security/cve/CVE-2018-14351/", }, { category: "self", summary: "SUSE CVE CVE-2018-14352 page", url: "https://www.suse.com/security/cve/CVE-2018-14352/", }, { category: "self", summary: "SUSE CVE CVE-2018-14353 page", url: "https://www.suse.com/security/cve/CVE-2018-14353/", }, { category: "self", summary: "SUSE CVE CVE-2018-14354 page", url: "https://www.suse.com/security/cve/CVE-2018-14354/", }, { category: "self", summary: "SUSE CVE CVE-2018-14355 page", url: "https://www.suse.com/security/cve/CVE-2018-14355/", }, { category: "self", summary: "SUSE CVE CVE-2018-14356 page", url: "https://www.suse.com/security/cve/CVE-2018-14356/", }, { category: "self", summary: "SUSE CVE CVE-2018-14357 page", url: "https://www.suse.com/security/cve/CVE-2018-14357/", }, { category: "self", summary: "SUSE CVE CVE-2018-14358 page", url: "https://www.suse.com/security/cve/CVE-2018-14358/", }, { category: "self", summary: "SUSE CVE CVE-2018-14359 page", url: "https://www.suse.com/security/cve/CVE-2018-14359/", }, { category: "self", summary: "SUSE CVE CVE-2018-14360 page", url: "https://www.suse.com/security/cve/CVE-2018-14360/", }, { category: "self", summary: "SUSE CVE CVE-2018-14361 page", url: "https://www.suse.com/security/cve/CVE-2018-14361/", }, { category: "self", summary: "SUSE CVE CVE-2018-14362 page", url: "https://www.suse.com/security/cve/CVE-2018-14362/", }, { category: "self", summary: "SUSE CVE CVE-2018-14363 page", url: "https://www.suse.com/security/cve/CVE-2018-14363/", }, { category: "self", summary: "SUSE CVE CVE-2020-14093 page", url: "https://www.suse.com/security/cve/CVE-2020-14093/", }, { category: "self", summary: "SUSE CVE CVE-2020-14954 page", url: "https://www.suse.com/security/cve/CVE-2020-14954/", }, { category: "self", summary: "SUSE CVE CVE-2020-28896 page", url: "https://www.suse.com/security/cve/CVE-2020-28896/", }, { category: "self", summary: "SUSE CVE CVE-2021-3181 page", url: "https://www.suse.com/security/cve/CVE-2021-3181/", }, { category: "self", summary: "SUSE CVE CVE-2021-32055 page", url: "https://www.suse.com/security/cve/CVE-2021-32055/", }, ], title: "mutt-2.0.7-2.2 on GA media", tracking: { current_release_date: "2024-06-15T00:00:00Z", generator: { date: "2024-06-15T00:00:00Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2024:11069-1", initial_release_date: "2024-06-15T00:00:00Z", revision_history: [ { date: "2024-06-15T00:00:00Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "mutt-2.0.7-2.2.aarch64", product: { name: "mutt-2.0.7-2.2.aarch64", product_id: "mutt-2.0.7-2.2.aarch64", }, }, { category: "product_version", name: "mutt-doc-2.0.7-2.2.aarch64", product: { name: "mutt-doc-2.0.7-2.2.aarch64", product_id: "mutt-doc-2.0.7-2.2.aarch64", }, }, { category: "product_version", name: "mutt-lang-2.0.7-2.2.aarch64", product: { name: "mutt-lang-2.0.7-2.2.aarch64", product_id: "mutt-lang-2.0.7-2.2.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "mutt-2.0.7-2.2.ppc64le", product: { name: "mutt-2.0.7-2.2.ppc64le", product_id: "mutt-2.0.7-2.2.ppc64le", }, }, { category: "product_version", name: "mutt-doc-2.0.7-2.2.ppc64le", product: { name: "mutt-doc-2.0.7-2.2.ppc64le", product_id: "mutt-doc-2.0.7-2.2.ppc64le", }, }, { category: "product_version", name: "mutt-lang-2.0.7-2.2.ppc64le", product: { name: "mutt-lang-2.0.7-2.2.ppc64le", product_id: "mutt-lang-2.0.7-2.2.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "mutt-2.0.7-2.2.s390x", product: { name: "mutt-2.0.7-2.2.s390x", product_id: "mutt-2.0.7-2.2.s390x", }, }, { category: "product_version", name: "mutt-doc-2.0.7-2.2.s390x", product: { name: "mutt-doc-2.0.7-2.2.s390x", product_id: "mutt-doc-2.0.7-2.2.s390x", }, }, { category: "product_version", name: "mutt-lang-2.0.7-2.2.s390x", product: { name: "mutt-lang-2.0.7-2.2.s390x", product_id: "mutt-lang-2.0.7-2.2.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "mutt-2.0.7-2.2.x86_64", product: { name: "mutt-2.0.7-2.2.x86_64", product_id: "mutt-2.0.7-2.2.x86_64", }, }, { category: "product_version", name: "mutt-doc-2.0.7-2.2.x86_64", product: { name: "mutt-doc-2.0.7-2.2.x86_64", product_id: "mutt-doc-2.0.7-2.2.x86_64", }, }, { category: "product_version", name: "mutt-lang-2.0.7-2.2.x86_64", product: { name: "mutt-lang-2.0.7-2.2.x86_64", product_id: "mutt-lang-2.0.7-2.2.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Tumbleweed", product: { name: "openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed", product_identification_helper: { cpe: "cpe:/o:opensuse:tumbleweed", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "mutt-2.0.7-2.2.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", }, product_reference: "mutt-2.0.7-2.2.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "mutt-2.0.7-2.2.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", }, product_reference: "mutt-2.0.7-2.2.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "mutt-2.0.7-2.2.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", }, product_reference: "mutt-2.0.7-2.2.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "mutt-2.0.7-2.2.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", }, product_reference: "mutt-2.0.7-2.2.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "mutt-doc-2.0.7-2.2.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", }, product_reference: "mutt-doc-2.0.7-2.2.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "mutt-doc-2.0.7-2.2.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", }, product_reference: "mutt-doc-2.0.7-2.2.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "mutt-doc-2.0.7-2.2.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", }, product_reference: "mutt-doc-2.0.7-2.2.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "mutt-doc-2.0.7-2.2.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", }, product_reference: "mutt-doc-2.0.7-2.2.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "mutt-lang-2.0.7-2.2.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", }, product_reference: "mutt-lang-2.0.7-2.2.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "mutt-lang-2.0.7-2.2.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", }, product_reference: "mutt-lang-2.0.7-2.2.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "mutt-lang-2.0.7-2.2.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", }, product_reference: "mutt-lang-2.0.7-2.2.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "mutt-lang-2.0.7-2.2.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64", }, product_reference: "mutt-lang-2.0.7-2.2.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, ], }, vulnerabilities: [ { cve: "CVE-2007-1558", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2007-1558", }, ], notes: [ { category: "general", text: "The APOP protocol allows remote attackers to guess the first 3 characters of a password via man-in-the-middle (MITM) attacks that use crafted message IDs and MD5 collisions. NOTE: this design-level issue potentially affects all products that use APOP, including (1) Thunderbird 1.x before 1.5.0.12 and 2.x before 2.0.0.4, (2) Evolution, (3) mutt, (4) fetchmail before 6.3.8, (5) SeaMonkey 1.0.x before 1.0.9 and 1.1.x before 1.1.2, (6) Balsa 2.3.16 and earlier, (7) Mailfilter before 0.8.2, and possibly other products.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2007-1558", url: "https://www.suse.com/security/cve/CVE-2007-1558", }, { category: "external", summary: "SUSE Bug 262450 for CVE-2007-1558", url: "https://bugzilla.suse.com/262450", }, { category: "external", summary: "SUSE Bug 271197 for CVE-2007-1558", url: "https://bugzilla.suse.com/271197", }, { category: "external", summary: "SUSE Bug 279843 for CVE-2007-1558", url: "https://bugzilla.suse.com/279843", }, { category: "external", summary: "SUSE Bug 281321 for CVE-2007-1558", url: "https://bugzilla.suse.com/281321", }, { category: "external", summary: "SUSE Bug 281323 for CVE-2007-1558", url: "https://bugzilla.suse.com/281323", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2007-1558", }, { cve: "CVE-2018-14349", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14349", }, ], notes: [ { category: "general", text: "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/command.c mishandles a NO response without a message.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14349", url: "https://www.suse.com/security/cve/CVE-2018-14349", }, { category: "external", summary: "SUSE Bug 1101428 for CVE-2018-14349", url: "https://bugzilla.suse.com/1101428", }, { category: "external", summary: "SUSE Bug 1101589 for CVE-2018-14349", url: "https://bugzilla.suse.com/1101589", }, { category: "external", summary: "SUSE Bug 1101593 for CVE-2018-14349", url: "https://bugzilla.suse.com/1101593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-14349", }, { cve: "CVE-2018-14350", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14350", }, ], notes: [ { category: "general", text: "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/message.c has a stack-based buffer overflow for a FETCH response with a long INTERNALDATE field.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14350", url: "https://www.suse.com/security/cve/CVE-2018-14350", }, { category: "external", summary: "SUSE Bug 1101428 for CVE-2018-14350", url: "https://bugzilla.suse.com/1101428", }, { category: "external", summary: "SUSE Bug 1101588 for CVE-2018-14350", url: "https://bugzilla.suse.com/1101588", }, { category: "external", summary: "SUSE Bug 1101593 for CVE-2018-14350", url: "https://bugzilla.suse.com/1101593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-14350", }, { cve: "CVE-2018-14351", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14351", }, ], notes: [ { category: "general", text: "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/command.c mishandles a long IMAP status mailbox literal count size.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14351", url: "https://www.suse.com/security/cve/CVE-2018-14351", }, { category: "external", summary: "SUSE Bug 1101428 for CVE-2018-14351", url: "https://bugzilla.suse.com/1101428", }, { category: "external", summary: "SUSE Bug 1101583 for CVE-2018-14351", url: "https://bugzilla.suse.com/1101583", }, { category: "external", summary: "SUSE Bug 1101593 for CVE-2018-14351", url: "https://bugzilla.suse.com/1101593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.3, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2018-14351", }, { cve: "CVE-2018-14352", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14352", }, ], notes: [ { category: "general", text: "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap_quote_string in imap/util.c does not leave room for quote characters, leading to a stack-based buffer overflow.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14352", url: "https://www.suse.com/security/cve/CVE-2018-14352", }, { category: "external", summary: "SUSE Bug 1101428 for CVE-2018-14352", url: "https://bugzilla.suse.com/1101428", }, { category: "external", summary: "SUSE Bug 1101582 for CVE-2018-14352", url: "https://bugzilla.suse.com/1101582", }, { category: "external", summary: "SUSE Bug 1101593 for CVE-2018-14352", url: "https://bugzilla.suse.com/1101593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-14352", }, { cve: "CVE-2018-14353", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14353", }, ], notes: [ { category: "general", text: "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap_quote_string in imap/util.c has an integer underflow.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14353", url: "https://www.suse.com/security/cve/CVE-2018-14353", }, { category: "external", summary: "SUSE Bug 1101428 for CVE-2018-14353", url: "https://bugzilla.suse.com/1101428", }, { category: "external", summary: "SUSE Bug 1101581 for CVE-2018-14353", url: "https://bugzilla.suse.com/1101581", }, { category: "external", summary: "SUSE Bug 1101593 for CVE-2018-14353", url: "https://bugzilla.suse.com/1101593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-14353", }, { cve: "CVE-2018-14354", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14354", }, ], notes: [ { category: "general", text: "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. They allow remote IMAP servers to execute arbitrary commands via backquote characters, related to the mailboxes command associated with a manual subscription or unsubscription.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14354", url: "https://www.suse.com/security/cve/CVE-2018-14354", }, { category: "external", summary: "SUSE Bug 1101428 for CVE-2018-14354", url: "https://bugzilla.suse.com/1101428", }, { category: "external", summary: "SUSE Bug 1101578 for CVE-2018-14354", url: "https://bugzilla.suse.com/1101578", }, { category: "external", summary: "SUSE Bug 1101581 for CVE-2018-14354", url: "https://bugzilla.suse.com/1101581", }, { category: "external", summary: "SUSE Bug 1101589 for CVE-2018-14354", url: "https://bugzilla.suse.com/1101589", }, { category: "external", summary: "SUSE Bug 1101593 for CVE-2018-14354", url: "https://bugzilla.suse.com/1101593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.6, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "critical", }, ], title: "CVE-2018-14354", }, { cve: "CVE-2018-14355", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14355", }, ], notes: [ { category: "general", text: "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/util.c mishandles \"..\" directory traversal in a mailbox name.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14355", url: "https://www.suse.com/security/cve/CVE-2018-14355", }, { category: "external", summary: "SUSE Bug 1101428 for CVE-2018-14355", url: "https://bugzilla.suse.com/1101428", }, { category: "external", summary: "SUSE Bug 1101577 for CVE-2018-14355", url: "https://bugzilla.suse.com/1101577", }, { category: "external", summary: "SUSE Bug 1101593 for CVE-2018-14355", url: "https://bugzilla.suse.com/1101593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-14355", }, { cve: "CVE-2018-14356", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14356", }, ], notes: [ { category: "general", text: "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. pop.c mishandles a zero-length UID.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14356", url: "https://www.suse.com/security/cve/CVE-2018-14356", }, { category: "external", summary: "SUSE Bug 1101428 for CVE-2018-14356", url: "https://bugzilla.suse.com/1101428", }, { category: "external", summary: "SUSE Bug 1101576 for CVE-2018-14356", url: "https://bugzilla.suse.com/1101576", }, { category: "external", summary: "SUSE Bug 1101589 for CVE-2018-14356", url: "https://bugzilla.suse.com/1101589", }, { category: "external", summary: "SUSE Bug 1101593 for CVE-2018-14356", url: "https://bugzilla.suse.com/1101593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-14356", }, { cve: "CVE-2018-14357", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14357", }, ], notes: [ { category: "general", text: "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. They allow remote IMAP servers to execute arbitrary commands via backquote characters, related to the mailboxes command associated with an automatic subscription.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14357", url: "https://www.suse.com/security/cve/CVE-2018-14357", }, { category: "external", summary: "SUSE Bug 1101428 for CVE-2018-14357", url: "https://bugzilla.suse.com/1101428", }, { category: "external", summary: "SUSE Bug 1101573 for CVE-2018-14357", url: "https://bugzilla.suse.com/1101573", }, { category: "external", summary: "SUSE Bug 1101581 for CVE-2018-14357", url: "https://bugzilla.suse.com/1101581", }, { category: "external", summary: "SUSE Bug 1101589 for CVE-2018-14357", url: "https://bugzilla.suse.com/1101589", }, { category: "external", summary: "SUSE Bug 1101593 for CVE-2018-14357", url: "https://bugzilla.suse.com/1101593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.1, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2018-14357", }, { cve: "CVE-2018-14358", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14358", }, ], notes: [ { category: "general", text: "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/message.c has a stack-based buffer overflow for a FETCH response with a long RFC822.SIZE field.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14358", url: "https://www.suse.com/security/cve/CVE-2018-14358", }, { category: "external", summary: "SUSE Bug 1101428 for CVE-2018-14358", url: "https://bugzilla.suse.com/1101428", }, { category: "external", summary: "SUSE Bug 1101571 for CVE-2018-14358", url: "https://bugzilla.suse.com/1101571", }, { category: "external", summary: "SUSE Bug 1101593 for CVE-2018-14358", url: "https://bugzilla.suse.com/1101593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-14358", }, { cve: "CVE-2018-14359", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14359", }, ], notes: [ { category: "general", text: "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. They have a buffer overflow via base64 data.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14359", url: "https://www.suse.com/security/cve/CVE-2018-14359", }, { category: "external", summary: "SUSE Bug 1101428 for CVE-2018-14359", url: "https://bugzilla.suse.com/1101428", }, { category: "external", summary: "SUSE Bug 1101570 for CVE-2018-14359", url: "https://bugzilla.suse.com/1101570", }, { category: "external", summary: "SUSE Bug 1101589 for CVE-2018-14359", url: "https://bugzilla.suse.com/1101589", }, { category: "external", summary: "SUSE Bug 1101593 for CVE-2018-14359", url: "https://bugzilla.suse.com/1101593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-14359", }, { cve: "CVE-2018-14360", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14360", }, ], notes: [ { category: "general", text: "An issue was discovered in NeoMutt before 2018-07-16. nntp_add_group in newsrc.c has a stack-based buffer overflow because of incorrect sscanf usage.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14360", url: "https://www.suse.com/security/cve/CVE-2018-14360", }, { category: "external", summary: "SUSE Bug 1101428 for CVE-2018-14360", url: "https://bugzilla.suse.com/1101428", }, { category: "external", summary: "SUSE Bug 1101569 for CVE-2018-14360", url: "https://bugzilla.suse.com/1101569", }, { category: "external", summary: "SUSE Bug 1101593 for CVE-2018-14360", url: "https://bugzilla.suse.com/1101593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "critical", }, ], title: "CVE-2018-14360", }, { cve: "CVE-2018-14361", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14361", }, ], notes: [ { category: "general", text: "An issue was discovered in NeoMutt before 2018-07-16. nntp.c proceeds even if memory allocation fails for messages data.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14361", url: "https://www.suse.com/security/cve/CVE-2018-14361", }, { category: "external", summary: "SUSE Bug 1101428 for CVE-2018-14361", url: "https://bugzilla.suse.com/1101428", }, { category: "external", summary: "SUSE Bug 1101568 for CVE-2018-14361", url: "https://bugzilla.suse.com/1101568", }, { category: "external", summary: "SUSE Bug 1101593 for CVE-2018-14361", url: "https://bugzilla.suse.com/1101593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "critical", }, ], title: "CVE-2018-14361", }, { cve: "CVE-2018-14362", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14362", }, ], notes: [ { category: "general", text: "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. pop.c does not forbid characters that may have unsafe interaction with message-cache pathnames, as demonstrated by a '/' character.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14362", url: "https://www.suse.com/security/cve/CVE-2018-14362", }, { category: "external", summary: "SUSE Bug 1101428 for CVE-2018-14362", url: "https://bugzilla.suse.com/1101428", }, { category: "external", summary: "SUSE Bug 1101567 for CVE-2018-14362", url: "https://bugzilla.suse.com/1101567", }, { category: "external", summary: "SUSE Bug 1101589 for CVE-2018-14362", url: "https://bugzilla.suse.com/1101589", }, { category: "external", summary: "SUSE Bug 1101593 for CVE-2018-14362", url: "https://bugzilla.suse.com/1101593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-14362", }, { cve: "CVE-2018-14363", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14363", }, ], notes: [ { category: "general", text: "An issue was discovered in NeoMutt before 2018-07-16. newsrc.c does not properly restrict '/' characters that may have unsafe interaction with cache pathnames.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14363", url: "https://www.suse.com/security/cve/CVE-2018-14363", }, { category: "external", summary: "SUSE Bug 1101428 for CVE-2018-14363", url: "https://bugzilla.suse.com/1101428", }, { category: "external", summary: "SUSE Bug 1101566 for CVE-2018-14363", url: "https://bugzilla.suse.com/1101566", }, { category: "external", summary: "SUSE Bug 1101593 for CVE-2018-14363", url: "https://bugzilla.suse.com/1101593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2018-14363", }, { cve: "CVE-2020-14093", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-14093", }, ], notes: [ { category: "general", text: "Mutt before 1.14.3 allows an IMAP fcc/postpone man-in-the-middle attack via a PREAUTH response.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-14093", url: "https://www.suse.com/security/cve/CVE-2020-14093", }, { category: "external", summary: "SUSE Bug 1172906 for CVE-2020-14093", url: "https://bugzilla.suse.com/1172906", }, { category: "external", summary: "SUSE Bug 1172935 for CVE-2020-14093", url: "https://bugzilla.suse.com/1172935", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-14093", }, { cve: "CVE-2020-14954", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-14954", }, ], notes: [ { category: "general", text: "Mutt before 1.14.4 and NeoMutt before 2020-06-19 have a STARTTLS buffering issue that affects IMAP, SMTP, and POP3. When a server sends a \"begin TLS\" response, the client reads additional data (e.g., from a man-in-the-middle attacker) and evaluates it in a TLS context, aka \"response injection.\"", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-14954", url: "https://www.suse.com/security/cve/CVE-2020-14954", }, { category: "external", summary: "SUSE Bug 1173197 for CVE-2020-14954", url: "https://bugzilla.suse.com/1173197", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-14954", }, { cve: "CVE-2020-28896", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-28896", }, ], notes: [ { category: "general", text: "Mutt before 2.0.2 and NeoMutt before 2020-11-20 did not ensure that $ssl_force_tls was processed if an IMAP server's initial server response was invalid. The connection was not properly closed, and the code could continue attempting to authenticate. This could result in authentication credentials being exposed on an unencrypted connection, or to a machine-in-the-middle.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-28896", url: "https://www.suse.com/security/cve/CVE-2020-28896", }, { category: "external", summary: "SUSE Bug 1179035 for CVE-2020-28896", url: "https://bugzilla.suse.com/1179035", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-28896", }, { cve: "CVE-2021-3181", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3181", }, ], notes: [ { category: "general", text: "rfc822.c in Mutt through 2.0.4 allows remote attackers to cause a denial of service (mailbox unavailability) by sending email messages with sequences of semicolon characters in RFC822 address fields (aka terminators of empty groups). A small email message from the attacker can cause large memory consumption, and the victim may then be unable to see email messages from other persons.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3181", url: "https://www.suse.com/security/cve/CVE-2021-3181", }, { category: "external", summary: "SUSE Bug 1181221 for CVE-2021-3181", url: "https://bugzilla.suse.com/1181221", }, { category: "external", summary: "SUSE Bug 1181505 for CVE-2021-3181", url: "https://bugzilla.suse.com/1181505", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2021-3181", }, { cve: "CVE-2021-32055", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-32055", }, ], notes: [ { category: "general", text: "Mutt 1.11.0 through 2.0.x before 2.0.7 (and NeoMutt 2019-10-25 through 2021-05-04) has a $imap_qresync issue in which imap/util.c has an out-of-bounds read in situations where an IMAP sequence set ends with a comma. NOTE: the $imap_qresync setting for QRESYNC is not enabled by default.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-32055", url: "https://www.suse.com/security/cve/CVE-2021-32055", }, { category: "external", summary: "SUSE Bug 1185705 for CVE-2021-32055", url: "https://bugzilla.suse.com/1185705", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2021-32055", }, ], }
gsd-2018-14358
Vulnerability from gsd
Modified
2023-12-13 01:22
Details
An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/message.c has a stack-based buffer overflow for a FETCH response with a long RFC822.SIZE field.
Aliases
Aliases
{ GSD: { alias: "CVE-2018-14358", description: "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/message.c has a stack-based buffer overflow for a FETCH response with a long RFC822.SIZE field.", id: "GSD-2018-14358", references: [ "https://www.suse.com/security/cve/CVE-2018-14358.html", "https://www.debian.org/security/2018/dsa-4277", "https://ubuntu.com/security/CVE-2018-14358", "https://advisories.mageia.org/CVE-2018-14358.html", "https://security.archlinux.org/CVE-2018-14358", ], }, gsd: { metadata: { exploitCode: "unknown", remediation: "unknown", reportConfidence: "confirmed", type: "vulnerability", }, osvSchema: { aliases: [ "CVE-2018-14358", ], details: "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/message.c has a stack-based buffer overflow for a FETCH response with a long RFC822.SIZE field.", id: "GSD-2018-14358", modified: "2023-12-13T01:22:38.126143Z", schema_version: "1.4.0", }, }, namespaces: { "cve.org": { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2018-14358", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/message.c has a stack-based buffer overflow for a FETCH response with a long RFC822.SIZE field.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "USN-3719-3", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3719-3/", }, { name: "https://gitlab.com/muttmua/mutt/commit/3287534daa3beac68e2e83ca4b4fe8a3148ff870", refsource: "MISC", url: "https://gitlab.com/muttmua/mutt/commit/3287534daa3beac68e2e83ca4b4fe8a3148ff870", }, { name: "DSA-4277", refsource: "DEBIAN", url: "https://www.debian.org/security/2018/dsa-4277", }, { name: "[debian-lts-announce] 20180802 [SECURITY] [DLA 1455-1] mutt security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2018/08/msg00001.html", }, { name: "GLSA-201810-07", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201810-07", }, { name: "http://www.mutt.org/news.html", refsource: "MISC", url: "http://www.mutt.org/news.html", }, { name: "https://neomutt.org/2018/07/16/release", refsource: "MISC", url: "https://neomutt.org/2018/07/16/release", }, { name: "https://github.com/neomutt/neomutt/commit/1b0f0d0988e6df4e32e9f4bf8780846ea95d4485", refsource: "MISC", url: "https://github.com/neomutt/neomutt/commit/1b0f0d0988e6df4e32e9f4bf8780846ea95d4485", }, { name: "USN-3719-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3719-1/", }, ], }, }, "nvd.nist.gov": { configurations: { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:mutt:mutt:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.10.1", vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:neomutt:neomutt:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "20180716", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, ], }, cve: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2018-14358", }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "en", value: "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/message.c has a stack-based buffer overflow for a FETCH response with a long RFC822.SIZE field.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "en", value: "CWE-787", }, ], }, ], }, references: { reference_data: [ { name: "https://neomutt.org/2018/07/16/release", refsource: "MISC", tags: [ "Release Notes", "Vendor Advisory", ], url: "https://neomutt.org/2018/07/16/release", }, { name: "https://gitlab.com/muttmua/mutt/commit/3287534daa3beac68e2e83ca4b4fe8a3148ff870", refsource: "MISC", tags: [ "Patch", "Third Party Advisory", ], url: "https://gitlab.com/muttmua/mutt/commit/3287534daa3beac68e2e83ca4b4fe8a3148ff870", }, { name: "https://github.com/neomutt/neomutt/commit/1b0f0d0988e6df4e32e9f4bf8780846ea95d4485", refsource: "MISC", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/neomutt/neomutt/commit/1b0f0d0988e6df4e32e9f4bf8780846ea95d4485", }, { name: "http://www.mutt.org/news.html", refsource: "MISC", tags: [ "Release Notes", "Vendor Advisory", ], url: "http://www.mutt.org/news.html", }, { name: "USN-3719-1", refsource: "UBUNTU", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3719-1/", }, { name: "[debian-lts-announce] 20180802 [SECURITY] [DLA 1455-1] mutt security update", refsource: "MLIST", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2018/08/msg00001.html", }, { name: "DSA-4277", refsource: "DEBIAN", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2018/dsa-4277", }, { name: "USN-3719-3", refsource: "UBUNTU", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3719-3/", }, { name: "GLSA-201810-07", refsource: "GENTOO", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/201810-07", }, ], }, }, impact: { baseMetricV2: { acInsufInfo: true, cvssV2: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 7.5, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "HIGH", userInteractionRequired: false, }, baseMetricV3: { cvssV3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, }, }, lastModifiedDate: "2020-05-20T00:48Z", publishedDate: "2018-07-17T17:29Z", }, }, }
fkie_cve-2018-14358
Vulnerability from fkie_nvd
Published
2018-07-17 17:29
Modified
2024-11-21 03:48
Severity ?
Summary
An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/message.c has a stack-based buffer overflow for a FETCH response with a long RFC822.SIZE field.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
mutt | mutt | * | |
neomutt | neomutt | * | |
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 16.04 | |
canonical | ubuntu_linux | 18.04 | |
debian | debian_linux | 8.0 | |
debian | debian_linux | 9.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:mutt:mutt:*:*:*:*:*:*:*:*", matchCriteriaId: "2FA2C3A6-423C-4BE5-8FA7-0241384D58D0", versionEndExcluding: "1.10.1", vulnerable: true, }, { criteria: "cpe:2.3:a:neomutt:neomutt:*:*:*:*:*:*:*:*", matchCriteriaId: "1C15CCD1-1752-4913-9506-32035B52A513", versionEndExcluding: "20180716", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", matchCriteriaId: "B5A6F2F3-4894-4392-8296-3B8DD2679084", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", matchCriteriaId: "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", matchCriteriaId: "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", matchCriteriaId: "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", matchCriteriaId: "DEECE5FC-CACF-4496-A3E7-164736409252", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/message.c has a stack-based buffer overflow for a FETCH response with a long RFC822.SIZE field.", }, { lang: "es", value: "Se ha descubierto un problema en Mutt en versiones anteriores a la 1.10.1 y NeoMutt en versiones anteriores al 2018-07-16. imap/message.c tiene un desbordamiento de búfer basado en pila para una respuesta FETCH con un campo RFC822.SIZE largo.", }, ], id: "CVE-2018-14358", lastModified: "2024-11-21T03:48:54.650", metrics: { cvssMetricV2: [ { acInsufInfo: true, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 7.5, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-07-17T17:29:00.747", references: [ { source: "cve@mitre.org", tags: [ "Release Notes", "Vendor Advisory", ], url: "http://www.mutt.org/news.html", }, { source: "cve@mitre.org", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/neomutt/neomutt/commit/1b0f0d0988e6df4e32e9f4bf8780846ea95d4485", }, { source: "cve@mitre.org", tags: [ "Patch", "Third Party Advisory", ], url: "https://gitlab.com/muttmua/mutt/commit/3287534daa3beac68e2e83ca4b4fe8a3148ff870", }, { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2018/08/msg00001.html", }, { source: "cve@mitre.org", tags: [ "Release Notes", "Vendor Advisory", ], url: "https://neomutt.org/2018/07/16/release", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/201810-07", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3719-1/", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3719-3/", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2018/dsa-4277", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Release Notes", "Vendor Advisory", ], url: "http://www.mutt.org/news.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/neomutt/neomutt/commit/1b0f0d0988e6df4e32e9f4bf8780846ea95d4485", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://gitlab.com/muttmua/mutt/commit/3287534daa3beac68e2e83ca4b4fe8a3148ff870", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2018/08/msg00001.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Release Notes", "Vendor Advisory", ], url: "https://neomutt.org/2018/07/16/release", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/201810-07", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3719-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3719-3/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2018/dsa-4277", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-787", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
wid-sec-w-2025-0102
Vulnerability from csaf_certbund
Published
2018-07-29 22:00
Modified
2025-01-15 23:00
Summary
mutt: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Mutt ist ein textbasiertes E-Mail-Programm für Unix und andere Unix-artige Betriebssysteme.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in mutt ausnutzen, um beliebigen Programmcode mit Benutzerrechten auszuführen, Angriffe mit nicht näher spezifizierten Auswirkungen oder einen Denial of Service Angriff durchzuführen.
Betroffene Betriebssysteme
- Linux
{ document: { aggregate_severity: { text: "hoch", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Mutt ist ein textbasiertes E-Mail-Programm für Unix und andere Unix-artige Betriebssysteme.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in mutt ausnutzen, um beliebigen Programmcode mit Benutzerrechten auszuführen, Angriffe mit nicht näher spezifizierten Auswirkungen oder einen Denial of Service Angriff durchzuführen.", title: "Angriff", }, { category: "general", text: "- Linux", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2025-0102 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2018/wid-sec-w-2025-0102.json", }, { category: "self", summary: "WID-SEC-2025-0102 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-0102", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2018:2085-1 vom 2018-07-29", url: "https://www.suse.com/support/update/announcement/2018/suse-su-20182085-1/", }, { category: "external", summary: "SUSE Security Update \tSUSE-SU-2018:2084-1 vom 2018-07-29", url: "https://www.suse.com/de-de/support/update/announcement/2018/suse-su-20182084-1/", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2018:2403-1 vom 2018-08-18", url: "https://www.suse.com/support/update/announcement/2018/suse-su-20182403-1.html", }, { category: "external", summary: "Debian Security Advisory DSA-4277 vom 2018-08-18", url: "https://www.debian.org/security/2018/dsa-4277", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2018-2526 vom 2018-08-20", url: "http://linux.oracle.com/errata/ELSA-2018-2526.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2018:2526 vom 2018-08-20", url: "http://rhn.redhat.com/errata/RHSA-2018-2526.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2019:1196-1 vom 2019-05-09", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20191196-1.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2020:1126 vom 2020-03-31", url: "https://access.redhat.com/errata/RHSA-2020:1126", }, { category: "external", summary: "Ubuntu Security Notice USN-7204-1 vom 2025-01-15", url: "https://ubuntu.com/security/notices/USN-7204-1", }, ], source_lang: "en-US", title: "mutt: Mehrere Schwachstellen", tracking: { current_release_date: "2025-01-15T23:00:00.000+00:00", generator: { date: "2025-01-16T09:22:25.007+00:00", engine: { name: "BSI-WID", version: "1.3.10", }, }, id: "WID-SEC-W-2025-0102", initial_release_date: "2018-07-29T22:00:00.000+00:00", revision_history: [ { date: "2018-07-29T22:00:00.000+00:00", number: "1", summary: "Initial Release", }, { date: "2018-07-29T22:00:00.000+00:00", number: "2", summary: "Version nicht vorhanden", }, { date: "2018-08-19T22:00:00.000+00:00", number: "3", summary: "New remediations available", }, { date: "2018-08-20T22:00:00.000+00:00", number: "4", summary: "New remediations available", }, { date: "2018-08-20T22:00:00.000+00:00", number: "5", summary: "New remediations available", }, { date: "2018-10-30T23:00:00.000+00:00", number: "6", summary: "Added references", }, { date: "2019-05-09T22:00:00.000+00:00", number: "7", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2020-03-31T22:00:00.000+00:00", number: "8", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2025-01-15T23:00:00.000+00:00", number: "9", summary: "Neue Updates von Ubuntu aufgenommen", }, ], status: "final", version: "9", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "Debian Linux", product: { name: "Debian Linux", product_id: "2951", product_identification_helper: { cpe: "cpe:/o:debian:debian_linux:-", }, }, }, ], category: "vendor", name: "Debian", }, { branches: [ { branches: [ { category: "product_version_range", name: "<=1.10.1", product: { name: "Open Source mutt <=1.10.1", product_id: "T012560", }, }, { category: "product_version_range", name: "<=1.10.1", product: { name: "Open Source mutt <=1.10.1", product_id: "T012560-fixed", }, }, ], category: "product_name", name: "mutt", }, ], category: "vendor", name: "Open Source", }, { branches: [ { category: "product_name", name: "Oracle Linux", product: { name: "Oracle Linux", product_id: "T004914", product_identification_helper: { cpe: "cpe:/o:oracle:linux:-", }, }, }, ], category: "vendor", name: "Oracle", }, { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux", product: { name: "Red Hat Enterprise Linux", product_id: "67646", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:-", }, }, }, ], category: "vendor", name: "Red Hat", }, { branches: [ { category: "product_name", name: "SUSE Linux", product: { name: "SUSE Linux", product_id: "T002207", product_identification_helper: { cpe: "cpe:/o:suse:suse_linux:-", }, }, }, ], category: "vendor", name: "SUSE", }, { branches: [ { category: "product_name", name: "Ubuntu Linux", product: { name: "Ubuntu Linux", product_id: "T000126", product_identification_helper: { cpe: "cpe:/o:canonical:ubuntu_linux:-", }, }, }, ], category: "vendor", name: "Ubuntu", }, ], }, vulnerabilities: [ { cve: "CVE-2018-14349", notes: [ { category: "description", text: "In mutt Linux existieren mehrere Schwachstellen. Diese basieren auf Pufferüberlauf Schwächen oder Fehlern bei der Verarbeitung von Eingaben. Ein Angreifer kann dieses zu einem Denial of Service oder \"Directory Traversal\" Angriff oder möglicherweise zur Ausführung von Code mit den Privilegien des angegriffenen Benutzers oder Dienstes nutzen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "2951", "T002207", "67646", "T000126", "T004914", "T012560", ], }, release_date: "2018-07-29T22:00:00.000+00:00", title: "CVE-2018-14349", }, { cve: "CVE-2018-14350", notes: [ { category: "description", text: "In mutt Linux existieren mehrere Schwachstellen. Diese basieren auf Pufferüberlauf Schwächen oder Fehlern bei der Verarbeitung von Eingaben. Ein Angreifer kann dieses zu einem Denial of Service oder \"Directory Traversal\" Angriff oder möglicherweise zur Ausführung von Code mit den Privilegien des angegriffenen Benutzers oder Dienstes nutzen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "2951", "T002207", "67646", "T000126", "T004914", "T012560", ], }, release_date: "2018-07-29T22:00:00.000+00:00", title: "CVE-2018-14350", }, { cve: "CVE-2018-14351", notes: [ { category: "description", text: "In mutt Linux existieren mehrere Schwachstellen. Diese basieren auf Pufferüberlauf Schwächen oder Fehlern bei der Verarbeitung von Eingaben. Ein Angreifer kann dieses zu einem Denial of Service oder \"Directory Traversal\" Angriff oder möglicherweise zur Ausführung von Code mit den Privilegien des angegriffenen Benutzers oder Dienstes nutzen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "2951", "T002207", "67646", "T000126", "T004914", "T012560", ], }, release_date: "2018-07-29T22:00:00.000+00:00", title: "CVE-2018-14351", }, { cve: "CVE-2018-14352", notes: [ { category: "description", text: "In mutt Linux existieren mehrere Schwachstellen. Diese basieren auf Pufferüberlauf Schwächen oder Fehlern bei der Verarbeitung von Eingaben. Ein Angreifer kann dieses zu einem Denial of Service oder \"Directory Traversal\" Angriff oder möglicherweise zur Ausführung von Code mit den Privilegien des angegriffenen Benutzers oder Dienstes nutzen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "2951", "T002207", "67646", "T000126", "T004914", "T012560", ], }, release_date: "2018-07-29T22:00:00.000+00:00", title: "CVE-2018-14352", }, { cve: "CVE-2018-14353", notes: [ { category: "description", text: "In mutt Linux existieren mehrere Schwachstellen. Diese basieren auf Pufferüberlauf Schwächen oder Fehlern bei der Verarbeitung von Eingaben. Ein Angreifer kann dieses zu einem Denial of Service oder \"Directory Traversal\" Angriff oder möglicherweise zur Ausführung von Code mit den Privilegien des angegriffenen Benutzers oder Dienstes nutzen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "2951", "T002207", "67646", "T000126", "T004914", "T012560", ], }, release_date: "2018-07-29T22:00:00.000+00:00", title: "CVE-2018-14353", }, { cve: "CVE-2018-14354", notes: [ { category: "description", text: "In mutt Linux existieren mehrere Schwachstellen. Diese basieren auf Pufferüberlauf Schwächen oder Fehlern bei der Verarbeitung von Eingaben. Ein Angreifer kann dieses zu einem Denial of Service oder \"Directory Traversal\" Angriff oder möglicherweise zur Ausführung von Code mit den Privilegien des angegriffenen Benutzers oder Dienstes nutzen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "2951", "T002207", "67646", "T000126", "T004914", "T012560", ], }, release_date: "2018-07-29T22:00:00.000+00:00", title: "CVE-2018-14354", }, { cve: "CVE-2018-14355", notes: [ { category: "description", text: "In mutt Linux existieren mehrere Schwachstellen. Diese basieren auf Pufferüberlauf Schwächen oder Fehlern bei der Verarbeitung von Eingaben. Ein Angreifer kann dieses zu einem Denial of Service oder \"Directory Traversal\" Angriff oder möglicherweise zur Ausführung von Code mit den Privilegien des angegriffenen Benutzers oder Dienstes nutzen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "2951", "T002207", "67646", "T000126", "T004914", "T012560", ], }, release_date: "2018-07-29T22:00:00.000+00:00", title: "CVE-2018-14355", }, { cve: "CVE-2018-14356", notes: [ { category: "description", text: "In mutt Linux existieren mehrere Schwachstellen. Diese basieren auf Pufferüberlauf Schwächen oder Fehlern bei der Verarbeitung von Eingaben. Ein Angreifer kann dieses zu einem Denial of Service oder \"Directory Traversal\" Angriff oder möglicherweise zur Ausführung von Code mit den Privilegien des angegriffenen Benutzers oder Dienstes nutzen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "2951", "T002207", "67646", "T000126", "T004914", "T012560", ], }, release_date: "2018-07-29T22:00:00.000+00:00", title: "CVE-2018-14356", }, { cve: "CVE-2018-14357", notes: [ { category: "description", text: "In mutt Linux existieren mehrere Schwachstellen. Diese basieren auf Pufferüberlauf Schwächen oder Fehlern bei der Verarbeitung von Eingaben. Ein Angreifer kann dieses zu einem Denial of Service oder \"Directory Traversal\" Angriff oder möglicherweise zur Ausführung von Code mit den Privilegien des angegriffenen Benutzers oder Dienstes nutzen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "2951", "T002207", "67646", "T000126", "T004914", "T012560", ], }, release_date: "2018-07-29T22:00:00.000+00:00", title: "CVE-2018-14357", }, { cve: "CVE-2018-14358", notes: [ { category: "description", text: "In mutt Linux existieren mehrere Schwachstellen. Diese basieren auf Pufferüberlauf Schwächen oder Fehlern bei der Verarbeitung von Eingaben. Ein Angreifer kann dieses zu einem Denial of Service oder \"Directory Traversal\" Angriff oder möglicherweise zur Ausführung von Code mit den Privilegien des angegriffenen Benutzers oder Dienstes nutzen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "2951", "T002207", "67646", "T000126", "T004914", "T012560", ], }, release_date: "2018-07-29T22:00:00.000+00:00", title: "CVE-2018-14358", }, { cve: "CVE-2018-14359", notes: [ { category: "description", text: "In mutt Linux existieren mehrere Schwachstellen. Diese basieren auf Pufferüberlauf Schwächen oder Fehlern bei der Verarbeitung von Eingaben. Ein Angreifer kann dieses zu einem Denial of Service oder \"Directory Traversal\" Angriff oder möglicherweise zur Ausführung von Code mit den Privilegien des angegriffenen Benutzers oder Dienstes nutzen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "2951", "T002207", "67646", "T000126", "T004914", "T012560", ], }, release_date: "2018-07-29T22:00:00.000+00:00", title: "CVE-2018-14359", }, { cve: "CVE-2018-14360", notes: [ { category: "description", text: "In mutt Linux existieren mehrere Schwachstellen. Diese basieren auf Pufferüberlauf Schwächen oder Fehlern bei der Verarbeitung von Eingaben. Ein Angreifer kann dieses zu einem Denial of Service oder \"Directory Traversal\" Angriff oder möglicherweise zur Ausführung von Code mit den Privilegien des angegriffenen Benutzers oder Dienstes nutzen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "2951", "T002207", "67646", "T000126", "T004914", "T012560", ], }, release_date: "2018-07-29T22:00:00.000+00:00", title: "CVE-2018-14360", }, { cve: "CVE-2018-14361", notes: [ { category: "description", text: "In mutt Linux existieren mehrere Schwachstellen. Diese basieren auf Pufferüberlauf Schwächen oder Fehlern bei der Verarbeitung von Eingaben. Ein Angreifer kann dieses zu einem Denial of Service oder \"Directory Traversal\" Angriff oder möglicherweise zur Ausführung von Code mit den Privilegien des angegriffenen Benutzers oder Dienstes nutzen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "2951", "T002207", "67646", "T000126", "T004914", "T012560", ], }, release_date: "2018-07-29T22:00:00.000+00:00", title: "CVE-2018-14361", }, { cve: "CVE-2018-14362", notes: [ { category: "description", text: "In mutt Linux existieren mehrere Schwachstellen. Diese basieren auf Pufferüberlauf Schwächen oder Fehlern bei der Verarbeitung von Eingaben. Ein Angreifer kann dieses zu einem Denial of Service oder \"Directory Traversal\" Angriff oder möglicherweise zur Ausführung von Code mit den Privilegien des angegriffenen Benutzers oder Dienstes nutzen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "2951", "T002207", "67646", "T000126", "T004914", "T012560", ], }, release_date: "2018-07-29T22:00:00.000+00:00", title: "CVE-2018-14362", }, { cve: "CVE-2018-14363", notes: [ { category: "description", text: "In mutt Linux existieren mehrere Schwachstellen. Diese basieren auf Pufferüberlauf Schwächen oder Fehlern bei der Verarbeitung von Eingaben. Ein Angreifer kann dieses zu einem Denial of Service oder \"Directory Traversal\" Angriff oder möglicherweise zur Ausführung von Code mit den Privilegien des angegriffenen Benutzers oder Dienstes nutzen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "2951", "T002207", "67646", "T000126", "T004914", "T012560", ], }, release_date: "2018-07-29T22:00:00.000+00:00", title: "CVE-2018-14363", }, ], }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.