Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2018-14359 (GCVE-0-2018-14359)
Vulnerability from cvelistv5
- n/a
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T09:29:50.128Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "USN-3719-3", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3719-3/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gitlab.com/muttmua/mutt/commit/3d9028fec8f4d08db2251096307c0bbbebce669a" }, { "name": "DSA-4277", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4277" }, { "name": "USN-3719-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3719-2/" }, { "name": "[debian-lts-announce] 20180802 [SECURITY] [DLA 1455-1] mutt security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2018/08/msg00001.html" }, { "name": "GLSA-201810-07", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201810-07" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.mutt.org/news.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://neomutt.org/2018/07/16/release" }, { "name": "USN-3719-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3719-1/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/neomutt/neomutt/commit/6f163e07ae68654d7ac5268cbb7565f6df79ad85" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-07-17T00:00:00", "descriptions": [ { "lang": "en", "value": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. They have a buffer overflow via base64 data." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-31T09:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "USN-3719-3", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3719-3/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gitlab.com/muttmua/mutt/commit/3d9028fec8f4d08db2251096307c0bbbebce669a" }, { "name": "DSA-4277", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4277" }, { "name": "USN-3719-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3719-2/" }, { "name": "[debian-lts-announce] 20180802 [SECURITY] [DLA 1455-1] mutt security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2018/08/msg00001.html" }, { "name": "GLSA-201810-07", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201810-07" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.mutt.org/news.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://neomutt.org/2018/07/16/release" }, { "name": "USN-3719-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3719-1/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/neomutt/neomutt/commit/6f163e07ae68654d7ac5268cbb7565f6df79ad85" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-14359", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. They have a buffer overflow via base64 data." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "USN-3719-3", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3719-3/" }, { "name": "https://gitlab.com/muttmua/mutt/commit/3d9028fec8f4d08db2251096307c0bbbebce669a", "refsource": "MISC", "url": "https://gitlab.com/muttmua/mutt/commit/3d9028fec8f4d08db2251096307c0bbbebce669a" }, { "name": "DSA-4277", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4277" }, { "name": "USN-3719-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3719-2/" }, { "name": "[debian-lts-announce] 20180802 [SECURITY] [DLA 1455-1] mutt security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/08/msg00001.html" }, { "name": "GLSA-201810-07", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201810-07" }, { "name": "http://www.mutt.org/news.html", "refsource": "MISC", "url": "http://www.mutt.org/news.html" }, { "name": "https://neomutt.org/2018/07/16/release", "refsource": "MISC", "url": "https://neomutt.org/2018/07/16/release" }, { "name": "USN-3719-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3719-1/" }, { "name": "https://github.com/neomutt/neomutt/commit/6f163e07ae68654d7ac5268cbb7565f6df79ad85", "refsource": "MISC", "url": "https://github.com/neomutt/neomutt/commit/6f163e07ae68654d7ac5268cbb7565f6df79ad85" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-14359", "datePublished": "2018-07-17T17:00:00", "dateReserved": "2018-07-17T00:00:00", "dateUpdated": "2024-08-05T09:29:50.128Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2018-14359\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2018-07-17T17:29:00.810\",\"lastModified\":\"2024-11-21T03:48:54.827\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. They have a buffer overflow via base64 data.\"},{\"lang\":\"es\",\"value\":\"Se ha descubierto un problema en Mutt en versiones anteriores a la 1.10.1 y NeoMutt en versiones anteriores al 2018-07-16. Tienen un desbordamiento de b\u00fafer mediante datos en base64.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":true,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-120\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mutt:mutt:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.10.1\",\"matchCriteriaId\":\"2FA2C3A6-423C-4BE5-8FA7-0241384D58D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:neomutt:neomutt:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"20180716\",\"matchCriteriaId\":\"1C15CCD1-1752-4913-9506-32035B52A513\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*\",\"matchCriteriaId\":\"8D305F7A-D159-4716-AB26-5E38BB5CD991\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"B5A6F2F3-4894-4392-8296-3B8DD2679084\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"}]}]}],\"references\":[{\"url\":\"http://www.mutt.org/news.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://github.com/neomutt/neomutt/commit/6f163e07ae68654d7ac5268cbb7565f6df79ad85\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://gitlab.com/muttmua/mutt/commit/3d9028fec8f4d08db2251096307c0bbbebce669a\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/08/msg00001.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://neomutt.org/2018/07/16/release\",\"source\":\"cve@mitre.org\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201810-07\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3719-1/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3719-2/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3719-3/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2018/dsa-4277\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.mutt.org/news.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://github.com/neomutt/neomutt/commit/6f163e07ae68654d7ac5268cbb7565f6df79ad85\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://gitlab.com/muttmua/mutt/commit/3d9028fec8f4d08db2251096307c0bbbebce669a\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/08/msg00001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://neomutt.org/2018/07/16/release\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201810-07\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3719-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3719-2/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3719-3/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2018/dsa-4277\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
opensuse-su-2024:11079-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "neomutt-20210205-3.3 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the neomutt-20210205-3.3 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-11079", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11079-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14349 page", "url": "https://www.suse.com/security/cve/CVE-2018-14349/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14350 page", "url": "https://www.suse.com/security/cve/CVE-2018-14350/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14351 page", "url": "https://www.suse.com/security/cve/CVE-2018-14351/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14352 page", "url": "https://www.suse.com/security/cve/CVE-2018-14352/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14353 page", "url": "https://www.suse.com/security/cve/CVE-2018-14353/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14354 page", "url": "https://www.suse.com/security/cve/CVE-2018-14354/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14355 page", "url": "https://www.suse.com/security/cve/CVE-2018-14355/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14356 page", "url": "https://www.suse.com/security/cve/CVE-2018-14356/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14357 page", "url": "https://www.suse.com/security/cve/CVE-2018-14357/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14358 page", "url": "https://www.suse.com/security/cve/CVE-2018-14358/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14359 page", "url": "https://www.suse.com/security/cve/CVE-2018-14359/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14360 page", "url": "https://www.suse.com/security/cve/CVE-2018-14360/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14361 page", "url": "https://www.suse.com/security/cve/CVE-2018-14361/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14362 page", "url": "https://www.suse.com/security/cve/CVE-2018-14362/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14363 page", "url": "https://www.suse.com/security/cve/CVE-2018-14363/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14093 page", "url": "https://www.suse.com/security/cve/CVE-2020-14093/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14154 page", "url": "https://www.suse.com/security/cve/CVE-2020-14154/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14954 page", "url": "https://www.suse.com/security/cve/CVE-2020-14954/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-28896 page", "url": "https://www.suse.com/security/cve/CVE-2020-28896/" } ], "title": "neomutt-20210205-3.3 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:11079-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "neomutt-20210205-3.3.aarch64", "product": { "name": "neomutt-20210205-3.3.aarch64", "product_id": "neomutt-20210205-3.3.aarch64" } }, { "category": "product_version", "name": "neomutt-doc-20210205-3.3.aarch64", "product": { "name": "neomutt-doc-20210205-3.3.aarch64", "product_id": "neomutt-doc-20210205-3.3.aarch64" } }, { "category": "product_version", "name": "neomutt-lang-20210205-3.3.aarch64", "product": { "name": "neomutt-lang-20210205-3.3.aarch64", "product_id": "neomutt-lang-20210205-3.3.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "neomutt-20210205-3.3.ppc64le", "product": { "name": "neomutt-20210205-3.3.ppc64le", "product_id": "neomutt-20210205-3.3.ppc64le" } }, { "category": "product_version", "name": "neomutt-doc-20210205-3.3.ppc64le", "product": { "name": "neomutt-doc-20210205-3.3.ppc64le", "product_id": "neomutt-doc-20210205-3.3.ppc64le" } }, { "category": "product_version", "name": "neomutt-lang-20210205-3.3.ppc64le", "product": { "name": "neomutt-lang-20210205-3.3.ppc64le", "product_id": "neomutt-lang-20210205-3.3.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "neomutt-20210205-3.3.s390x", "product": { "name": "neomutt-20210205-3.3.s390x", "product_id": "neomutt-20210205-3.3.s390x" } }, { "category": "product_version", "name": "neomutt-doc-20210205-3.3.s390x", "product": { "name": "neomutt-doc-20210205-3.3.s390x", "product_id": "neomutt-doc-20210205-3.3.s390x" } }, { "category": "product_version", "name": "neomutt-lang-20210205-3.3.s390x", "product": { "name": "neomutt-lang-20210205-3.3.s390x", "product_id": "neomutt-lang-20210205-3.3.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "neomutt-20210205-3.3.x86_64", "product": { "name": "neomutt-20210205-3.3.x86_64", "product_id": "neomutt-20210205-3.3.x86_64" } }, { "category": "product_version", "name": "neomutt-doc-20210205-3.3.x86_64", "product": { "name": "neomutt-doc-20210205-3.3.x86_64", "product_id": "neomutt-doc-20210205-3.3.x86_64" } }, { "category": "product_version", "name": "neomutt-lang-20210205-3.3.x86_64", "product": { "name": "neomutt-lang-20210205-3.3.x86_64", "product_id": "neomutt-lang-20210205-3.3.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "neomutt-20210205-3.3.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64" }, "product_reference": "neomutt-20210205-3.3.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "neomutt-20210205-3.3.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le" }, "product_reference": "neomutt-20210205-3.3.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "neomutt-20210205-3.3.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x" }, "product_reference": "neomutt-20210205-3.3.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "neomutt-20210205-3.3.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64" }, "product_reference": "neomutt-20210205-3.3.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "neomutt-doc-20210205-3.3.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64" }, "product_reference": "neomutt-doc-20210205-3.3.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "neomutt-doc-20210205-3.3.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le" }, "product_reference": "neomutt-doc-20210205-3.3.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "neomutt-doc-20210205-3.3.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x" }, "product_reference": "neomutt-doc-20210205-3.3.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "neomutt-doc-20210205-3.3.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64" }, "product_reference": "neomutt-doc-20210205-3.3.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "neomutt-lang-20210205-3.3.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64" }, "product_reference": "neomutt-lang-20210205-3.3.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "neomutt-lang-20210205-3.3.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le" }, "product_reference": "neomutt-lang-20210205-3.3.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "neomutt-lang-20210205-3.3.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x" }, "product_reference": "neomutt-lang-20210205-3.3.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "neomutt-lang-20210205-3.3.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64" }, "product_reference": "neomutt-lang-20210205-3.3.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-14349", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14349" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/command.c mishandles a NO response without a message.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14349", "url": "https://www.suse.com/security/cve/CVE-2018-14349" }, { "category": "external", "summary": "SUSE Bug 1101428 for CVE-2018-14349", "url": "https://bugzilla.suse.com/1101428" }, { "category": "external", "summary": "SUSE Bug 1101589 for CVE-2018-14349", "url": "https://bugzilla.suse.com/1101589" }, { "category": "external", "summary": "SUSE Bug 1101593 for CVE-2018-14349", "url": "https://bugzilla.suse.com/1101593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-14349" }, { "cve": "CVE-2018-14350", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14350" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/message.c has a stack-based buffer overflow for a FETCH response with a long INTERNALDATE field.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14350", "url": "https://www.suse.com/security/cve/CVE-2018-14350" }, { "category": "external", "summary": "SUSE Bug 1101428 for CVE-2018-14350", "url": "https://bugzilla.suse.com/1101428" }, { "category": "external", "summary": "SUSE Bug 1101588 for CVE-2018-14350", "url": "https://bugzilla.suse.com/1101588" }, { "category": "external", "summary": "SUSE Bug 1101593 for CVE-2018-14350", "url": "https://bugzilla.suse.com/1101593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-14350" }, { "cve": "CVE-2018-14351", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14351" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/command.c mishandles a long IMAP status mailbox literal count size.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14351", "url": "https://www.suse.com/security/cve/CVE-2018-14351" }, { "category": "external", "summary": "SUSE Bug 1101428 for CVE-2018-14351", "url": "https://bugzilla.suse.com/1101428" }, { "category": "external", "summary": "SUSE Bug 1101583 for CVE-2018-14351", "url": "https://bugzilla.suse.com/1101583" }, { "category": "external", "summary": "SUSE Bug 1101593 for CVE-2018-14351", "url": "https://bugzilla.suse.com/1101593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-14351" }, { "cve": "CVE-2018-14352", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14352" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap_quote_string in imap/util.c does not leave room for quote characters, leading to a stack-based buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14352", "url": "https://www.suse.com/security/cve/CVE-2018-14352" }, { "category": "external", "summary": "SUSE Bug 1101428 for CVE-2018-14352", "url": "https://bugzilla.suse.com/1101428" }, { "category": "external", "summary": "SUSE Bug 1101582 for CVE-2018-14352", "url": "https://bugzilla.suse.com/1101582" }, { "category": "external", "summary": "SUSE Bug 1101593 for CVE-2018-14352", "url": "https://bugzilla.suse.com/1101593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-14352" }, { "cve": "CVE-2018-14353", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14353" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap_quote_string in imap/util.c has an integer underflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14353", "url": "https://www.suse.com/security/cve/CVE-2018-14353" }, { "category": "external", "summary": "SUSE Bug 1101428 for CVE-2018-14353", "url": "https://bugzilla.suse.com/1101428" }, { "category": "external", "summary": "SUSE Bug 1101581 for CVE-2018-14353", "url": "https://bugzilla.suse.com/1101581" }, { "category": "external", "summary": "SUSE Bug 1101593 for CVE-2018-14353", "url": "https://bugzilla.suse.com/1101593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-14353" }, { "cve": "CVE-2018-14354", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14354" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. They allow remote IMAP servers to execute arbitrary commands via backquote characters, related to the mailboxes command associated with a manual subscription or unsubscription.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14354", "url": "https://www.suse.com/security/cve/CVE-2018-14354" }, { "category": "external", "summary": "SUSE Bug 1101428 for CVE-2018-14354", "url": "https://bugzilla.suse.com/1101428" }, { "category": "external", "summary": "SUSE Bug 1101578 for CVE-2018-14354", "url": "https://bugzilla.suse.com/1101578" }, { "category": "external", "summary": "SUSE Bug 1101581 for CVE-2018-14354", "url": "https://bugzilla.suse.com/1101581" }, { "category": "external", "summary": "SUSE Bug 1101589 for CVE-2018-14354", "url": "https://bugzilla.suse.com/1101589" }, { "category": "external", "summary": "SUSE Bug 1101593 for CVE-2018-14354", "url": "https://bugzilla.suse.com/1101593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.6, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2018-14354" }, { "cve": "CVE-2018-14355", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14355" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/util.c mishandles \"..\" directory traversal in a mailbox name.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14355", "url": "https://www.suse.com/security/cve/CVE-2018-14355" }, { "category": "external", "summary": "SUSE Bug 1101428 for CVE-2018-14355", "url": "https://bugzilla.suse.com/1101428" }, { "category": "external", "summary": "SUSE Bug 1101577 for CVE-2018-14355", "url": "https://bugzilla.suse.com/1101577" }, { "category": "external", "summary": "SUSE Bug 1101593 for CVE-2018-14355", "url": "https://bugzilla.suse.com/1101593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-14355" }, { "cve": "CVE-2018-14356", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14356" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. pop.c mishandles a zero-length UID.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14356", "url": "https://www.suse.com/security/cve/CVE-2018-14356" }, { "category": "external", "summary": "SUSE Bug 1101428 for CVE-2018-14356", "url": "https://bugzilla.suse.com/1101428" }, { "category": "external", "summary": "SUSE Bug 1101576 for CVE-2018-14356", "url": "https://bugzilla.suse.com/1101576" }, { "category": "external", "summary": "SUSE Bug 1101589 for CVE-2018-14356", "url": "https://bugzilla.suse.com/1101589" }, { "category": "external", "summary": "SUSE Bug 1101593 for CVE-2018-14356", "url": "https://bugzilla.suse.com/1101593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-14356" }, { "cve": "CVE-2018-14357", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14357" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. They allow remote IMAP servers to execute arbitrary commands via backquote characters, related to the mailboxes command associated with an automatic subscription.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14357", "url": "https://www.suse.com/security/cve/CVE-2018-14357" }, { "category": "external", "summary": "SUSE Bug 1101428 for CVE-2018-14357", "url": "https://bugzilla.suse.com/1101428" }, { "category": "external", "summary": "SUSE Bug 1101573 for CVE-2018-14357", "url": "https://bugzilla.suse.com/1101573" }, { "category": "external", "summary": "SUSE Bug 1101581 for CVE-2018-14357", "url": "https://bugzilla.suse.com/1101581" }, { "category": "external", "summary": "SUSE Bug 1101589 for CVE-2018-14357", "url": "https://bugzilla.suse.com/1101589" }, { "category": "external", "summary": "SUSE Bug 1101593 for CVE-2018-14357", "url": "https://bugzilla.suse.com/1101593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-14357" }, { "cve": "CVE-2018-14358", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14358" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/message.c has a stack-based buffer overflow for a FETCH response with a long RFC822.SIZE field.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14358", "url": "https://www.suse.com/security/cve/CVE-2018-14358" }, { "category": "external", "summary": "SUSE Bug 1101428 for CVE-2018-14358", "url": "https://bugzilla.suse.com/1101428" }, { "category": "external", "summary": "SUSE Bug 1101571 for CVE-2018-14358", "url": "https://bugzilla.suse.com/1101571" }, { "category": "external", "summary": "SUSE Bug 1101593 for CVE-2018-14358", "url": "https://bugzilla.suse.com/1101593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-14358" }, { "cve": "CVE-2018-14359", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14359" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. They have a buffer overflow via base64 data.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14359", "url": "https://www.suse.com/security/cve/CVE-2018-14359" }, { "category": "external", "summary": "SUSE Bug 1101428 for CVE-2018-14359", "url": "https://bugzilla.suse.com/1101428" }, { "category": "external", "summary": "SUSE Bug 1101570 for CVE-2018-14359", "url": "https://bugzilla.suse.com/1101570" }, { "category": "external", "summary": "SUSE Bug 1101589 for CVE-2018-14359", "url": "https://bugzilla.suse.com/1101589" }, { "category": "external", "summary": "SUSE Bug 1101593 for CVE-2018-14359", "url": "https://bugzilla.suse.com/1101593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-14359" }, { "cve": "CVE-2018-14360", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14360" } ], "notes": [ { "category": "general", "text": "An issue was discovered in NeoMutt before 2018-07-16. nntp_add_group in newsrc.c has a stack-based buffer overflow because of incorrect sscanf usage.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14360", "url": "https://www.suse.com/security/cve/CVE-2018-14360" }, { "category": "external", "summary": "SUSE Bug 1101428 for CVE-2018-14360", "url": "https://bugzilla.suse.com/1101428" }, { "category": "external", "summary": "SUSE Bug 1101569 for CVE-2018-14360", "url": "https://bugzilla.suse.com/1101569" }, { "category": "external", "summary": "SUSE Bug 1101593 for CVE-2018-14360", "url": "https://bugzilla.suse.com/1101593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2018-14360" }, { "cve": "CVE-2018-14361", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14361" } ], "notes": [ { "category": "general", "text": "An issue was discovered in NeoMutt before 2018-07-16. nntp.c proceeds even if memory allocation fails for messages data.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14361", "url": "https://www.suse.com/security/cve/CVE-2018-14361" }, { "category": "external", "summary": "SUSE Bug 1101428 for CVE-2018-14361", "url": "https://bugzilla.suse.com/1101428" }, { "category": "external", "summary": "SUSE Bug 1101568 for CVE-2018-14361", "url": "https://bugzilla.suse.com/1101568" }, { "category": "external", "summary": "SUSE Bug 1101593 for CVE-2018-14361", "url": "https://bugzilla.suse.com/1101593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2018-14361" }, { "cve": "CVE-2018-14362", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14362" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. pop.c does not forbid characters that may have unsafe interaction with message-cache pathnames, as demonstrated by a \u0027/\u0027 character.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14362", "url": "https://www.suse.com/security/cve/CVE-2018-14362" }, { "category": "external", "summary": "SUSE Bug 1101428 for CVE-2018-14362", "url": "https://bugzilla.suse.com/1101428" }, { "category": "external", "summary": "SUSE Bug 1101567 for CVE-2018-14362", "url": "https://bugzilla.suse.com/1101567" }, { "category": "external", "summary": "SUSE Bug 1101589 for CVE-2018-14362", "url": "https://bugzilla.suse.com/1101589" }, { "category": "external", "summary": "SUSE Bug 1101593 for CVE-2018-14362", "url": "https://bugzilla.suse.com/1101593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-14362" }, { "cve": "CVE-2018-14363", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14363" } ], "notes": [ { "category": "general", "text": "An issue was discovered in NeoMutt before 2018-07-16. newsrc.c does not properly restrict \u0027/\u0027 characters that may have unsafe interaction with cache pathnames.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14363", "url": "https://www.suse.com/security/cve/CVE-2018-14363" }, { "category": "external", "summary": "SUSE Bug 1101428 for CVE-2018-14363", "url": "https://bugzilla.suse.com/1101428" }, { "category": "external", "summary": "SUSE Bug 1101566 for CVE-2018-14363", "url": "https://bugzilla.suse.com/1101566" }, { "category": "external", "summary": "SUSE Bug 1101593 for CVE-2018-14363", "url": "https://bugzilla.suse.com/1101593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-14363" }, { "cve": "CVE-2020-14093", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14093" } ], "notes": [ { "category": "general", "text": "Mutt before 1.14.3 allows an IMAP fcc/postpone man-in-the-middle attack via a PREAUTH response.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14093", "url": "https://www.suse.com/security/cve/CVE-2020-14093" }, { "category": "external", "summary": "SUSE Bug 1172906 for CVE-2020-14093", "url": "https://bugzilla.suse.com/1172906" }, { "category": "external", "summary": "SUSE Bug 1172935 for CVE-2020-14093", "url": "https://bugzilla.suse.com/1172935" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14093" }, { "cve": "CVE-2020-14154", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14154" } ], "notes": [ { "category": "general", "text": "Mutt before 1.14.3 proceeds with a connection even if, in response to a GnuTLS certificate prompt, the user rejects an expired intermediate certificate.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14154", "url": "https://www.suse.com/security/cve/CVE-2020-14154" }, { "category": "external", "summary": "SUSE Bug 1172906 for CVE-2020-14154", "url": "https://bugzilla.suse.com/1172906" }, { "category": "external", "summary": "SUSE Bug 1172935 for CVE-2020-14154", "url": "https://bugzilla.suse.com/1172935" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14154" }, { "cve": "CVE-2020-14954", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14954" } ], "notes": [ { "category": "general", "text": "Mutt before 1.14.4 and NeoMutt before 2020-06-19 have a STARTTLS buffering issue that affects IMAP, SMTP, and POP3. When a server sends a \"begin TLS\" response, the client reads additional data (e.g., from a man-in-the-middle attacker) and evaluates it in a TLS context, aka \"response injection.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14954", "url": "https://www.suse.com/security/cve/CVE-2020-14954" }, { "category": "external", "summary": "SUSE Bug 1173197 for CVE-2020-14954", "url": "https://bugzilla.suse.com/1173197" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14954" }, { "cve": "CVE-2020-28896", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-28896" } ], "notes": [ { "category": "general", "text": "Mutt before 2.0.2 and NeoMutt before 2020-11-20 did not ensure that $ssl_force_tls was processed if an IMAP server\u0027s initial server response was invalid. The connection was not properly closed, and the code could continue attempting to authenticate. This could result in authentication credentials being exposed on an unencrypted connection, or to a machine-in-the-middle.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-28896", "url": "https://www.suse.com/security/cve/CVE-2020-28896" }, { "category": "external", "summary": "SUSE Bug 1179035 for CVE-2020-28896", "url": "https://bugzilla.suse.com/1179035" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:neomutt-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-doc-20210205-3.3.x86_64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.aarch64", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.ppc64le", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.s390x", "openSUSE Tumbleweed:neomutt-lang-20210205-3.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-28896" } ] }
opensuse-su-2024:11069-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "mutt-2.0.7-2.2 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the mutt-2.0.7-2.2 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-11069", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11069-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2007-1558 page", "url": "https://www.suse.com/security/cve/CVE-2007-1558/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14349 page", "url": "https://www.suse.com/security/cve/CVE-2018-14349/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14350 page", "url": "https://www.suse.com/security/cve/CVE-2018-14350/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14351 page", "url": "https://www.suse.com/security/cve/CVE-2018-14351/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14352 page", "url": "https://www.suse.com/security/cve/CVE-2018-14352/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14353 page", "url": "https://www.suse.com/security/cve/CVE-2018-14353/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14354 page", "url": "https://www.suse.com/security/cve/CVE-2018-14354/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14355 page", "url": "https://www.suse.com/security/cve/CVE-2018-14355/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14356 page", "url": "https://www.suse.com/security/cve/CVE-2018-14356/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14357 page", "url": "https://www.suse.com/security/cve/CVE-2018-14357/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14358 page", "url": "https://www.suse.com/security/cve/CVE-2018-14358/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14359 page", "url": "https://www.suse.com/security/cve/CVE-2018-14359/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14360 page", "url": "https://www.suse.com/security/cve/CVE-2018-14360/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14361 page", "url": "https://www.suse.com/security/cve/CVE-2018-14361/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14362 page", "url": "https://www.suse.com/security/cve/CVE-2018-14362/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14363 page", "url": "https://www.suse.com/security/cve/CVE-2018-14363/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14093 page", "url": "https://www.suse.com/security/cve/CVE-2020-14093/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14954 page", "url": "https://www.suse.com/security/cve/CVE-2020-14954/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-28896 page", "url": "https://www.suse.com/security/cve/CVE-2020-28896/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3181 page", "url": "https://www.suse.com/security/cve/CVE-2021-3181/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-32055 page", "url": "https://www.suse.com/security/cve/CVE-2021-32055/" } ], "title": "mutt-2.0.7-2.2 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:11069-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "mutt-2.0.7-2.2.aarch64", "product": { "name": "mutt-2.0.7-2.2.aarch64", "product_id": "mutt-2.0.7-2.2.aarch64" } }, { "category": "product_version", "name": "mutt-doc-2.0.7-2.2.aarch64", "product": { "name": "mutt-doc-2.0.7-2.2.aarch64", "product_id": "mutt-doc-2.0.7-2.2.aarch64" } }, { "category": "product_version", "name": "mutt-lang-2.0.7-2.2.aarch64", "product": { "name": "mutt-lang-2.0.7-2.2.aarch64", "product_id": "mutt-lang-2.0.7-2.2.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "mutt-2.0.7-2.2.ppc64le", "product": { "name": "mutt-2.0.7-2.2.ppc64le", "product_id": "mutt-2.0.7-2.2.ppc64le" } }, { "category": "product_version", "name": "mutt-doc-2.0.7-2.2.ppc64le", "product": { "name": "mutt-doc-2.0.7-2.2.ppc64le", "product_id": "mutt-doc-2.0.7-2.2.ppc64le" } }, { "category": "product_version", "name": "mutt-lang-2.0.7-2.2.ppc64le", "product": { "name": "mutt-lang-2.0.7-2.2.ppc64le", "product_id": "mutt-lang-2.0.7-2.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "mutt-2.0.7-2.2.s390x", "product": { "name": "mutt-2.0.7-2.2.s390x", "product_id": "mutt-2.0.7-2.2.s390x" } }, { "category": "product_version", "name": "mutt-doc-2.0.7-2.2.s390x", "product": { "name": "mutt-doc-2.0.7-2.2.s390x", "product_id": "mutt-doc-2.0.7-2.2.s390x" } }, { "category": "product_version", "name": "mutt-lang-2.0.7-2.2.s390x", "product": { "name": "mutt-lang-2.0.7-2.2.s390x", "product_id": "mutt-lang-2.0.7-2.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "mutt-2.0.7-2.2.x86_64", "product": { "name": "mutt-2.0.7-2.2.x86_64", "product_id": "mutt-2.0.7-2.2.x86_64" } }, { "category": "product_version", "name": "mutt-doc-2.0.7-2.2.x86_64", "product": { "name": "mutt-doc-2.0.7-2.2.x86_64", "product_id": "mutt-doc-2.0.7-2.2.x86_64" } }, { "category": "product_version", "name": "mutt-lang-2.0.7-2.2.x86_64", "product": { "name": "mutt-lang-2.0.7-2.2.x86_64", "product_id": "mutt-lang-2.0.7-2.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "mutt-2.0.7-2.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64" }, "product_reference": "mutt-2.0.7-2.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-2.0.7-2.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le" }, "product_reference": "mutt-2.0.7-2.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-2.0.7-2.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x" }, "product_reference": "mutt-2.0.7-2.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-2.0.7-2.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64" }, "product_reference": "mutt-2.0.7-2.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-doc-2.0.7-2.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64" }, "product_reference": "mutt-doc-2.0.7-2.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-doc-2.0.7-2.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le" }, "product_reference": "mutt-doc-2.0.7-2.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-doc-2.0.7-2.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x" }, "product_reference": "mutt-doc-2.0.7-2.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-doc-2.0.7-2.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64" }, "product_reference": "mutt-doc-2.0.7-2.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-lang-2.0.7-2.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64" }, "product_reference": "mutt-lang-2.0.7-2.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-lang-2.0.7-2.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le" }, "product_reference": "mutt-lang-2.0.7-2.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-lang-2.0.7-2.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x" }, "product_reference": "mutt-lang-2.0.7-2.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-lang-2.0.7-2.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64" }, "product_reference": "mutt-lang-2.0.7-2.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2007-1558", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2007-1558" } ], "notes": [ { "category": "general", "text": "The APOP protocol allows remote attackers to guess the first 3 characters of a password via man-in-the-middle (MITM) attacks that use crafted message IDs and MD5 collisions. NOTE: this design-level issue potentially affects all products that use APOP, including (1) Thunderbird 1.x before 1.5.0.12 and 2.x before 2.0.0.4, (2) Evolution, (3) mutt, (4) fetchmail before 6.3.8, (5) SeaMonkey 1.0.x before 1.0.9 and 1.1.x before 1.1.2, (6) Balsa 2.3.16 and earlier, (7) Mailfilter before 0.8.2, and possibly other products.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2007-1558", "url": "https://www.suse.com/security/cve/CVE-2007-1558" }, { "category": "external", "summary": "SUSE Bug 262450 for CVE-2007-1558", "url": "https://bugzilla.suse.com/262450" }, { "category": "external", "summary": "SUSE Bug 271197 for CVE-2007-1558", "url": "https://bugzilla.suse.com/271197" }, { "category": "external", "summary": "SUSE Bug 279843 for CVE-2007-1558", "url": "https://bugzilla.suse.com/279843" }, { "category": "external", "summary": "SUSE Bug 281321 for CVE-2007-1558", "url": "https://bugzilla.suse.com/281321" }, { "category": "external", "summary": "SUSE Bug 281323 for CVE-2007-1558", "url": "https://bugzilla.suse.com/281323" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2007-1558" }, { "cve": "CVE-2018-14349", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14349" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/command.c mishandles a NO response without a message.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14349", "url": "https://www.suse.com/security/cve/CVE-2018-14349" }, { "category": "external", "summary": "SUSE Bug 1101428 for CVE-2018-14349", "url": "https://bugzilla.suse.com/1101428" }, { "category": "external", "summary": "SUSE Bug 1101589 for CVE-2018-14349", "url": "https://bugzilla.suse.com/1101589" }, { "category": "external", "summary": "SUSE Bug 1101593 for CVE-2018-14349", "url": "https://bugzilla.suse.com/1101593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-14349" }, { "cve": "CVE-2018-14350", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14350" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/message.c has a stack-based buffer overflow for a FETCH response with a long INTERNALDATE field.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14350", "url": "https://www.suse.com/security/cve/CVE-2018-14350" }, { "category": "external", "summary": "SUSE Bug 1101428 for CVE-2018-14350", "url": "https://bugzilla.suse.com/1101428" }, { "category": "external", "summary": "SUSE Bug 1101588 for CVE-2018-14350", "url": "https://bugzilla.suse.com/1101588" }, { "category": "external", "summary": "SUSE Bug 1101593 for CVE-2018-14350", "url": "https://bugzilla.suse.com/1101593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-14350" }, { "cve": "CVE-2018-14351", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14351" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/command.c mishandles a long IMAP status mailbox literal count size.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14351", "url": "https://www.suse.com/security/cve/CVE-2018-14351" }, { "category": "external", "summary": "SUSE Bug 1101428 for CVE-2018-14351", "url": "https://bugzilla.suse.com/1101428" }, { "category": "external", "summary": "SUSE Bug 1101583 for CVE-2018-14351", "url": "https://bugzilla.suse.com/1101583" }, { "category": "external", "summary": "SUSE Bug 1101593 for CVE-2018-14351", "url": "https://bugzilla.suse.com/1101593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-14351" }, { "cve": "CVE-2018-14352", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14352" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap_quote_string in imap/util.c does not leave room for quote characters, leading to a stack-based buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14352", "url": "https://www.suse.com/security/cve/CVE-2018-14352" }, { "category": "external", "summary": "SUSE Bug 1101428 for CVE-2018-14352", "url": "https://bugzilla.suse.com/1101428" }, { "category": "external", "summary": "SUSE Bug 1101582 for CVE-2018-14352", "url": "https://bugzilla.suse.com/1101582" }, { "category": "external", "summary": "SUSE Bug 1101593 for CVE-2018-14352", "url": "https://bugzilla.suse.com/1101593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-14352" }, { "cve": "CVE-2018-14353", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14353" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap_quote_string in imap/util.c has an integer underflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14353", "url": "https://www.suse.com/security/cve/CVE-2018-14353" }, { "category": "external", "summary": "SUSE Bug 1101428 for CVE-2018-14353", "url": "https://bugzilla.suse.com/1101428" }, { "category": "external", "summary": "SUSE Bug 1101581 for CVE-2018-14353", "url": "https://bugzilla.suse.com/1101581" }, { "category": "external", "summary": "SUSE Bug 1101593 for CVE-2018-14353", "url": "https://bugzilla.suse.com/1101593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-14353" }, { "cve": "CVE-2018-14354", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14354" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. They allow remote IMAP servers to execute arbitrary commands via backquote characters, related to the mailboxes command associated with a manual subscription or unsubscription.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14354", "url": "https://www.suse.com/security/cve/CVE-2018-14354" }, { "category": "external", "summary": "SUSE Bug 1101428 for CVE-2018-14354", "url": "https://bugzilla.suse.com/1101428" }, { "category": "external", "summary": "SUSE Bug 1101578 for CVE-2018-14354", "url": "https://bugzilla.suse.com/1101578" }, { "category": "external", "summary": "SUSE Bug 1101581 for CVE-2018-14354", "url": "https://bugzilla.suse.com/1101581" }, { "category": "external", "summary": "SUSE Bug 1101589 for CVE-2018-14354", "url": "https://bugzilla.suse.com/1101589" }, { "category": "external", "summary": "SUSE Bug 1101593 for CVE-2018-14354", "url": "https://bugzilla.suse.com/1101593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.6, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2018-14354" }, { "cve": "CVE-2018-14355", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14355" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/util.c mishandles \"..\" directory traversal in a mailbox name.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14355", "url": "https://www.suse.com/security/cve/CVE-2018-14355" }, { "category": "external", "summary": "SUSE Bug 1101428 for CVE-2018-14355", "url": "https://bugzilla.suse.com/1101428" }, { "category": "external", "summary": "SUSE Bug 1101577 for CVE-2018-14355", "url": "https://bugzilla.suse.com/1101577" }, { "category": "external", "summary": "SUSE Bug 1101593 for CVE-2018-14355", "url": "https://bugzilla.suse.com/1101593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-14355" }, { "cve": "CVE-2018-14356", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14356" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. pop.c mishandles a zero-length UID.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14356", "url": "https://www.suse.com/security/cve/CVE-2018-14356" }, { "category": "external", "summary": "SUSE Bug 1101428 for CVE-2018-14356", "url": "https://bugzilla.suse.com/1101428" }, { "category": "external", "summary": "SUSE Bug 1101576 for CVE-2018-14356", "url": "https://bugzilla.suse.com/1101576" }, { "category": "external", "summary": "SUSE Bug 1101589 for CVE-2018-14356", "url": "https://bugzilla.suse.com/1101589" }, { "category": "external", "summary": "SUSE Bug 1101593 for CVE-2018-14356", "url": "https://bugzilla.suse.com/1101593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-14356" }, { "cve": "CVE-2018-14357", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14357" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. They allow remote IMAP servers to execute arbitrary commands via backquote characters, related to the mailboxes command associated with an automatic subscription.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14357", "url": "https://www.suse.com/security/cve/CVE-2018-14357" }, { "category": "external", "summary": "SUSE Bug 1101428 for CVE-2018-14357", "url": "https://bugzilla.suse.com/1101428" }, { "category": "external", "summary": "SUSE Bug 1101573 for CVE-2018-14357", "url": "https://bugzilla.suse.com/1101573" }, { "category": "external", "summary": "SUSE Bug 1101581 for CVE-2018-14357", "url": "https://bugzilla.suse.com/1101581" }, { "category": "external", "summary": "SUSE Bug 1101589 for CVE-2018-14357", "url": "https://bugzilla.suse.com/1101589" }, { "category": "external", "summary": "SUSE Bug 1101593 for CVE-2018-14357", "url": "https://bugzilla.suse.com/1101593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-14357" }, { "cve": "CVE-2018-14358", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14358" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/message.c has a stack-based buffer overflow for a FETCH response with a long RFC822.SIZE field.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14358", "url": "https://www.suse.com/security/cve/CVE-2018-14358" }, { "category": "external", "summary": "SUSE Bug 1101428 for CVE-2018-14358", "url": "https://bugzilla.suse.com/1101428" }, { "category": "external", "summary": "SUSE Bug 1101571 for CVE-2018-14358", "url": "https://bugzilla.suse.com/1101571" }, { "category": "external", "summary": "SUSE Bug 1101593 for CVE-2018-14358", "url": "https://bugzilla.suse.com/1101593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-14358" }, { "cve": "CVE-2018-14359", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14359" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. They have a buffer overflow via base64 data.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14359", "url": "https://www.suse.com/security/cve/CVE-2018-14359" }, { "category": "external", "summary": "SUSE Bug 1101428 for CVE-2018-14359", "url": "https://bugzilla.suse.com/1101428" }, { "category": "external", "summary": "SUSE Bug 1101570 for CVE-2018-14359", "url": "https://bugzilla.suse.com/1101570" }, { "category": "external", "summary": "SUSE Bug 1101589 for CVE-2018-14359", "url": "https://bugzilla.suse.com/1101589" }, { "category": "external", "summary": "SUSE Bug 1101593 for CVE-2018-14359", "url": "https://bugzilla.suse.com/1101593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-14359" }, { "cve": "CVE-2018-14360", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14360" } ], "notes": [ { "category": "general", "text": "An issue was discovered in NeoMutt before 2018-07-16. nntp_add_group in newsrc.c has a stack-based buffer overflow because of incorrect sscanf usage.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14360", "url": "https://www.suse.com/security/cve/CVE-2018-14360" }, { "category": "external", "summary": "SUSE Bug 1101428 for CVE-2018-14360", "url": "https://bugzilla.suse.com/1101428" }, { "category": "external", "summary": "SUSE Bug 1101569 for CVE-2018-14360", "url": "https://bugzilla.suse.com/1101569" }, { "category": "external", "summary": "SUSE Bug 1101593 for CVE-2018-14360", "url": "https://bugzilla.suse.com/1101593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2018-14360" }, { "cve": "CVE-2018-14361", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14361" } ], "notes": [ { "category": "general", "text": "An issue was discovered in NeoMutt before 2018-07-16. nntp.c proceeds even if memory allocation fails for messages data.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14361", "url": "https://www.suse.com/security/cve/CVE-2018-14361" }, { "category": "external", "summary": "SUSE Bug 1101428 for CVE-2018-14361", "url": "https://bugzilla.suse.com/1101428" }, { "category": "external", "summary": "SUSE Bug 1101568 for CVE-2018-14361", "url": "https://bugzilla.suse.com/1101568" }, { "category": "external", "summary": "SUSE Bug 1101593 for CVE-2018-14361", "url": "https://bugzilla.suse.com/1101593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2018-14361" }, { "cve": "CVE-2018-14362", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14362" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. pop.c does not forbid characters that may have unsafe interaction with message-cache pathnames, as demonstrated by a \u0027/\u0027 character.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14362", "url": "https://www.suse.com/security/cve/CVE-2018-14362" }, { "category": "external", "summary": "SUSE Bug 1101428 for CVE-2018-14362", "url": "https://bugzilla.suse.com/1101428" }, { "category": "external", "summary": "SUSE Bug 1101567 for CVE-2018-14362", "url": "https://bugzilla.suse.com/1101567" }, { "category": "external", "summary": "SUSE Bug 1101589 for CVE-2018-14362", "url": "https://bugzilla.suse.com/1101589" }, { "category": "external", "summary": "SUSE Bug 1101593 for CVE-2018-14362", "url": "https://bugzilla.suse.com/1101593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-14362" }, { "cve": "CVE-2018-14363", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14363" } ], "notes": [ { "category": "general", "text": "An issue was discovered in NeoMutt before 2018-07-16. newsrc.c does not properly restrict \u0027/\u0027 characters that may have unsafe interaction with cache pathnames.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14363", "url": "https://www.suse.com/security/cve/CVE-2018-14363" }, { "category": "external", "summary": "SUSE Bug 1101428 for CVE-2018-14363", "url": "https://bugzilla.suse.com/1101428" }, { "category": "external", "summary": "SUSE Bug 1101566 for CVE-2018-14363", "url": "https://bugzilla.suse.com/1101566" }, { "category": "external", "summary": "SUSE Bug 1101593 for CVE-2018-14363", "url": "https://bugzilla.suse.com/1101593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-14363" }, { "cve": "CVE-2020-14093", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14093" } ], "notes": [ { "category": "general", "text": "Mutt before 1.14.3 allows an IMAP fcc/postpone man-in-the-middle attack via a PREAUTH response.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14093", "url": "https://www.suse.com/security/cve/CVE-2020-14093" }, { "category": "external", "summary": "SUSE Bug 1172906 for CVE-2020-14093", "url": "https://bugzilla.suse.com/1172906" }, { "category": "external", "summary": "SUSE Bug 1172935 for CVE-2020-14093", "url": "https://bugzilla.suse.com/1172935" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14093" }, { "cve": "CVE-2020-14954", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14954" } ], "notes": [ { "category": "general", "text": "Mutt before 1.14.4 and NeoMutt before 2020-06-19 have a STARTTLS buffering issue that affects IMAP, SMTP, and POP3. When a server sends a \"begin TLS\" response, the client reads additional data (e.g., from a man-in-the-middle attacker) and evaluates it in a TLS context, aka \"response injection.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14954", "url": "https://www.suse.com/security/cve/CVE-2020-14954" }, { "category": "external", "summary": "SUSE Bug 1173197 for CVE-2020-14954", "url": "https://bugzilla.suse.com/1173197" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14954" }, { "cve": "CVE-2020-28896", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-28896" } ], "notes": [ { "category": "general", "text": "Mutt before 2.0.2 and NeoMutt before 2020-11-20 did not ensure that $ssl_force_tls was processed if an IMAP server\u0027s initial server response was invalid. The connection was not properly closed, and the code could continue attempting to authenticate. This could result in authentication credentials being exposed on an unencrypted connection, or to a machine-in-the-middle.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-28896", "url": "https://www.suse.com/security/cve/CVE-2020-28896" }, { "category": "external", "summary": "SUSE Bug 1179035 for CVE-2020-28896", "url": "https://bugzilla.suse.com/1179035" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-28896" }, { "cve": "CVE-2021-3181", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3181" } ], "notes": [ { "category": "general", "text": "rfc822.c in Mutt through 2.0.4 allows remote attackers to cause a denial of service (mailbox unavailability) by sending email messages with sequences of semicolon characters in RFC822 address fields (aka terminators of empty groups). A small email message from the attacker can cause large memory consumption, and the victim may then be unable to see email messages from other persons.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3181", "url": "https://www.suse.com/security/cve/CVE-2021-3181" }, { "category": "external", "summary": "SUSE Bug 1181221 for CVE-2021-3181", "url": "https://bugzilla.suse.com/1181221" }, { "category": "external", "summary": "SUSE Bug 1181505 for CVE-2021-3181", "url": "https://bugzilla.suse.com/1181505" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-3181" }, { "cve": "CVE-2021-32055", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-32055" } ], "notes": [ { "category": "general", "text": "Mutt 1.11.0 through 2.0.x before 2.0.7 (and NeoMutt 2019-10-25 through 2021-05-04) has a $imap_qresync issue in which imap/util.c has an out-of-bounds read in situations where an IMAP sequence set ends with a comma. NOTE: the $imap_qresync setting for QRESYNC is not enabled by default.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-32055", "url": "https://www.suse.com/security/cve/CVE-2021-32055" }, { "category": "external", "summary": "SUSE Bug 1185705 for CVE-2021-32055", "url": "https://bugzilla.suse.com/1185705" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x", "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-32055" } ] }
suse-su-2019:1196-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for mutt", "title": "Title of the patch" }, { "category": "description", "text": "This update for mutt fixes the following issues:\n\nSecurity issues fixed:\n\n- bsc#1101428: Mutt 1.10.1 security release update.\n- CVE-2018-14351: Fix imap/command.c that mishandles long IMAP status mailbox literal count size (bsc#1101583).\n- CVE-2018-14353: Fix imap_quote_string in imap/util.c that has an integer underflow (bsc#1101581).\n- CVE-2018-14362: Fix pop.c that does not forbid characters that may have unsafe interaction with message-cache pathnames (bsc#1101567).\n- CVE-2018-14354: Fix arbitrary command execution from remote IMAP servers via backquote characters (bsc#1101578).\n- CVE-2018-14352: Fix imap_quote_string in imap/util.c that does not leave room for quote characters (bsc#1101582).\n- CVE-2018-14356: Fix pop.c that mishandles a zero-length UID (bsc#1101576).\n- CVE-2018-14355: Fix imap/util.c that mishandles \u0027..\u0027 directory traversal in a mailbox name (bsc#1101577).\n- CVE-2018-14349: Fix imap/command.c that mishandles a NO response without a message (bsc#1101589).\n- CVE-2018-14350: Fix imap/message.c that has a stack-based buffer overflow for a FETCH response with along INTERNALDATE field (bsc#1101588).\n- CVE-2018-14363: Fix newsrc.c that does not properlyrestrict \u0027/\u0027 characters that may have unsafe interaction with cache pathnames (bsc#1101566).\n- CVE-2018-14359: Fix buffer overflow via base64 data (bsc#1101570).\n- CVE-2018-14358: Fix imap/message.c that has a stack-based buffer overflow for a FETCH response with along RFC822.SIZE field (bsc#1101571).\n- CVE-2018-14360: Fix nntp_add_group in newsrc.c that has a stack-based buffer overflow because of incorrect sscanf usage (bsc#1101569).\n- CVE-2018-14357: Fix that remote IMAP servers are allowed to execute arbitrary commands via backquote characters (bsc#1101573).\n- CVE-2018-14361: Fix that nntp.c proceeds even if memory allocation fails for messages data (bsc#1101568).\n\nBug fixes:\n\n- mutt reports as neomutt and incorrect version (bsc#1094717)\n- No sidebar available in mutt 1.6.1 from Tumbleweed snapshot 20160517 (bsc#980830)\n- mutt-1.6.1 unusable when built with --enable-sidebar (bsc#982129)\n- (neo)mutt displaying times in Zulu time (bsc#1061343)\n- mutt unconditionally segfaults when displaying a message (bsc#986534)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2019-1196,SUSE-SLE-DESKTOP-12-SP3-2019-1196,SUSE-SLE-SERVER-12-SP3-2019-1196", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_1196-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:1196-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191196-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:1196-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-May/005432.html" }, { "category": "self", "summary": "SUSE Bug 1061343", "url": "https://bugzilla.suse.com/1061343" }, { "category": "self", "summary": "SUSE Bug 1094717", "url": "https://bugzilla.suse.com/1094717" }, { "category": "self", "summary": "SUSE Bug 1101428", "url": "https://bugzilla.suse.com/1101428" }, { "category": "self", "summary": "SUSE Bug 1101566", "url": "https://bugzilla.suse.com/1101566" }, { "category": "self", "summary": "SUSE Bug 1101567", "url": "https://bugzilla.suse.com/1101567" }, { "category": "self", "summary": "SUSE Bug 1101568", "url": "https://bugzilla.suse.com/1101568" }, { "category": "self", "summary": "SUSE Bug 1101569", "url": "https://bugzilla.suse.com/1101569" }, { "category": "self", "summary": "SUSE Bug 1101570", "url": "https://bugzilla.suse.com/1101570" }, { "category": "self", "summary": "SUSE Bug 1101571", "url": "https://bugzilla.suse.com/1101571" }, { "category": "self", "summary": "SUSE Bug 1101573", "url": "https://bugzilla.suse.com/1101573" }, { "category": "self", "summary": "SUSE Bug 1101576", "url": "https://bugzilla.suse.com/1101576" }, { "category": "self", "summary": "SUSE Bug 1101577", "url": "https://bugzilla.suse.com/1101577" }, { "category": "self", "summary": "SUSE Bug 1101578", "url": "https://bugzilla.suse.com/1101578" }, { "category": "self", "summary": "SUSE Bug 1101581", "url": "https://bugzilla.suse.com/1101581" }, { "category": "self", "summary": "SUSE Bug 1101582", "url": "https://bugzilla.suse.com/1101582" }, { "category": "self", "summary": "SUSE Bug 1101583", "url": "https://bugzilla.suse.com/1101583" }, { "category": "self", "summary": "SUSE Bug 1101588", "url": "https://bugzilla.suse.com/1101588" }, { "category": "self", "summary": "SUSE Bug 1101589", "url": "https://bugzilla.suse.com/1101589" }, { "category": "self", "summary": "SUSE Bug 980830", "url": "https://bugzilla.suse.com/980830" }, { "category": "self", "summary": "SUSE Bug 982129", "url": "https://bugzilla.suse.com/982129" }, { "category": "self", "summary": "SUSE Bug 986534", "url": "https://bugzilla.suse.com/986534" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9116 page", "url": "https://www.suse.com/security/cve/CVE-2014-9116/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14349 page", "url": "https://www.suse.com/security/cve/CVE-2018-14349/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14350 page", "url": "https://www.suse.com/security/cve/CVE-2018-14350/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14351 page", "url": "https://www.suse.com/security/cve/CVE-2018-14351/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14352 page", "url": "https://www.suse.com/security/cve/CVE-2018-14352/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14353 page", "url": "https://www.suse.com/security/cve/CVE-2018-14353/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14354 page", "url": "https://www.suse.com/security/cve/CVE-2018-14354/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14355 page", "url": "https://www.suse.com/security/cve/CVE-2018-14355/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14356 page", "url": "https://www.suse.com/security/cve/CVE-2018-14356/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14357 page", "url": "https://www.suse.com/security/cve/CVE-2018-14357/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14358 page", "url": "https://www.suse.com/security/cve/CVE-2018-14358/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14359 page", "url": "https://www.suse.com/security/cve/CVE-2018-14359/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14360 page", "url": "https://www.suse.com/security/cve/CVE-2018-14360/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14361 page", "url": "https://www.suse.com/security/cve/CVE-2018-14361/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14362 page", "url": "https://www.suse.com/security/cve/CVE-2018-14362/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14363 page", "url": "https://www.suse.com/security/cve/CVE-2018-14363/" } ], "title": "Security update for mutt", "tracking": { "current_release_date": "2019-05-09T06:14:33Z", "generator": { "date": "2019-05-09T06:14:33Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:1196-1", "initial_release_date": "2019-05-09T06:14:33Z", "revision_history": [ { "date": "2019-05-09T06:14:33Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "mutt-1.10.1-55.6.1.aarch64", "product": { "name": "mutt-1.10.1-55.6.1.aarch64", "product_id": "mutt-1.10.1-55.6.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "mutt-1.10.1-55.6.1.ppc64le", "product": { "name": "mutt-1.10.1-55.6.1.ppc64le", "product_id": "mutt-1.10.1-55.6.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "mutt-1.10.1-55.6.1.s390x", "product": { "name": "mutt-1.10.1-55.6.1.s390x", "product_id": "mutt-1.10.1-55.6.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "mutt-1.10.1-55.6.1.x86_64", "product": { "name": "mutt-1.10.1-55.6.1.x86_64", "product_id": "mutt-1.10.1-55.6.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 12 SP3", "product": { "name": "SUSE Linux Enterprise Desktop 12 SP3", "product_id": "SUSE Linux Enterprise Desktop 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sled:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP3", "product": { "name": "SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "mutt-1.10.1-55.6.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3", "product_id": "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64" }, "product_reference": "mutt-1.10.1-55.6.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-1.10.1-55.6.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64" }, "product_reference": "mutt-1.10.1-55.6.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-1.10.1-55.6.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le" }, "product_reference": "mutt-1.10.1-55.6.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-1.10.1-55.6.1.s390x as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x" }, "product_reference": "mutt-1.10.1-55.6.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-1.10.1-55.6.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64" }, "product_reference": "mutt-1.10.1-55.6.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-1.10.1-55.6.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64" }, "product_reference": "mutt-1.10.1-55.6.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-1.10.1-55.6.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le" }, "product_reference": "mutt-1.10.1-55.6.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-1.10.1-55.6.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x" }, "product_reference": "mutt-1.10.1-55.6.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-1.10.1-55.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64" }, "product_reference": "mutt-1.10.1-55.6.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2014-9116", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9116" } ], "notes": [ { "category": "general", "text": "The write_one_header function in mutt 1.5.23 does not properly handle newline characters at the beginning of a header, which allows remote attackers to cause a denial of service (crash) via a header with an empty body, which triggers a heap-based buffer overflow in the mutt_substrdup function.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9116", "url": "https://www.suse.com/security/cve/CVE-2014-9116" }, { "category": "external", "summary": "SUSE Bug 907453 for CVE-2014-9116", "url": "https://bugzilla.suse.com/907453" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-09T06:14:33Z", "details": "moderate" } ], "title": "CVE-2014-9116" }, { "cve": "CVE-2018-14349", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14349" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/command.c mishandles a NO response without a message.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14349", "url": "https://www.suse.com/security/cve/CVE-2018-14349" }, { "category": "external", "summary": "SUSE Bug 1101428 for CVE-2018-14349", "url": "https://bugzilla.suse.com/1101428" }, { "category": "external", "summary": "SUSE Bug 1101589 for CVE-2018-14349", "url": "https://bugzilla.suse.com/1101589" }, { "category": "external", "summary": "SUSE Bug 1101593 for CVE-2018-14349", "url": "https://bugzilla.suse.com/1101593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-09T06:14:33Z", "details": "moderate" } ], "title": "CVE-2018-14349" }, { "cve": "CVE-2018-14350", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14350" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/message.c has a stack-based buffer overflow for a FETCH response with a long INTERNALDATE field.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14350", "url": "https://www.suse.com/security/cve/CVE-2018-14350" }, { "category": "external", "summary": "SUSE Bug 1101428 for CVE-2018-14350", "url": "https://bugzilla.suse.com/1101428" }, { "category": "external", "summary": "SUSE Bug 1101588 for CVE-2018-14350", "url": "https://bugzilla.suse.com/1101588" }, { "category": "external", "summary": "SUSE Bug 1101593 for CVE-2018-14350", "url": "https://bugzilla.suse.com/1101593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-09T06:14:33Z", "details": "moderate" } ], "title": "CVE-2018-14350" }, { "cve": "CVE-2018-14351", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14351" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/command.c mishandles a long IMAP status mailbox literal count size.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14351", "url": "https://www.suse.com/security/cve/CVE-2018-14351" }, { "category": "external", "summary": "SUSE Bug 1101428 for CVE-2018-14351", "url": "https://bugzilla.suse.com/1101428" }, { "category": "external", "summary": "SUSE Bug 1101583 for CVE-2018-14351", "url": "https://bugzilla.suse.com/1101583" }, { "category": "external", "summary": "SUSE Bug 1101593 for CVE-2018-14351", "url": "https://bugzilla.suse.com/1101593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-09T06:14:33Z", "details": "important" } ], "title": "CVE-2018-14351" }, { "cve": "CVE-2018-14352", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14352" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap_quote_string in imap/util.c does not leave room for quote characters, leading to a stack-based buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14352", "url": "https://www.suse.com/security/cve/CVE-2018-14352" }, { "category": "external", "summary": "SUSE Bug 1101428 for CVE-2018-14352", "url": "https://bugzilla.suse.com/1101428" }, { "category": "external", "summary": "SUSE Bug 1101582 for CVE-2018-14352", "url": "https://bugzilla.suse.com/1101582" }, { "category": "external", "summary": "SUSE Bug 1101593 for CVE-2018-14352", "url": "https://bugzilla.suse.com/1101593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-09T06:14:33Z", "details": "moderate" } ], "title": "CVE-2018-14352" }, { "cve": "CVE-2018-14353", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14353" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap_quote_string in imap/util.c has an integer underflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14353", "url": "https://www.suse.com/security/cve/CVE-2018-14353" }, { "category": "external", "summary": "SUSE Bug 1101428 for CVE-2018-14353", "url": "https://bugzilla.suse.com/1101428" }, { "category": "external", "summary": "SUSE Bug 1101581 for CVE-2018-14353", "url": "https://bugzilla.suse.com/1101581" }, { "category": "external", "summary": "SUSE Bug 1101593 for CVE-2018-14353", "url": "https://bugzilla.suse.com/1101593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-09T06:14:33Z", "details": "moderate" } ], "title": "CVE-2018-14353" }, { "cve": "CVE-2018-14354", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14354" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. They allow remote IMAP servers to execute arbitrary commands via backquote characters, related to the mailboxes command associated with a manual subscription or unsubscription.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14354", "url": "https://www.suse.com/security/cve/CVE-2018-14354" }, { "category": "external", "summary": "SUSE Bug 1101428 for CVE-2018-14354", "url": "https://bugzilla.suse.com/1101428" }, { "category": "external", "summary": "SUSE Bug 1101578 for CVE-2018-14354", "url": "https://bugzilla.suse.com/1101578" }, { "category": "external", "summary": "SUSE Bug 1101581 for CVE-2018-14354", "url": "https://bugzilla.suse.com/1101581" }, { "category": "external", "summary": "SUSE Bug 1101589 for CVE-2018-14354", "url": "https://bugzilla.suse.com/1101589" }, { "category": "external", "summary": "SUSE Bug 1101593 for CVE-2018-14354", "url": "https://bugzilla.suse.com/1101593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.6, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-09T06:14:33Z", "details": "critical" } ], "title": "CVE-2018-14354" }, { "cve": "CVE-2018-14355", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14355" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/util.c mishandles \"..\" directory traversal in a mailbox name.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14355", "url": "https://www.suse.com/security/cve/CVE-2018-14355" }, { "category": "external", "summary": "SUSE Bug 1101428 for CVE-2018-14355", "url": "https://bugzilla.suse.com/1101428" }, { "category": "external", "summary": "SUSE Bug 1101577 for CVE-2018-14355", "url": "https://bugzilla.suse.com/1101577" }, { "category": "external", "summary": "SUSE Bug 1101593 for CVE-2018-14355", "url": "https://bugzilla.suse.com/1101593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-09T06:14:33Z", "details": "moderate" } ], "title": "CVE-2018-14355" }, { "cve": "CVE-2018-14356", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14356" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. pop.c mishandles a zero-length UID.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14356", "url": "https://www.suse.com/security/cve/CVE-2018-14356" }, { "category": "external", "summary": "SUSE Bug 1101428 for CVE-2018-14356", "url": "https://bugzilla.suse.com/1101428" }, { "category": "external", "summary": "SUSE Bug 1101576 for CVE-2018-14356", "url": "https://bugzilla.suse.com/1101576" }, { "category": "external", "summary": "SUSE Bug 1101589 for CVE-2018-14356", "url": "https://bugzilla.suse.com/1101589" }, { "category": "external", "summary": "SUSE Bug 1101593 for CVE-2018-14356", "url": "https://bugzilla.suse.com/1101593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-09T06:14:33Z", "details": "moderate" } ], "title": "CVE-2018-14356" }, { "cve": "CVE-2018-14357", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14357" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. They allow remote IMAP servers to execute arbitrary commands via backquote characters, related to the mailboxes command associated with an automatic subscription.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14357", "url": "https://www.suse.com/security/cve/CVE-2018-14357" }, { "category": "external", "summary": "SUSE Bug 1101428 for CVE-2018-14357", "url": "https://bugzilla.suse.com/1101428" }, { "category": "external", "summary": "SUSE Bug 1101573 for CVE-2018-14357", "url": "https://bugzilla.suse.com/1101573" }, { "category": "external", "summary": "SUSE Bug 1101581 for CVE-2018-14357", "url": "https://bugzilla.suse.com/1101581" }, { "category": "external", "summary": "SUSE Bug 1101589 for CVE-2018-14357", "url": "https://bugzilla.suse.com/1101589" }, { "category": "external", "summary": "SUSE Bug 1101593 for CVE-2018-14357", "url": "https://bugzilla.suse.com/1101593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-09T06:14:33Z", "details": "important" } ], "title": "CVE-2018-14357" }, { "cve": "CVE-2018-14358", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14358" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/message.c has a stack-based buffer overflow for a FETCH response with a long RFC822.SIZE field.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14358", "url": "https://www.suse.com/security/cve/CVE-2018-14358" }, { "category": "external", "summary": "SUSE Bug 1101428 for CVE-2018-14358", "url": "https://bugzilla.suse.com/1101428" }, { "category": "external", "summary": "SUSE Bug 1101571 for CVE-2018-14358", "url": "https://bugzilla.suse.com/1101571" }, { "category": "external", "summary": "SUSE Bug 1101593 for CVE-2018-14358", "url": "https://bugzilla.suse.com/1101593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-09T06:14:33Z", "details": "moderate" } ], "title": "CVE-2018-14358" }, { "cve": "CVE-2018-14359", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14359" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. They have a buffer overflow via base64 data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14359", "url": "https://www.suse.com/security/cve/CVE-2018-14359" }, { "category": "external", "summary": "SUSE Bug 1101428 for CVE-2018-14359", "url": "https://bugzilla.suse.com/1101428" }, { "category": "external", "summary": "SUSE Bug 1101570 for CVE-2018-14359", "url": "https://bugzilla.suse.com/1101570" }, { "category": "external", "summary": "SUSE Bug 1101589 for CVE-2018-14359", "url": "https://bugzilla.suse.com/1101589" }, { "category": "external", "summary": "SUSE Bug 1101593 for CVE-2018-14359", "url": "https://bugzilla.suse.com/1101593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-09T06:14:33Z", "details": "moderate" } ], "title": "CVE-2018-14359" }, { "cve": "CVE-2018-14360", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14360" } ], "notes": [ { "category": "general", "text": "An issue was discovered in NeoMutt before 2018-07-16. nntp_add_group in newsrc.c has a stack-based buffer overflow because of incorrect sscanf usage.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14360", "url": "https://www.suse.com/security/cve/CVE-2018-14360" }, { "category": "external", "summary": "SUSE Bug 1101428 for CVE-2018-14360", "url": "https://bugzilla.suse.com/1101428" }, { "category": "external", "summary": "SUSE Bug 1101569 for CVE-2018-14360", "url": "https://bugzilla.suse.com/1101569" }, { "category": "external", "summary": "SUSE Bug 1101593 for CVE-2018-14360", "url": "https://bugzilla.suse.com/1101593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-09T06:14:33Z", "details": "critical" } ], "title": "CVE-2018-14360" }, { "cve": "CVE-2018-14361", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14361" } ], "notes": [ { "category": "general", "text": "An issue was discovered in NeoMutt before 2018-07-16. nntp.c proceeds even if memory allocation fails for messages data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14361", "url": "https://www.suse.com/security/cve/CVE-2018-14361" }, { "category": "external", "summary": "SUSE Bug 1101428 for CVE-2018-14361", "url": "https://bugzilla.suse.com/1101428" }, { "category": "external", "summary": "SUSE Bug 1101568 for CVE-2018-14361", "url": "https://bugzilla.suse.com/1101568" }, { "category": "external", "summary": "SUSE Bug 1101593 for CVE-2018-14361", "url": "https://bugzilla.suse.com/1101593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-09T06:14:33Z", "details": "critical" } ], "title": "CVE-2018-14361" }, { "cve": "CVE-2018-14362", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14362" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. pop.c does not forbid characters that may have unsafe interaction with message-cache pathnames, as demonstrated by a \u0027/\u0027 character.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14362", "url": "https://www.suse.com/security/cve/CVE-2018-14362" }, { "category": "external", "summary": "SUSE Bug 1101428 for CVE-2018-14362", "url": "https://bugzilla.suse.com/1101428" }, { "category": "external", "summary": "SUSE Bug 1101567 for CVE-2018-14362", "url": "https://bugzilla.suse.com/1101567" }, { "category": "external", "summary": "SUSE Bug 1101589 for CVE-2018-14362", "url": "https://bugzilla.suse.com/1101589" }, { "category": "external", "summary": "SUSE Bug 1101593 for CVE-2018-14362", "url": "https://bugzilla.suse.com/1101593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-09T06:14:33Z", "details": "moderate" } ], "title": "CVE-2018-14362" }, { "cve": "CVE-2018-14363", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14363" } ], "notes": [ { "category": "general", "text": "An issue was discovered in NeoMutt before 2018-07-16. newsrc.c does not properly restrict \u0027/\u0027 characters that may have unsafe interaction with cache pathnames.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14363", "url": "https://www.suse.com/security/cve/CVE-2018-14363" }, { "category": "external", "summary": "SUSE Bug 1101428 for CVE-2018-14363", "url": "https://bugzilla.suse.com/1101428" }, { "category": "external", "summary": "SUSE Bug 1101566 for CVE-2018-14363", "url": "https://bugzilla.suse.com/1101566" }, { "category": "external", "summary": "SUSE Bug 1101593 for CVE-2018-14363", "url": "https://bugzilla.suse.com/1101593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-09T06:14:33Z", "details": "important" } ], "title": "CVE-2018-14363" } ] }
suse-su-2018:2084-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for mutt", "title": "Title of the patch" }, { "category": "description", "text": "This update for mutt fixes the following issues:\n\nSecurity issues fixed:\n\n- bsc#1101428: Mutt 1.10.1 security release update.\n- CVE-2018-14351: Fix imap/command.c that mishandles long IMAP status mailbox literal count size (bsc#1101583).\n- CVE-2018-14353: Fix imap_quote_string in imap/util.c that has an integer underflow (bsc#1101581).\n- CVE-2018-14362: Fix pop.c that does not forbid characters that may have unsafe interaction with message-cache pathnames (bsc#1101567).\n- CVE-2018-14354: Fix arbitrary command execution from remote IMAP servers via backquote characters (bsc#1101578).\n- CVE-2018-14352: Fix imap_quote_string in imap/util.c that does not leave room for quote characters (bsc#1101582).\n- CVE-2018-14356: Fix pop.c that mishandles a zero-length UID (bsc#1101576).\n- CVE-2018-14355: Fix imap/util.c that mishandles \u0027..\u0027 directory traversal in a mailbox name (bsc#1101577).\n- CVE-2018-14349: Fix imap/command.c that mishandles a NO response without a message (bsc#1101589).\n- CVE-2018-14350: Fix imap/message.c that has a stack-based buffer overflow for a FETCH response with along INTERNALDATE field (bsc#1101588).\n- CVE-2018-14363: Fix newsrc.c that does not properlyrestrict \u0027/\u0027 characters that may have unsafe interaction with cache pathnames (bsc#1101566).\n- CVE-2018-14359: Fix buffer overflow via base64 data (bsc#1101570).\n- CVE-2018-14358: Fix imap/message.c that has a stack-based buffer overflow for a FETCH response with along RFC822.SIZE field (bsc#1101571).\n- CVE-2018-14360: Fix nntp_add_group in newsrc.c that has a stack-based buffer overflow because of incorrect sscanf usage (bsc#1101569).\n- CVE-2018-14357: Fix that remote IMAP servers are allowed to execute arbitrary commands via backquote characters (bsc#1101573).\n- CVE-2018-14361: Fix that nntp.c proceeds even if memory allocation fails for messages data (bsc#1101568).\n\nBug fixes:\n\n- mutt reports as neomutt and incorrect version (bsc#1094717)\n- No sidebar available in mutt 1.6.1 from Tumbleweed snapshot 20160517 (bsc#980830)\n- mutt-1.6.1 unusable when built with --enable-sidebar (bsc#982129)\n- (neo)mutt displaying times in Zulu time (bsc#1061343)\n- mutt unconditionally segfaults when displaying a message (bsc#986534)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-DESKTOP-12-SP3-2018-1415,SUSE-SLE-SERVER-12-SP3-2018-1415", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2084-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2084-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182084-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2084-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-July/004326.html" }, { "category": "self", "summary": "SUSE Bug 1061343", "url": "https://bugzilla.suse.com/1061343" }, { "category": "self", "summary": "SUSE Bug 1094717", "url": "https://bugzilla.suse.com/1094717" }, { "category": "self", "summary": "SUSE Bug 1101428", "url": "https://bugzilla.suse.com/1101428" }, { "category": "self", "summary": "SUSE Bug 1101566", "url": "https://bugzilla.suse.com/1101566" }, { "category": "self", "summary": "SUSE Bug 1101567", "url": "https://bugzilla.suse.com/1101567" }, { "category": "self", "summary": "SUSE Bug 1101568", "url": "https://bugzilla.suse.com/1101568" }, { "category": "self", "summary": "SUSE Bug 1101569", "url": "https://bugzilla.suse.com/1101569" }, { "category": "self", "summary": "SUSE Bug 1101570", "url": "https://bugzilla.suse.com/1101570" }, { "category": "self", "summary": "SUSE Bug 1101571", "url": "https://bugzilla.suse.com/1101571" }, { "category": "self", "summary": "SUSE Bug 1101573", "url": "https://bugzilla.suse.com/1101573" }, { "category": "self", "summary": "SUSE Bug 1101576", "url": "https://bugzilla.suse.com/1101576" }, { "category": "self", "summary": "SUSE Bug 1101577", "url": "https://bugzilla.suse.com/1101577" }, { "category": "self", "summary": "SUSE Bug 1101578", "url": "https://bugzilla.suse.com/1101578" }, { "category": "self", "summary": "SUSE Bug 1101581", "url": "https://bugzilla.suse.com/1101581" }, { "category": "self", "summary": "SUSE Bug 1101582", "url": "https://bugzilla.suse.com/1101582" }, { "category": "self", "summary": "SUSE Bug 1101583", "url": "https://bugzilla.suse.com/1101583" }, { "category": "self", "summary": "SUSE Bug 1101588", "url": "https://bugzilla.suse.com/1101588" }, { "category": "self", "summary": "SUSE Bug 1101589", "url": "https://bugzilla.suse.com/1101589" }, { "category": "self", "summary": "SUSE Bug 980830", "url": "https://bugzilla.suse.com/980830" }, { "category": "self", "summary": "SUSE Bug 982129", "url": "https://bugzilla.suse.com/982129" }, { "category": "self", "summary": "SUSE Bug 986534", "url": "https://bugzilla.suse.com/986534" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9116 page", "url": "https://www.suse.com/security/cve/CVE-2014-9116/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14349 page", "url": "https://www.suse.com/security/cve/CVE-2018-14349/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14350 page", "url": "https://www.suse.com/security/cve/CVE-2018-14350/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14351 page", "url": "https://www.suse.com/security/cve/CVE-2018-14351/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14352 page", "url": "https://www.suse.com/security/cve/CVE-2018-14352/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14353 page", "url": "https://www.suse.com/security/cve/CVE-2018-14353/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14354 page", "url": "https://www.suse.com/security/cve/CVE-2018-14354/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14355 page", "url": "https://www.suse.com/security/cve/CVE-2018-14355/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14356 page", "url": "https://www.suse.com/security/cve/CVE-2018-14356/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14357 page", "url": "https://www.suse.com/security/cve/CVE-2018-14357/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14358 page", "url": "https://www.suse.com/security/cve/CVE-2018-14358/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14359 page", "url": "https://www.suse.com/security/cve/CVE-2018-14359/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14360 page", "url": "https://www.suse.com/security/cve/CVE-2018-14360/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14361 page", "url": "https://www.suse.com/security/cve/CVE-2018-14361/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14362 page", "url": "https://www.suse.com/security/cve/CVE-2018-14362/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14363 page", "url": "https://www.suse.com/security/cve/CVE-2018-14363/" } ], "title": "Security update for mutt", "tracking": { "current_release_date": "2018-07-27T10:45:47Z", "generator": { "date": "2018-07-27T10:45:47Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2084-1", "initial_release_date": "2018-07-27T10:45:47Z", "revision_history": [ { "date": "2018-07-27T10:45:47Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "mutt-1.10.1-55.3.1.aarch64", "product": { "name": "mutt-1.10.1-55.3.1.aarch64", "product_id": "mutt-1.10.1-55.3.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "mutt-1.10.1-55.3.1.ppc64le", "product": { "name": "mutt-1.10.1-55.3.1.ppc64le", "product_id": "mutt-1.10.1-55.3.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "mutt-1.10.1-55.3.1.s390x", "product": { "name": "mutt-1.10.1-55.3.1.s390x", "product_id": "mutt-1.10.1-55.3.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "mutt-1.10.1-55.3.1.x86_64", "product": { "name": "mutt-1.10.1-55.3.1.x86_64", "product_id": "mutt-1.10.1-55.3.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 12 SP3", "product": { "name": "SUSE Linux Enterprise Desktop 12 SP3", "product_id": "SUSE Linux Enterprise Desktop 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sled:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP3", "product": { "name": "SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "mutt-1.10.1-55.3.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3", "product_id": "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64" }, "product_reference": "mutt-1.10.1-55.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-1.10.1-55.3.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64" }, "product_reference": "mutt-1.10.1-55.3.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-1.10.1-55.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le" }, "product_reference": "mutt-1.10.1-55.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-1.10.1-55.3.1.s390x as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x" }, "product_reference": "mutt-1.10.1-55.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-1.10.1-55.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64" }, "product_reference": "mutt-1.10.1-55.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-1.10.1-55.3.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64" }, "product_reference": "mutt-1.10.1-55.3.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-1.10.1-55.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le" }, "product_reference": "mutt-1.10.1-55.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-1.10.1-55.3.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x" }, "product_reference": "mutt-1.10.1-55.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-1.10.1-55.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64" }, "product_reference": "mutt-1.10.1-55.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2014-9116", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9116" } ], "notes": [ { "category": "general", "text": "The write_one_header function in mutt 1.5.23 does not properly handle newline characters at the beginning of a header, which allows remote attackers to cause a denial of service (crash) via a header with an empty body, which triggers a heap-based buffer overflow in the mutt_substrdup function.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9116", "url": "https://www.suse.com/security/cve/CVE-2014-9116" }, { "category": "external", "summary": "SUSE Bug 907453 for CVE-2014-9116", "url": "https://bugzilla.suse.com/907453" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-07-27T10:45:47Z", "details": "moderate" } ], "title": "CVE-2014-9116" }, { "cve": "CVE-2018-14349", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14349" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/command.c mishandles a NO response without a message.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14349", "url": "https://www.suse.com/security/cve/CVE-2018-14349" }, { "category": "external", "summary": "SUSE Bug 1101428 for CVE-2018-14349", "url": "https://bugzilla.suse.com/1101428" }, { "category": "external", "summary": "SUSE Bug 1101589 for CVE-2018-14349", "url": "https://bugzilla.suse.com/1101589" }, { "category": "external", "summary": "SUSE Bug 1101593 for CVE-2018-14349", "url": "https://bugzilla.suse.com/1101593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-07-27T10:45:47Z", "details": "moderate" } ], "title": "CVE-2018-14349" }, { "cve": "CVE-2018-14350", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14350" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/message.c has a stack-based buffer overflow for a FETCH response with a long INTERNALDATE field.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14350", "url": "https://www.suse.com/security/cve/CVE-2018-14350" }, { "category": "external", "summary": "SUSE Bug 1101428 for CVE-2018-14350", "url": "https://bugzilla.suse.com/1101428" }, { "category": "external", "summary": "SUSE Bug 1101588 for CVE-2018-14350", "url": "https://bugzilla.suse.com/1101588" }, { "category": "external", "summary": "SUSE Bug 1101593 for CVE-2018-14350", "url": "https://bugzilla.suse.com/1101593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-07-27T10:45:47Z", "details": "moderate" } ], "title": "CVE-2018-14350" }, { "cve": "CVE-2018-14351", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14351" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/command.c mishandles a long IMAP status mailbox literal count size.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14351", "url": "https://www.suse.com/security/cve/CVE-2018-14351" }, { "category": "external", "summary": "SUSE Bug 1101428 for CVE-2018-14351", "url": "https://bugzilla.suse.com/1101428" }, { "category": "external", "summary": "SUSE Bug 1101583 for CVE-2018-14351", "url": "https://bugzilla.suse.com/1101583" }, { "category": "external", "summary": "SUSE Bug 1101593 for CVE-2018-14351", "url": "https://bugzilla.suse.com/1101593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-07-27T10:45:47Z", "details": "important" } ], "title": "CVE-2018-14351" }, { "cve": "CVE-2018-14352", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14352" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap_quote_string in imap/util.c does not leave room for quote characters, leading to a stack-based buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14352", "url": "https://www.suse.com/security/cve/CVE-2018-14352" }, { "category": "external", "summary": "SUSE Bug 1101428 for CVE-2018-14352", "url": "https://bugzilla.suse.com/1101428" }, { "category": "external", "summary": "SUSE Bug 1101582 for CVE-2018-14352", "url": "https://bugzilla.suse.com/1101582" }, { "category": "external", "summary": "SUSE Bug 1101593 for CVE-2018-14352", "url": "https://bugzilla.suse.com/1101593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-07-27T10:45:47Z", "details": "moderate" } ], "title": "CVE-2018-14352" }, { "cve": "CVE-2018-14353", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14353" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap_quote_string in imap/util.c has an integer underflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14353", "url": "https://www.suse.com/security/cve/CVE-2018-14353" }, { "category": "external", "summary": "SUSE Bug 1101428 for CVE-2018-14353", "url": "https://bugzilla.suse.com/1101428" }, { "category": "external", "summary": "SUSE Bug 1101581 for CVE-2018-14353", "url": "https://bugzilla.suse.com/1101581" }, { "category": "external", "summary": "SUSE Bug 1101593 for CVE-2018-14353", "url": "https://bugzilla.suse.com/1101593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-07-27T10:45:47Z", "details": "moderate" } ], "title": "CVE-2018-14353" }, { "cve": "CVE-2018-14354", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14354" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. They allow remote IMAP servers to execute arbitrary commands via backquote characters, related to the mailboxes command associated with a manual subscription or unsubscription.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14354", "url": "https://www.suse.com/security/cve/CVE-2018-14354" }, { "category": "external", "summary": "SUSE Bug 1101428 for CVE-2018-14354", "url": "https://bugzilla.suse.com/1101428" }, { "category": "external", "summary": "SUSE Bug 1101578 for CVE-2018-14354", "url": "https://bugzilla.suse.com/1101578" }, { "category": "external", "summary": "SUSE Bug 1101581 for CVE-2018-14354", "url": "https://bugzilla.suse.com/1101581" }, { "category": "external", "summary": "SUSE Bug 1101589 for CVE-2018-14354", "url": "https://bugzilla.suse.com/1101589" }, { "category": "external", "summary": "SUSE Bug 1101593 for CVE-2018-14354", "url": "https://bugzilla.suse.com/1101593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.6, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-07-27T10:45:47Z", "details": "critical" } ], "title": "CVE-2018-14354" }, { "cve": "CVE-2018-14355", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14355" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/util.c mishandles \"..\" directory traversal in a mailbox name.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14355", "url": "https://www.suse.com/security/cve/CVE-2018-14355" }, { "category": "external", "summary": "SUSE Bug 1101428 for CVE-2018-14355", "url": "https://bugzilla.suse.com/1101428" }, { "category": "external", "summary": "SUSE Bug 1101577 for CVE-2018-14355", "url": "https://bugzilla.suse.com/1101577" }, { "category": "external", "summary": "SUSE Bug 1101593 for CVE-2018-14355", "url": "https://bugzilla.suse.com/1101593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-07-27T10:45:47Z", "details": "moderate" } ], "title": "CVE-2018-14355" }, { "cve": "CVE-2018-14356", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14356" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. pop.c mishandles a zero-length UID.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14356", "url": "https://www.suse.com/security/cve/CVE-2018-14356" }, { "category": "external", "summary": "SUSE Bug 1101428 for CVE-2018-14356", "url": "https://bugzilla.suse.com/1101428" }, { "category": "external", "summary": "SUSE Bug 1101576 for CVE-2018-14356", "url": "https://bugzilla.suse.com/1101576" }, { "category": "external", "summary": "SUSE Bug 1101589 for CVE-2018-14356", "url": "https://bugzilla.suse.com/1101589" }, { "category": "external", "summary": "SUSE Bug 1101593 for CVE-2018-14356", "url": "https://bugzilla.suse.com/1101593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-07-27T10:45:47Z", "details": "moderate" } ], "title": "CVE-2018-14356" }, { "cve": "CVE-2018-14357", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14357" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. They allow remote IMAP servers to execute arbitrary commands via backquote characters, related to the mailboxes command associated with an automatic subscription.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14357", "url": "https://www.suse.com/security/cve/CVE-2018-14357" }, { "category": "external", "summary": "SUSE Bug 1101428 for CVE-2018-14357", "url": "https://bugzilla.suse.com/1101428" }, { "category": "external", "summary": "SUSE Bug 1101573 for CVE-2018-14357", "url": "https://bugzilla.suse.com/1101573" }, { "category": "external", "summary": "SUSE Bug 1101581 for CVE-2018-14357", "url": "https://bugzilla.suse.com/1101581" }, { "category": "external", "summary": "SUSE Bug 1101589 for CVE-2018-14357", "url": "https://bugzilla.suse.com/1101589" }, { "category": "external", "summary": "SUSE Bug 1101593 for CVE-2018-14357", "url": "https://bugzilla.suse.com/1101593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-07-27T10:45:47Z", "details": "important" } ], "title": "CVE-2018-14357" }, { "cve": "CVE-2018-14358", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14358" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/message.c has a stack-based buffer overflow for a FETCH response with a long RFC822.SIZE field.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14358", "url": "https://www.suse.com/security/cve/CVE-2018-14358" }, { "category": "external", "summary": "SUSE Bug 1101428 for CVE-2018-14358", "url": "https://bugzilla.suse.com/1101428" }, { "category": "external", "summary": "SUSE Bug 1101571 for CVE-2018-14358", "url": "https://bugzilla.suse.com/1101571" }, { "category": "external", "summary": "SUSE Bug 1101593 for CVE-2018-14358", "url": "https://bugzilla.suse.com/1101593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-07-27T10:45:47Z", "details": "moderate" } ], "title": "CVE-2018-14358" }, { "cve": "CVE-2018-14359", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14359" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. They have a buffer overflow via base64 data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14359", "url": "https://www.suse.com/security/cve/CVE-2018-14359" }, { "category": "external", "summary": "SUSE Bug 1101428 for CVE-2018-14359", "url": "https://bugzilla.suse.com/1101428" }, { "category": "external", "summary": "SUSE Bug 1101570 for CVE-2018-14359", "url": "https://bugzilla.suse.com/1101570" }, { "category": "external", "summary": "SUSE Bug 1101589 for CVE-2018-14359", "url": "https://bugzilla.suse.com/1101589" }, { "category": "external", "summary": "SUSE Bug 1101593 for CVE-2018-14359", "url": "https://bugzilla.suse.com/1101593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-07-27T10:45:47Z", "details": "moderate" } ], "title": "CVE-2018-14359" }, { "cve": "CVE-2018-14360", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14360" } ], "notes": [ { "category": "general", "text": "An issue was discovered in NeoMutt before 2018-07-16. nntp_add_group in newsrc.c has a stack-based buffer overflow because of incorrect sscanf usage.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14360", "url": "https://www.suse.com/security/cve/CVE-2018-14360" }, { "category": "external", "summary": "SUSE Bug 1101428 for CVE-2018-14360", "url": "https://bugzilla.suse.com/1101428" }, { "category": "external", "summary": "SUSE Bug 1101569 for CVE-2018-14360", "url": "https://bugzilla.suse.com/1101569" }, { "category": "external", "summary": "SUSE Bug 1101593 for CVE-2018-14360", "url": "https://bugzilla.suse.com/1101593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-07-27T10:45:47Z", "details": "critical" } ], "title": "CVE-2018-14360" }, { "cve": "CVE-2018-14361", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14361" } ], "notes": [ { "category": "general", "text": "An issue was discovered in NeoMutt before 2018-07-16. nntp.c proceeds even if memory allocation fails for messages data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14361", "url": "https://www.suse.com/security/cve/CVE-2018-14361" }, { "category": "external", "summary": "SUSE Bug 1101428 for CVE-2018-14361", "url": "https://bugzilla.suse.com/1101428" }, { "category": "external", "summary": "SUSE Bug 1101568 for CVE-2018-14361", "url": "https://bugzilla.suse.com/1101568" }, { "category": "external", "summary": "SUSE Bug 1101593 for CVE-2018-14361", "url": "https://bugzilla.suse.com/1101593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-07-27T10:45:47Z", "details": "critical" } ], "title": "CVE-2018-14361" }, { "cve": "CVE-2018-14362", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14362" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. pop.c does not forbid characters that may have unsafe interaction with message-cache pathnames, as demonstrated by a \u0027/\u0027 character.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14362", "url": "https://www.suse.com/security/cve/CVE-2018-14362" }, { "category": "external", "summary": "SUSE Bug 1101428 for CVE-2018-14362", "url": "https://bugzilla.suse.com/1101428" }, { "category": "external", "summary": "SUSE Bug 1101567 for CVE-2018-14362", "url": "https://bugzilla.suse.com/1101567" }, { "category": "external", "summary": "SUSE Bug 1101589 for CVE-2018-14362", "url": "https://bugzilla.suse.com/1101589" }, { "category": "external", "summary": "SUSE Bug 1101593 for CVE-2018-14362", "url": "https://bugzilla.suse.com/1101593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-07-27T10:45:47Z", "details": "moderate" } ], "title": "CVE-2018-14362" }, { "cve": "CVE-2018-14363", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14363" } ], "notes": [ { "category": "general", "text": "An issue was discovered in NeoMutt before 2018-07-16. newsrc.c does not properly restrict \u0027/\u0027 characters that may have unsafe interaction with cache pathnames.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14363", "url": "https://www.suse.com/security/cve/CVE-2018-14363" }, { "category": "external", "summary": "SUSE Bug 1101428 for CVE-2018-14363", "url": "https://bugzilla.suse.com/1101428" }, { "category": "external", "summary": "SUSE Bug 1101566 for CVE-2018-14363", "url": "https://bugzilla.suse.com/1101566" }, { "category": "external", "summary": "SUSE Bug 1101593 for CVE-2018-14363", "url": "https://bugzilla.suse.com/1101593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:mutt-1.10.1-55.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:mutt-1.10.1-55.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-07-27T10:45:47Z", "details": "important" } ], "title": "CVE-2018-14363" } ] }
suse-su-2018:2403-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for mutt", "title": "Title of the patch" }, { "category": "description", "text": "This update for mutt fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2018-14352: Fix imap_quote_string in imap/util.c that does not leave room for quote characters (bsc#1101582).\n- CVE-2018-14353: Fix imap_quote_string in imap/util.c that has an integer underflow (bsc#1101581).\n- CVE-2018-14362: Fix pop.c that does not forbid characters that may have unsafe interaction with message-cache pathnames (bsc#1101567).\n- CVE-2018-14354: Fix arbitrary command execution from remote IMAP servers via backquote characters (bsc#1101578).\n- CVE-2018-14356: Fix pop.c that mishandles a zero-length UID (bsc#1101576).\n- CVE-2018-14355: Fix imap/util.c that mishandles \u0027..\u0027 directory traversal in a mailbox name (bsc#1101577).\n- CVE-2018-14349: Fix imap/command.c that mishandles a NO response without a message (bsc#1101589).\n- CVE-2018-14350: Fix imap/message.c that has a stack-based buffer overflow for a FETCH response with along INTERNALDATE field (bsc#1101588).\n- CVE-2018-14357: Fix that remote IMAP servers are allowed to execute arbitrary commands via backquote characters (bsc#1101573).\n- CVE-2018-14359: Fix buffer overflow via base64 data (bsc#1101570).\n- CVE-2018-14358: Fix imap/message.c that has a stack-based buffer overflow for a FETCH response with along RFC822.SIZE field (bsc#1101571).\n\n\nBug fixes:\n\n- bsc#936807: On entering a 70 character subject line in mutt, a tab is added to the text after 67 characters.\n", "title": "Description of the patch" }, { "category": "details", "text": "sleposp3-mutt-13736,slessp3-mutt-13736,slessp4-mutt-13736", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2403-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2403-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182403-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2403-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-August/004462.html" }, { "category": "self", "summary": "SUSE Bug 1101567", "url": "https://bugzilla.suse.com/1101567" }, { "category": "self", "summary": "SUSE Bug 1101570", "url": "https://bugzilla.suse.com/1101570" }, { "category": "self", "summary": "SUSE Bug 1101571", "url": "https://bugzilla.suse.com/1101571" }, { "category": "self", "summary": "SUSE Bug 1101573", "url": "https://bugzilla.suse.com/1101573" }, { "category": "self", "summary": "SUSE Bug 1101576", "url": "https://bugzilla.suse.com/1101576" }, { "category": "self", "summary": "SUSE Bug 1101577", "url": "https://bugzilla.suse.com/1101577" }, { "category": "self", "summary": "SUSE Bug 1101578", "url": "https://bugzilla.suse.com/1101578" }, { "category": "self", "summary": "SUSE Bug 1101581", "url": "https://bugzilla.suse.com/1101581" }, { "category": "self", "summary": "SUSE Bug 1101582", "url": "https://bugzilla.suse.com/1101582" }, { "category": "self", "summary": "SUSE Bug 1101588", "url": "https://bugzilla.suse.com/1101588" }, { "category": "self", "summary": "SUSE Bug 1101589", "url": "https://bugzilla.suse.com/1101589" }, { "category": "self", "summary": "SUSE Bug 936807", "url": "https://bugzilla.suse.com/936807" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14349 page", "url": "https://www.suse.com/security/cve/CVE-2018-14349/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14350 page", "url": "https://www.suse.com/security/cve/CVE-2018-14350/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14352 page", "url": "https://www.suse.com/security/cve/CVE-2018-14352/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14353 page", "url": "https://www.suse.com/security/cve/CVE-2018-14353/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14354 page", "url": "https://www.suse.com/security/cve/CVE-2018-14354/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14355 page", "url": "https://www.suse.com/security/cve/CVE-2018-14355/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14356 page", "url": "https://www.suse.com/security/cve/CVE-2018-14356/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14357 page", "url": "https://www.suse.com/security/cve/CVE-2018-14357/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14358 page", "url": "https://www.suse.com/security/cve/CVE-2018-14358/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14359 page", "url": "https://www.suse.com/security/cve/CVE-2018-14359/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14362 page", "url": "https://www.suse.com/security/cve/CVE-2018-14362/" } ], "title": "Security update for mutt", "tracking": { "current_release_date": "2018-08-17T06:54:36Z", "generator": { "date": "2018-08-17T06:54:36Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2403-1", "initial_release_date": "2018-08-17T06:54:36Z", "revision_history": [ { "date": "2018-08-17T06:54:36Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "mutt-1.5.17-42.43.1.i586", "product": { "name": "mutt-1.5.17-42.43.1.i586", "product_id": "mutt-1.5.17-42.43.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "mutt-1.5.17-42.43.1.ia64", "product": { "name": "mutt-1.5.17-42.43.1.ia64", "product_id": "mutt-1.5.17-42.43.1.ia64" } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "mutt-1.5.17-42.43.1.ppc64", "product": { "name": "mutt-1.5.17-42.43.1.ppc64", "product_id": "mutt-1.5.17-42.43.1.ppc64" } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "mutt-1.5.17-42.43.1.s390x", "product": { "name": "mutt-1.5.17-42.43.1.s390x", "product_id": "mutt-1.5.17-42.43.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "mutt-1.5.17-42.43.1.x86_64", "product": { "name": "mutt-1.5.17-42.43.1.x86_64", "product_id": "mutt-1.5.17-42.43.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Point of Sale 11 SP3", "product": { "name": "SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-pos:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles_ltss:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product": { "name": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:11:sp3:teradata" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP4", "product": { "name": "SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles:11:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:11:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "mutt-1.5.17-42.43.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:mutt-1.5.17-42.43.1.i586" }, "product_reference": "mutt-1.5.17-42.43.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-1.5.17-42.43.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.i586" }, "product_reference": "mutt-1.5.17-42.43.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-1.5.17-42.43.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.s390x" }, "product_reference": "mutt-1.5.17-42.43.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-1.5.17-42.43.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.x86_64" }, "product_reference": "mutt-1.5.17-42.43.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-1.5.17-42.43.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.i586" }, "product_reference": "mutt-1.5.17-42.43.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-1.5.17-42.43.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.s390x" }, "product_reference": "mutt-1.5.17-42.43.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-1.5.17-42.43.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.x86_64" }, "product_reference": "mutt-1.5.17-42.43.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-1.5.17-42.43.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.i586" }, "product_reference": "mutt-1.5.17-42.43.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-1.5.17-42.43.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ia64" }, "product_reference": "mutt-1.5.17-42.43.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-1.5.17-42.43.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ppc64" }, "product_reference": "mutt-1.5.17-42.43.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-1.5.17-42.43.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.s390x" }, "product_reference": "mutt-1.5.17-42.43.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-1.5.17-42.43.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.x86_64" }, "product_reference": "mutt-1.5.17-42.43.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-1.5.17-42.43.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.i586" }, "product_reference": "mutt-1.5.17-42.43.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-1.5.17-42.43.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ia64" }, "product_reference": "mutt-1.5.17-42.43.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-1.5.17-42.43.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ppc64" }, "product_reference": "mutt-1.5.17-42.43.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-1.5.17-42.43.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.s390x" }, "product_reference": "mutt-1.5.17-42.43.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-1.5.17-42.43.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.x86_64" }, "product_reference": "mutt-1.5.17-42.43.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-14349", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14349" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/command.c mishandles a NO response without a message.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14349", "url": "https://www.suse.com/security/cve/CVE-2018-14349" }, { "category": "external", "summary": "SUSE Bug 1101428 for CVE-2018-14349", "url": "https://bugzilla.suse.com/1101428" }, { "category": "external", "summary": "SUSE Bug 1101589 for CVE-2018-14349", "url": "https://bugzilla.suse.com/1101589" }, { "category": "external", "summary": "SUSE Bug 1101593 for CVE-2018-14349", "url": "https://bugzilla.suse.com/1101593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-17T06:54:36Z", "details": "moderate" } ], "title": "CVE-2018-14349" }, { "cve": "CVE-2018-14350", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14350" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/message.c has a stack-based buffer overflow for a FETCH response with a long INTERNALDATE field.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14350", "url": "https://www.suse.com/security/cve/CVE-2018-14350" }, { "category": "external", "summary": "SUSE Bug 1101428 for CVE-2018-14350", "url": "https://bugzilla.suse.com/1101428" }, { "category": "external", "summary": "SUSE Bug 1101588 for CVE-2018-14350", "url": "https://bugzilla.suse.com/1101588" }, { "category": "external", "summary": "SUSE Bug 1101593 for CVE-2018-14350", "url": "https://bugzilla.suse.com/1101593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-17T06:54:36Z", "details": "moderate" } ], "title": "CVE-2018-14350" }, { "cve": "CVE-2018-14352", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14352" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap_quote_string in imap/util.c does not leave room for quote characters, leading to a stack-based buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14352", "url": "https://www.suse.com/security/cve/CVE-2018-14352" }, { "category": "external", "summary": "SUSE Bug 1101428 for CVE-2018-14352", "url": "https://bugzilla.suse.com/1101428" }, { "category": "external", "summary": "SUSE Bug 1101582 for CVE-2018-14352", "url": "https://bugzilla.suse.com/1101582" }, { "category": "external", "summary": "SUSE Bug 1101593 for CVE-2018-14352", "url": "https://bugzilla.suse.com/1101593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-17T06:54:36Z", "details": "moderate" } ], "title": "CVE-2018-14352" }, { "cve": "CVE-2018-14353", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14353" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap_quote_string in imap/util.c has an integer underflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14353", "url": "https://www.suse.com/security/cve/CVE-2018-14353" }, { "category": "external", "summary": "SUSE Bug 1101428 for CVE-2018-14353", "url": "https://bugzilla.suse.com/1101428" }, { "category": "external", "summary": "SUSE Bug 1101581 for CVE-2018-14353", "url": "https://bugzilla.suse.com/1101581" }, { "category": "external", "summary": "SUSE Bug 1101593 for CVE-2018-14353", "url": "https://bugzilla.suse.com/1101593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-17T06:54:36Z", "details": "moderate" } ], "title": "CVE-2018-14353" }, { "cve": "CVE-2018-14354", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14354" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. They allow remote IMAP servers to execute arbitrary commands via backquote characters, related to the mailboxes command associated with a manual subscription or unsubscription.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14354", "url": "https://www.suse.com/security/cve/CVE-2018-14354" }, { "category": "external", "summary": "SUSE Bug 1101428 for CVE-2018-14354", "url": "https://bugzilla.suse.com/1101428" }, { "category": "external", "summary": "SUSE Bug 1101578 for CVE-2018-14354", "url": "https://bugzilla.suse.com/1101578" }, { "category": "external", "summary": "SUSE Bug 1101581 for CVE-2018-14354", "url": "https://bugzilla.suse.com/1101581" }, { "category": "external", "summary": "SUSE Bug 1101589 for CVE-2018-14354", "url": "https://bugzilla.suse.com/1101589" }, { "category": "external", "summary": "SUSE Bug 1101593 for CVE-2018-14354", "url": "https://bugzilla.suse.com/1101593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.6, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-17T06:54:36Z", "details": "critical" } ], "title": "CVE-2018-14354" }, { "cve": "CVE-2018-14355", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14355" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/util.c mishandles \"..\" directory traversal in a mailbox name.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14355", "url": "https://www.suse.com/security/cve/CVE-2018-14355" }, { "category": "external", "summary": "SUSE Bug 1101428 for CVE-2018-14355", "url": "https://bugzilla.suse.com/1101428" }, { "category": "external", "summary": "SUSE Bug 1101577 for CVE-2018-14355", "url": "https://bugzilla.suse.com/1101577" }, { "category": "external", "summary": "SUSE Bug 1101593 for CVE-2018-14355", "url": "https://bugzilla.suse.com/1101593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-17T06:54:36Z", "details": "moderate" } ], "title": "CVE-2018-14355" }, { "cve": "CVE-2018-14356", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14356" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. pop.c mishandles a zero-length UID.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14356", "url": "https://www.suse.com/security/cve/CVE-2018-14356" }, { "category": "external", "summary": "SUSE Bug 1101428 for CVE-2018-14356", "url": "https://bugzilla.suse.com/1101428" }, { "category": "external", "summary": "SUSE Bug 1101576 for CVE-2018-14356", "url": "https://bugzilla.suse.com/1101576" }, { "category": "external", "summary": "SUSE Bug 1101589 for CVE-2018-14356", "url": "https://bugzilla.suse.com/1101589" }, { "category": "external", "summary": "SUSE Bug 1101593 for CVE-2018-14356", "url": "https://bugzilla.suse.com/1101593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-17T06:54:36Z", "details": "moderate" } ], "title": "CVE-2018-14356" }, { "cve": "CVE-2018-14357", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14357" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. They allow remote IMAP servers to execute arbitrary commands via backquote characters, related to the mailboxes command associated with an automatic subscription.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14357", "url": "https://www.suse.com/security/cve/CVE-2018-14357" }, { "category": "external", "summary": "SUSE Bug 1101428 for CVE-2018-14357", "url": "https://bugzilla.suse.com/1101428" }, { "category": "external", "summary": "SUSE Bug 1101573 for CVE-2018-14357", "url": "https://bugzilla.suse.com/1101573" }, { "category": "external", "summary": "SUSE Bug 1101581 for CVE-2018-14357", "url": "https://bugzilla.suse.com/1101581" }, { "category": "external", "summary": "SUSE Bug 1101589 for CVE-2018-14357", "url": "https://bugzilla.suse.com/1101589" }, { "category": "external", "summary": "SUSE Bug 1101593 for CVE-2018-14357", "url": "https://bugzilla.suse.com/1101593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-17T06:54:36Z", "details": "important" } ], "title": "CVE-2018-14357" }, { "cve": "CVE-2018-14358", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14358" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/message.c has a stack-based buffer overflow for a FETCH response with a long RFC822.SIZE field.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14358", "url": "https://www.suse.com/security/cve/CVE-2018-14358" }, { "category": "external", "summary": "SUSE Bug 1101428 for CVE-2018-14358", "url": "https://bugzilla.suse.com/1101428" }, { "category": "external", "summary": "SUSE Bug 1101571 for CVE-2018-14358", "url": "https://bugzilla.suse.com/1101571" }, { "category": "external", "summary": "SUSE Bug 1101593 for CVE-2018-14358", "url": "https://bugzilla.suse.com/1101593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-17T06:54:36Z", "details": "moderate" } ], "title": "CVE-2018-14358" }, { "cve": "CVE-2018-14359", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14359" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. They have a buffer overflow via base64 data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14359", "url": "https://www.suse.com/security/cve/CVE-2018-14359" }, { "category": "external", "summary": "SUSE Bug 1101428 for CVE-2018-14359", "url": "https://bugzilla.suse.com/1101428" }, { "category": "external", "summary": "SUSE Bug 1101570 for CVE-2018-14359", "url": "https://bugzilla.suse.com/1101570" }, { "category": "external", "summary": "SUSE Bug 1101589 for CVE-2018-14359", "url": "https://bugzilla.suse.com/1101589" }, { "category": "external", "summary": "SUSE Bug 1101593 for CVE-2018-14359", "url": "https://bugzilla.suse.com/1101593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-17T06:54:36Z", "details": "moderate" } ], "title": "CVE-2018-14359" }, { "cve": "CVE-2018-14362", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14362" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. pop.c does not forbid characters that may have unsafe interaction with message-cache pathnames, as demonstrated by a \u0027/\u0027 character.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14362", "url": "https://www.suse.com/security/cve/CVE-2018-14362" }, { "category": "external", "summary": "SUSE Bug 1101428 for CVE-2018-14362", "url": "https://bugzilla.suse.com/1101428" }, { "category": "external", "summary": "SUSE Bug 1101567 for CVE-2018-14362", "url": "https://bugzilla.suse.com/1101567" }, { "category": "external", "summary": "SUSE Bug 1101589 for CVE-2018-14362", "url": "https://bugzilla.suse.com/1101589" }, { "category": "external", "summary": "SUSE Bug 1101593 for CVE-2018-14362", "url": "https://bugzilla.suse.com/1101593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server 11 SP4:mutt-1.5.17-42.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:mutt-1.5.17-42.43.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-17T06:54:36Z", "details": "moderate" } ], "title": "CVE-2018-14362" } ] }
suse-su-2018:2085-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for mutt", "title": "Title of the patch" }, { "category": "description", "text": "This update for mutt fixes the following issues:\n\nSecurity issues fixed:\n\n- bsc#1101428: Mutt 1.10.1 security release update.\n- CVE-2018-14351: Fix imap/command.c that mishandles long IMAP status mailbox literal count size (bsc#1101583).\n- CVE-2018-14353: Fix imap_quote_string in imap/util.c that has an integer underflow (bsc#1101581).\n- CVE-2018-14362: Fix pop.c that does not forbid characters that may have unsafe interaction with message-cache pathnames (bsc#1101567).\n- CVE-2018-14354: Fix arbitrary command execution from remote IMAP servers via backquote characters (bsc#1101578).\n- CVE-2018-14352: Fix imap_quote_string in imap/util.c that does not leave room for quote characters (bsc#1101582).\n- CVE-2018-14356: Fix pop.c that mishandles a zero-length UID (bsc#1101576).\n- CVE-2018-14355: Fix imap/util.c that mishandles \u0027..\u0027 directory traversal in a mailbox name (bsc#1101577).\n- CVE-2018-14349: Fix imap/command.c that mishandles a NO response without a message (bsc#1101589).\n- CVE-2018-14350: Fix imap/message.c that has a stack-based buffer overflow for a FETCH response with along INTERNALDATE field (bsc#1101588).\n- CVE-2018-14363: Fix newsrc.c that does not properlyrestrict \u0027/\u0027 characters that may have unsafe interaction with cache pathnames (bsc#1101566).\n- CVE-2018-14359: Fix buffer overflow via base64 data (bsc#1101570).\n- CVE-2018-14358: Fix imap/message.c that has a stack-based buffer overflow for a FETCH response with along RFC822.SIZE field (bsc#1101571).\n- CVE-2018-14360: Fix nntp_add_group in newsrc.c that has a stack-based buffer overflow because of incorrect sscanf usage (bsc#1101569).\n- CVE-2018-14357: Fix that remote IMAP servers are allowed to execute arbitrary commands via backquote characters (bsc#1101573).\n- CVE-2018-14361: Fix that nntp.c proceeds even if memory allocation fails for messages data (bsc#1101568).\n\nBug fixes:\n\n- mutt reports as neomutt and incorrect version (bsc#1094717)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Module-Basesystem-15-2018-1416", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2085-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2085-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182085-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2085-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-July/004327.html" }, { "category": "self", "summary": "SUSE Bug 1094717", "url": "https://bugzilla.suse.com/1094717" }, { "category": "self", "summary": "SUSE Bug 1101428", "url": "https://bugzilla.suse.com/1101428" }, { "category": "self", "summary": "SUSE Bug 1101566", "url": "https://bugzilla.suse.com/1101566" }, { "category": "self", "summary": "SUSE Bug 1101567", "url": "https://bugzilla.suse.com/1101567" }, { "category": "self", "summary": "SUSE Bug 1101568", "url": "https://bugzilla.suse.com/1101568" }, { "category": "self", "summary": "SUSE Bug 1101569", "url": "https://bugzilla.suse.com/1101569" }, { "category": "self", "summary": "SUSE Bug 1101570", "url": "https://bugzilla.suse.com/1101570" }, { "category": "self", "summary": "SUSE Bug 1101571", "url": "https://bugzilla.suse.com/1101571" }, { "category": "self", "summary": "SUSE Bug 1101573", "url": "https://bugzilla.suse.com/1101573" }, { "category": "self", "summary": "SUSE Bug 1101576", "url": "https://bugzilla.suse.com/1101576" }, { "category": "self", "summary": "SUSE Bug 1101577", "url": "https://bugzilla.suse.com/1101577" }, { "category": "self", "summary": "SUSE Bug 1101578", "url": "https://bugzilla.suse.com/1101578" }, { "category": "self", "summary": "SUSE Bug 1101581", "url": "https://bugzilla.suse.com/1101581" }, { "category": "self", "summary": "SUSE Bug 1101582", "url": "https://bugzilla.suse.com/1101582" }, { "category": "self", "summary": "SUSE Bug 1101583", "url": "https://bugzilla.suse.com/1101583" }, { "category": "self", "summary": "SUSE Bug 1101588", "url": "https://bugzilla.suse.com/1101588" }, { "category": "self", "summary": "SUSE Bug 1101589", "url": "https://bugzilla.suse.com/1101589" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9116 page", "url": "https://www.suse.com/security/cve/CVE-2014-9116/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14349 page", "url": "https://www.suse.com/security/cve/CVE-2018-14349/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14350 page", "url": "https://www.suse.com/security/cve/CVE-2018-14350/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14351 page", "url": "https://www.suse.com/security/cve/CVE-2018-14351/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14352 page", "url": "https://www.suse.com/security/cve/CVE-2018-14352/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14353 page", "url": "https://www.suse.com/security/cve/CVE-2018-14353/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14354 page", "url": "https://www.suse.com/security/cve/CVE-2018-14354/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14355 page", "url": "https://www.suse.com/security/cve/CVE-2018-14355/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14356 page", "url": "https://www.suse.com/security/cve/CVE-2018-14356/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14357 page", "url": "https://www.suse.com/security/cve/CVE-2018-14357/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14358 page", "url": "https://www.suse.com/security/cve/CVE-2018-14358/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14359 page", "url": "https://www.suse.com/security/cve/CVE-2018-14359/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14360 page", "url": "https://www.suse.com/security/cve/CVE-2018-14360/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14361 page", "url": "https://www.suse.com/security/cve/CVE-2018-14361/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14362 page", "url": "https://www.suse.com/security/cve/CVE-2018-14362/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14363 page", "url": "https://www.suse.com/security/cve/CVE-2018-14363/" } ], "title": "Security update for mutt", "tracking": { "current_release_date": "2018-07-27T10:47:58Z", "generator": { "date": "2018-07-27T10:47:58Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2085-1", "initial_release_date": "2018-07-27T10:47:58Z", "revision_history": [ { "date": "2018-07-27T10:47:58Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "mutt-1.10.1-3.3.4.aarch64", "product": { "name": "mutt-1.10.1-3.3.4.aarch64", "product_id": "mutt-1.10.1-3.3.4.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "mutt-doc-1.10.1-3.3.4.noarch", "product": { "name": "mutt-doc-1.10.1-3.3.4.noarch", "product_id": "mutt-doc-1.10.1-3.3.4.noarch" } }, { "category": "product_version", "name": "mutt-lang-1.10.1-3.3.4.noarch", "product": { "name": "mutt-lang-1.10.1-3.3.4.noarch", "product_id": "mutt-lang-1.10.1-3.3.4.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "mutt-1.10.1-3.3.4.ppc64le", "product": { "name": "mutt-1.10.1-3.3.4.ppc64le", "product_id": "mutt-1.10.1-3.3.4.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "mutt-1.10.1-3.3.4.s390x", "product": { "name": "mutt-1.10.1-3.3.4.s390x", "product_id": "mutt-1.10.1-3.3.4.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "mutt-1.10.1-3.3.4.x86_64", "product": { "name": "mutt-1.10.1-3.3.4.x86_64", "product_id": "mutt-1.10.1-3.3.4.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Basesystem 15", "product": { "name": "SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-basesystem:15" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "mutt-1.10.1-3.3.4.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64" }, "product_reference": "mutt-1.10.1-3.3.4.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-1.10.1-3.3.4.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le" }, "product_reference": "mutt-1.10.1-3.3.4.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-1.10.1-3.3.4.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x" }, "product_reference": "mutt-1.10.1-3.3.4.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-1.10.1-3.3.4.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64" }, "product_reference": "mutt-1.10.1-3.3.4.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-doc-1.10.1-3.3.4.noarch as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch" }, "product_reference": "mutt-doc-1.10.1-3.3.4.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-lang-1.10.1-3.3.4.noarch as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch" }, "product_reference": "mutt-lang-1.10.1-3.3.4.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" } ] }, "vulnerabilities": [ { "cve": "CVE-2014-9116", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9116" } ], "notes": [ { "category": "general", "text": "The write_one_header function in mutt 1.5.23 does not properly handle newline characters at the beginning of a header, which allows remote attackers to cause a denial of service (crash) via a header with an empty body, which triggers a heap-based buffer overflow in the mutt_substrdup function.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9116", "url": "https://www.suse.com/security/cve/CVE-2014-9116" }, { "category": "external", "summary": "SUSE Bug 907453 for CVE-2014-9116", "url": "https://bugzilla.suse.com/907453" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-07-27T10:47:58Z", "details": "moderate" } ], "title": "CVE-2014-9116" }, { "cve": "CVE-2018-14349", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14349" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/command.c mishandles a NO response without a message.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14349", "url": "https://www.suse.com/security/cve/CVE-2018-14349" }, { "category": "external", "summary": "SUSE Bug 1101428 for CVE-2018-14349", "url": "https://bugzilla.suse.com/1101428" }, { "category": "external", "summary": "SUSE Bug 1101589 for CVE-2018-14349", "url": "https://bugzilla.suse.com/1101589" }, { "category": "external", "summary": "SUSE Bug 1101593 for CVE-2018-14349", "url": "https://bugzilla.suse.com/1101593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-07-27T10:47:58Z", "details": "moderate" } ], "title": "CVE-2018-14349" }, { "cve": "CVE-2018-14350", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14350" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/message.c has a stack-based buffer overflow for a FETCH response with a long INTERNALDATE field.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14350", "url": "https://www.suse.com/security/cve/CVE-2018-14350" }, { "category": "external", "summary": "SUSE Bug 1101428 for CVE-2018-14350", "url": "https://bugzilla.suse.com/1101428" }, { "category": "external", "summary": "SUSE Bug 1101588 for CVE-2018-14350", "url": "https://bugzilla.suse.com/1101588" }, { "category": "external", "summary": "SUSE Bug 1101593 for CVE-2018-14350", "url": "https://bugzilla.suse.com/1101593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-07-27T10:47:58Z", "details": "moderate" } ], "title": "CVE-2018-14350" }, { "cve": "CVE-2018-14351", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14351" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/command.c mishandles a long IMAP status mailbox literal count size.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14351", "url": "https://www.suse.com/security/cve/CVE-2018-14351" }, { "category": "external", "summary": "SUSE Bug 1101428 for CVE-2018-14351", "url": "https://bugzilla.suse.com/1101428" }, { "category": "external", "summary": "SUSE Bug 1101583 for CVE-2018-14351", "url": "https://bugzilla.suse.com/1101583" }, { "category": "external", "summary": "SUSE Bug 1101593 for CVE-2018-14351", "url": "https://bugzilla.suse.com/1101593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-07-27T10:47:58Z", "details": "important" } ], "title": "CVE-2018-14351" }, { "cve": "CVE-2018-14352", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14352" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap_quote_string in imap/util.c does not leave room for quote characters, leading to a stack-based buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14352", "url": "https://www.suse.com/security/cve/CVE-2018-14352" }, { "category": "external", "summary": "SUSE Bug 1101428 for CVE-2018-14352", "url": "https://bugzilla.suse.com/1101428" }, { "category": "external", "summary": "SUSE Bug 1101582 for CVE-2018-14352", "url": "https://bugzilla.suse.com/1101582" }, { "category": "external", "summary": "SUSE Bug 1101593 for CVE-2018-14352", "url": "https://bugzilla.suse.com/1101593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-07-27T10:47:58Z", "details": "moderate" } ], "title": "CVE-2018-14352" }, { "cve": "CVE-2018-14353", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14353" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap_quote_string in imap/util.c has an integer underflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14353", "url": "https://www.suse.com/security/cve/CVE-2018-14353" }, { "category": "external", "summary": "SUSE Bug 1101428 for CVE-2018-14353", "url": "https://bugzilla.suse.com/1101428" }, { "category": "external", "summary": "SUSE Bug 1101581 for CVE-2018-14353", "url": "https://bugzilla.suse.com/1101581" }, { "category": "external", "summary": "SUSE Bug 1101593 for CVE-2018-14353", "url": "https://bugzilla.suse.com/1101593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-07-27T10:47:58Z", "details": "moderate" } ], "title": "CVE-2018-14353" }, { "cve": "CVE-2018-14354", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14354" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. They allow remote IMAP servers to execute arbitrary commands via backquote characters, related to the mailboxes command associated with a manual subscription or unsubscription.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14354", "url": "https://www.suse.com/security/cve/CVE-2018-14354" }, { "category": "external", "summary": "SUSE Bug 1101428 for CVE-2018-14354", "url": "https://bugzilla.suse.com/1101428" }, { "category": "external", "summary": "SUSE Bug 1101578 for CVE-2018-14354", "url": "https://bugzilla.suse.com/1101578" }, { "category": "external", "summary": "SUSE Bug 1101581 for CVE-2018-14354", "url": "https://bugzilla.suse.com/1101581" }, { "category": "external", "summary": "SUSE Bug 1101589 for CVE-2018-14354", "url": "https://bugzilla.suse.com/1101589" }, { "category": "external", "summary": "SUSE Bug 1101593 for CVE-2018-14354", "url": "https://bugzilla.suse.com/1101593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.6, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-07-27T10:47:58Z", "details": "critical" } ], "title": "CVE-2018-14354" }, { "cve": "CVE-2018-14355", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14355" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/util.c mishandles \"..\" directory traversal in a mailbox name.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14355", "url": "https://www.suse.com/security/cve/CVE-2018-14355" }, { "category": "external", "summary": "SUSE Bug 1101428 for CVE-2018-14355", "url": "https://bugzilla.suse.com/1101428" }, { "category": "external", "summary": "SUSE Bug 1101577 for CVE-2018-14355", "url": "https://bugzilla.suse.com/1101577" }, { "category": "external", "summary": "SUSE Bug 1101593 for CVE-2018-14355", "url": "https://bugzilla.suse.com/1101593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-07-27T10:47:58Z", "details": "moderate" } ], "title": "CVE-2018-14355" }, { "cve": "CVE-2018-14356", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14356" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. pop.c mishandles a zero-length UID.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14356", "url": "https://www.suse.com/security/cve/CVE-2018-14356" }, { "category": "external", "summary": "SUSE Bug 1101428 for CVE-2018-14356", "url": "https://bugzilla.suse.com/1101428" }, { "category": "external", "summary": "SUSE Bug 1101576 for CVE-2018-14356", "url": "https://bugzilla.suse.com/1101576" }, { "category": "external", "summary": "SUSE Bug 1101589 for CVE-2018-14356", "url": "https://bugzilla.suse.com/1101589" }, { "category": "external", "summary": "SUSE Bug 1101593 for CVE-2018-14356", "url": "https://bugzilla.suse.com/1101593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-07-27T10:47:58Z", "details": "moderate" } ], "title": "CVE-2018-14356" }, { "cve": "CVE-2018-14357", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14357" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. They allow remote IMAP servers to execute arbitrary commands via backquote characters, related to the mailboxes command associated with an automatic subscription.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14357", "url": "https://www.suse.com/security/cve/CVE-2018-14357" }, { "category": "external", "summary": "SUSE Bug 1101428 for CVE-2018-14357", "url": "https://bugzilla.suse.com/1101428" }, { "category": "external", "summary": "SUSE Bug 1101573 for CVE-2018-14357", "url": "https://bugzilla.suse.com/1101573" }, { "category": "external", "summary": "SUSE Bug 1101581 for CVE-2018-14357", "url": "https://bugzilla.suse.com/1101581" }, { "category": "external", "summary": "SUSE Bug 1101589 for CVE-2018-14357", "url": "https://bugzilla.suse.com/1101589" }, { "category": "external", "summary": "SUSE Bug 1101593 for CVE-2018-14357", "url": "https://bugzilla.suse.com/1101593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-07-27T10:47:58Z", "details": "important" } ], "title": "CVE-2018-14357" }, { "cve": "CVE-2018-14358", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14358" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/message.c has a stack-based buffer overflow for a FETCH response with a long RFC822.SIZE field.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14358", "url": "https://www.suse.com/security/cve/CVE-2018-14358" }, { "category": "external", "summary": "SUSE Bug 1101428 for CVE-2018-14358", "url": "https://bugzilla.suse.com/1101428" }, { "category": "external", "summary": "SUSE Bug 1101571 for CVE-2018-14358", "url": "https://bugzilla.suse.com/1101571" }, { "category": "external", "summary": "SUSE Bug 1101593 for CVE-2018-14358", "url": "https://bugzilla.suse.com/1101593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-07-27T10:47:58Z", "details": "moderate" } ], "title": "CVE-2018-14358" }, { "cve": "CVE-2018-14359", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14359" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. They have a buffer overflow via base64 data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14359", "url": "https://www.suse.com/security/cve/CVE-2018-14359" }, { "category": "external", "summary": "SUSE Bug 1101428 for CVE-2018-14359", "url": "https://bugzilla.suse.com/1101428" }, { "category": "external", "summary": "SUSE Bug 1101570 for CVE-2018-14359", "url": "https://bugzilla.suse.com/1101570" }, { "category": "external", "summary": "SUSE Bug 1101589 for CVE-2018-14359", "url": "https://bugzilla.suse.com/1101589" }, { "category": "external", "summary": "SUSE Bug 1101593 for CVE-2018-14359", "url": "https://bugzilla.suse.com/1101593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-07-27T10:47:58Z", "details": "moderate" } ], "title": "CVE-2018-14359" }, { "cve": "CVE-2018-14360", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14360" } ], "notes": [ { "category": "general", "text": "An issue was discovered in NeoMutt before 2018-07-16. nntp_add_group in newsrc.c has a stack-based buffer overflow because of incorrect sscanf usage.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14360", "url": "https://www.suse.com/security/cve/CVE-2018-14360" }, { "category": "external", "summary": "SUSE Bug 1101428 for CVE-2018-14360", "url": "https://bugzilla.suse.com/1101428" }, { "category": "external", "summary": "SUSE Bug 1101569 for CVE-2018-14360", "url": "https://bugzilla.suse.com/1101569" }, { "category": "external", "summary": "SUSE Bug 1101593 for CVE-2018-14360", "url": "https://bugzilla.suse.com/1101593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-07-27T10:47:58Z", "details": "critical" } ], "title": "CVE-2018-14360" }, { "cve": "CVE-2018-14361", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14361" } ], "notes": [ { "category": "general", "text": "An issue was discovered in NeoMutt before 2018-07-16. nntp.c proceeds even if memory allocation fails for messages data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14361", "url": "https://www.suse.com/security/cve/CVE-2018-14361" }, { "category": "external", "summary": "SUSE Bug 1101428 for CVE-2018-14361", "url": "https://bugzilla.suse.com/1101428" }, { "category": "external", "summary": "SUSE Bug 1101568 for CVE-2018-14361", "url": "https://bugzilla.suse.com/1101568" }, { "category": "external", "summary": "SUSE Bug 1101593 for CVE-2018-14361", "url": "https://bugzilla.suse.com/1101593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-07-27T10:47:58Z", "details": "critical" } ], "title": "CVE-2018-14361" }, { "cve": "CVE-2018-14362", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14362" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. pop.c does not forbid characters that may have unsafe interaction with message-cache pathnames, as demonstrated by a \u0027/\u0027 character.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14362", "url": "https://www.suse.com/security/cve/CVE-2018-14362" }, { "category": "external", "summary": "SUSE Bug 1101428 for CVE-2018-14362", "url": "https://bugzilla.suse.com/1101428" }, { "category": "external", "summary": "SUSE Bug 1101567 for CVE-2018-14362", "url": "https://bugzilla.suse.com/1101567" }, { "category": "external", "summary": "SUSE Bug 1101589 for CVE-2018-14362", "url": "https://bugzilla.suse.com/1101589" }, { "category": "external", "summary": "SUSE Bug 1101593 for CVE-2018-14362", "url": "https://bugzilla.suse.com/1101593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-07-27T10:47:58Z", "details": "moderate" } ], "title": "CVE-2018-14362" }, { "cve": "CVE-2018-14363", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14363" } ], "notes": [ { "category": "general", "text": "An issue was discovered in NeoMutt before 2018-07-16. newsrc.c does not properly restrict \u0027/\u0027 characters that may have unsafe interaction with cache pathnames.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14363", "url": "https://www.suse.com/security/cve/CVE-2018-14363" }, { "category": "external", "summary": "SUSE Bug 1101428 for CVE-2018-14363", "url": "https://bugzilla.suse.com/1101428" }, { "category": "external", "summary": "SUSE Bug 1101566 for CVE-2018-14363", "url": "https://bugzilla.suse.com/1101566" }, { "category": "external", "summary": "SUSE Bug 1101593 for CVE-2018-14363", "url": "https://bugzilla.suse.com/1101593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:mutt-1.10.1-3.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:mutt-doc-1.10.1-3.3.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15:mutt-lang-1.10.1-3.3.4.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-07-27T10:47:58Z", "details": "important" } ], "title": "CVE-2018-14363" } ] }
wid-sec-w-2025-0102
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Mutt ist ein textbasiertes E-Mail-Programm f\u00fcr Unix und andere Unix-artige Betriebssysteme.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in mutt ausnutzen, um beliebigen Programmcode mit Benutzerrechten auszuf\u00fchren, Angriffe mit nicht n\u00e4her spezifizierten Auswirkungen oder einen Denial of Service Angriff durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2025-0102 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2018/wid-sec-w-2025-0102.json" }, { "category": "self", "summary": "WID-SEC-2025-0102 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-0102" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:2085-1 vom 2018-07-29", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182085-1/" }, { "category": "external", "summary": "SUSE Security Update \tSUSE-SU-2018:2084-1 vom 2018-07-29", "url": "https://www.suse.com/de-de/support/update/announcement/2018/suse-su-20182084-1/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:2403-1 vom 2018-08-18", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182403-1.html" }, { "category": "external", "summary": "Debian Security Advisory DSA-4277 vom 2018-08-18", "url": "https://www.debian.org/security/2018/dsa-4277" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-2526 vom 2018-08-20", "url": "http://linux.oracle.com/errata/ELSA-2018-2526.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:2526 vom 2018-08-20", "url": "http://rhn.redhat.com/errata/RHSA-2018-2526.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2019:1196-1 vom 2019-05-09", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191196-1.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:1126 vom 2020-03-31", "url": "https://access.redhat.com/errata/RHSA-2020:1126" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7204-1 vom 2025-01-15", "url": "https://ubuntu.com/security/notices/USN-7204-1" } ], "source_lang": "en-US", "title": "mutt: Mehrere Schwachstellen", "tracking": { "current_release_date": "2025-01-15T23:00:00.000+00:00", "generator": { "date": "2025-01-16T09:22:25.007+00:00", "engine": { "name": "BSI-WID", "version": "1.3.10" } }, "id": "WID-SEC-W-2025-0102", "initial_release_date": "2018-07-29T22:00:00.000+00:00", "revision_history": [ { "date": "2018-07-29T22:00:00.000+00:00", "number": "1", "summary": "Initial Release" }, { "date": "2018-07-29T22:00:00.000+00:00", "number": "2", "summary": "Version nicht vorhanden" }, { "date": "2018-08-19T22:00:00.000+00:00", "number": "3", "summary": "New remediations available" }, { "date": "2018-08-20T22:00:00.000+00:00", "number": "4", "summary": "New remediations available" }, { "date": "2018-08-20T22:00:00.000+00:00", "number": "5", "summary": "New remediations available" }, { "date": "2018-10-30T23:00:00.000+00:00", "number": "6", "summary": "Added references" }, { "date": "2019-05-09T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2020-03-31T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-01-15T23:00:00.000+00:00", "number": "9", "summary": "Neue Updates von Ubuntu aufgenommen" } ], "status": "final", "version": "9" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c=1.10.1", "product": { "name": "Open Source mutt \u003c=1.10.1", "product_id": "T012560" } }, { "category": "product_version_range", "name": "\u003c=1.10.1", "product": { "name": "Open Source mutt \u003c=1.10.1", "product_id": "T012560-fixed" } } ], "category": "product_name", "name": "mutt" } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-14349", "notes": [ { "category": "description", "text": "In mutt Linux existieren mehrere Schwachstellen. Diese basieren auf Puffer\u00fcberlauf Schw\u00e4chen oder Fehlern bei der Verarbeitung von Eingaben. Ein Angreifer kann dieses zu einem Denial of Service oder \"Directory Traversal\" Angriff oder m\u00f6glicherweise zur Ausf\u00fchrung von Code mit den Privilegien des angegriffenen Benutzers oder Dienstes nutzen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T004914", "T012560" ] }, "release_date": "2018-07-29T22:00:00.000+00:00", "title": "CVE-2018-14349" }, { "cve": "CVE-2018-14350", "notes": [ { "category": "description", "text": "In mutt Linux existieren mehrere Schwachstellen. Diese basieren auf Puffer\u00fcberlauf Schw\u00e4chen oder Fehlern bei der Verarbeitung von Eingaben. Ein Angreifer kann dieses zu einem Denial of Service oder \"Directory Traversal\" Angriff oder m\u00f6glicherweise zur Ausf\u00fchrung von Code mit den Privilegien des angegriffenen Benutzers oder Dienstes nutzen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T004914", "T012560" ] }, "release_date": "2018-07-29T22:00:00.000+00:00", "title": "CVE-2018-14350" }, { "cve": "CVE-2018-14351", "notes": [ { "category": "description", "text": "In mutt Linux existieren mehrere Schwachstellen. Diese basieren auf Puffer\u00fcberlauf Schw\u00e4chen oder Fehlern bei der Verarbeitung von Eingaben. Ein Angreifer kann dieses zu einem Denial of Service oder \"Directory Traversal\" Angriff oder m\u00f6glicherweise zur Ausf\u00fchrung von Code mit den Privilegien des angegriffenen Benutzers oder Dienstes nutzen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T004914", "T012560" ] }, "release_date": "2018-07-29T22:00:00.000+00:00", "title": "CVE-2018-14351" }, { "cve": "CVE-2018-14352", "notes": [ { "category": "description", "text": "In mutt Linux existieren mehrere Schwachstellen. Diese basieren auf Puffer\u00fcberlauf Schw\u00e4chen oder Fehlern bei der Verarbeitung von Eingaben. Ein Angreifer kann dieses zu einem Denial of Service oder \"Directory Traversal\" Angriff oder m\u00f6glicherweise zur Ausf\u00fchrung von Code mit den Privilegien des angegriffenen Benutzers oder Dienstes nutzen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T004914", "T012560" ] }, "release_date": "2018-07-29T22:00:00.000+00:00", "title": "CVE-2018-14352" }, { "cve": "CVE-2018-14353", "notes": [ { "category": "description", "text": "In mutt Linux existieren mehrere Schwachstellen. Diese basieren auf Puffer\u00fcberlauf Schw\u00e4chen oder Fehlern bei der Verarbeitung von Eingaben. Ein Angreifer kann dieses zu einem Denial of Service oder \"Directory Traversal\" Angriff oder m\u00f6glicherweise zur Ausf\u00fchrung von Code mit den Privilegien des angegriffenen Benutzers oder Dienstes nutzen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T004914", "T012560" ] }, "release_date": "2018-07-29T22:00:00.000+00:00", "title": "CVE-2018-14353" }, { "cve": "CVE-2018-14354", "notes": [ { "category": "description", "text": "In mutt Linux existieren mehrere Schwachstellen. Diese basieren auf Puffer\u00fcberlauf Schw\u00e4chen oder Fehlern bei der Verarbeitung von Eingaben. Ein Angreifer kann dieses zu einem Denial of Service oder \"Directory Traversal\" Angriff oder m\u00f6glicherweise zur Ausf\u00fchrung von Code mit den Privilegien des angegriffenen Benutzers oder Dienstes nutzen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T004914", "T012560" ] }, "release_date": "2018-07-29T22:00:00.000+00:00", "title": "CVE-2018-14354" }, { "cve": "CVE-2018-14355", "notes": [ { "category": "description", "text": "In mutt Linux existieren mehrere Schwachstellen. Diese basieren auf Puffer\u00fcberlauf Schw\u00e4chen oder Fehlern bei der Verarbeitung von Eingaben. Ein Angreifer kann dieses zu einem Denial of Service oder \"Directory Traversal\" Angriff oder m\u00f6glicherweise zur Ausf\u00fchrung von Code mit den Privilegien des angegriffenen Benutzers oder Dienstes nutzen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T004914", "T012560" ] }, "release_date": "2018-07-29T22:00:00.000+00:00", "title": "CVE-2018-14355" }, { "cve": "CVE-2018-14356", "notes": [ { "category": "description", "text": "In mutt Linux existieren mehrere Schwachstellen. Diese basieren auf Puffer\u00fcberlauf Schw\u00e4chen oder Fehlern bei der Verarbeitung von Eingaben. Ein Angreifer kann dieses zu einem Denial of Service oder \"Directory Traversal\" Angriff oder m\u00f6glicherweise zur Ausf\u00fchrung von Code mit den Privilegien des angegriffenen Benutzers oder Dienstes nutzen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T004914", "T012560" ] }, "release_date": "2018-07-29T22:00:00.000+00:00", "title": "CVE-2018-14356" }, { "cve": "CVE-2018-14357", "notes": [ { "category": "description", "text": "In mutt Linux existieren mehrere Schwachstellen. Diese basieren auf Puffer\u00fcberlauf Schw\u00e4chen oder Fehlern bei der Verarbeitung von Eingaben. Ein Angreifer kann dieses zu einem Denial of Service oder \"Directory Traversal\" Angriff oder m\u00f6glicherweise zur Ausf\u00fchrung von Code mit den Privilegien des angegriffenen Benutzers oder Dienstes nutzen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T004914", "T012560" ] }, "release_date": "2018-07-29T22:00:00.000+00:00", "title": "CVE-2018-14357" }, { "cve": "CVE-2018-14358", "notes": [ { "category": "description", "text": "In mutt Linux existieren mehrere Schwachstellen. Diese basieren auf Puffer\u00fcberlauf Schw\u00e4chen oder Fehlern bei der Verarbeitung von Eingaben. Ein Angreifer kann dieses zu einem Denial of Service oder \"Directory Traversal\" Angriff oder m\u00f6glicherweise zur Ausf\u00fchrung von Code mit den Privilegien des angegriffenen Benutzers oder Dienstes nutzen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T004914", "T012560" ] }, "release_date": "2018-07-29T22:00:00.000+00:00", "title": "CVE-2018-14358" }, { "cve": "CVE-2018-14359", "notes": [ { "category": "description", "text": "In mutt Linux existieren mehrere Schwachstellen. Diese basieren auf Puffer\u00fcberlauf Schw\u00e4chen oder Fehlern bei der Verarbeitung von Eingaben. Ein Angreifer kann dieses zu einem Denial of Service oder \"Directory Traversal\" Angriff oder m\u00f6glicherweise zur Ausf\u00fchrung von Code mit den Privilegien des angegriffenen Benutzers oder Dienstes nutzen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T004914", "T012560" ] }, "release_date": "2018-07-29T22:00:00.000+00:00", "title": "CVE-2018-14359" }, { "cve": "CVE-2018-14360", "notes": [ { "category": "description", "text": "In mutt Linux existieren mehrere Schwachstellen. Diese basieren auf Puffer\u00fcberlauf Schw\u00e4chen oder Fehlern bei der Verarbeitung von Eingaben. Ein Angreifer kann dieses zu einem Denial of Service oder \"Directory Traversal\" Angriff oder m\u00f6glicherweise zur Ausf\u00fchrung von Code mit den Privilegien des angegriffenen Benutzers oder Dienstes nutzen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T004914", "T012560" ] }, "release_date": "2018-07-29T22:00:00.000+00:00", "title": "CVE-2018-14360" }, { "cve": "CVE-2018-14361", "notes": [ { "category": "description", "text": "In mutt Linux existieren mehrere Schwachstellen. Diese basieren auf Puffer\u00fcberlauf Schw\u00e4chen oder Fehlern bei der Verarbeitung von Eingaben. Ein Angreifer kann dieses zu einem Denial of Service oder \"Directory Traversal\" Angriff oder m\u00f6glicherweise zur Ausf\u00fchrung von Code mit den Privilegien des angegriffenen Benutzers oder Dienstes nutzen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T004914", "T012560" ] }, "release_date": "2018-07-29T22:00:00.000+00:00", "title": "CVE-2018-14361" }, { "cve": "CVE-2018-14362", "notes": [ { "category": "description", "text": "In mutt Linux existieren mehrere Schwachstellen. Diese basieren auf Puffer\u00fcberlauf Schw\u00e4chen oder Fehlern bei der Verarbeitung von Eingaben. Ein Angreifer kann dieses zu einem Denial of Service oder \"Directory Traversal\" Angriff oder m\u00f6glicherweise zur Ausf\u00fchrung von Code mit den Privilegien des angegriffenen Benutzers oder Dienstes nutzen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T004914", "T012560" ] }, "release_date": "2018-07-29T22:00:00.000+00:00", "title": "CVE-2018-14362" }, { "cve": "CVE-2018-14363", "notes": [ { "category": "description", "text": "In mutt Linux existieren mehrere Schwachstellen. Diese basieren auf Puffer\u00fcberlauf Schw\u00e4chen oder Fehlern bei der Verarbeitung von Eingaben. Ein Angreifer kann dieses zu einem Denial of Service oder \"Directory Traversal\" Angriff oder m\u00f6glicherweise zur Ausf\u00fchrung von Code mit den Privilegien des angegriffenen Benutzers oder Dienstes nutzen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T004914", "T012560" ] }, "release_date": "2018-07-29T22:00:00.000+00:00", "title": "CVE-2018-14363" } ] }
ghsa-vxp5-h7wr-q8p3
Vulnerability from github
An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. They have a buffer overflow via base64 data.
{ "affected": [], "aliases": [ "CVE-2018-14359" ], "database_specific": { "cwe_ids": [ "CWE-120" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2018-07-17T17:29:00Z", "severity": "CRITICAL" }, "details": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. They have a buffer overflow via base64 data.", "id": "GHSA-vxp5-h7wr-q8p3", "modified": "2022-05-13T01:26:30Z", "published": "2022-05-13T01:26:30Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14359" }, { "type": "WEB", "url": "https://github.com/neomutt/neomutt/commit/6f163e07ae68654d7ac5268cbb7565f6df79ad85" }, { "type": "WEB", "url": "https://gitlab.com/muttmua/mutt/commit/3d9028fec8f4d08db2251096307c0bbbebce669a" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2018/08/msg00001.html" }, { "type": "WEB", "url": "https://neomutt.org/2018/07/16/release" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/201810-07" }, { "type": "WEB", "url": "https://usn.ubuntu.com/3719-1" }, { "type": "WEB", "url": "https://usn.ubuntu.com/3719-2" }, { "type": "WEB", "url": "https://usn.ubuntu.com/3719-3" }, { "type": "WEB", "url": "https://www.debian.org/security/2018/dsa-4277" }, { "type": "WEB", "url": "http://www.mutt.org/news.html" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
gsd-2018-14359
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2018-14359", "description": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. They have a buffer overflow via base64 data.", "id": "GSD-2018-14359", "references": [ "https://www.suse.com/security/cve/CVE-2018-14359.html", "https://www.debian.org/security/2018/dsa-4277", "https://ubuntu.com/security/CVE-2018-14359", "https://advisories.mageia.org/CVE-2018-14359.html", "https://security.archlinux.org/CVE-2018-14359" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2018-14359" ], "details": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. They have a buffer overflow via base64 data.", "id": "GSD-2018-14359", "modified": "2023-12-13T01:22:38.096242Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-14359", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. They have a buffer overflow via base64 data." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "USN-3719-3", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3719-3/" }, { "name": "https://gitlab.com/muttmua/mutt/commit/3d9028fec8f4d08db2251096307c0bbbebce669a", "refsource": "MISC", "url": "https://gitlab.com/muttmua/mutt/commit/3d9028fec8f4d08db2251096307c0bbbebce669a" }, { "name": "DSA-4277", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4277" }, { "name": "USN-3719-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3719-2/" }, { "name": "[debian-lts-announce] 20180802 [SECURITY] [DLA 1455-1] mutt security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/08/msg00001.html" }, { "name": "GLSA-201810-07", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201810-07" }, { "name": "http://www.mutt.org/news.html", "refsource": "MISC", "url": "http://www.mutt.org/news.html" }, { "name": "https://neomutt.org/2018/07/16/release", "refsource": "MISC", "url": "https://neomutt.org/2018/07/16/release" }, { "name": "USN-3719-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3719-1/" }, { "name": "https://github.com/neomutt/neomutt/commit/6f163e07ae68654d7ac5268cbb7565f6df79ad85", "refsource": "MISC", "url": "https://github.com/neomutt/neomutt/commit/6f163e07ae68654d7ac5268cbb7565f6df79ad85" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:mutt:mutt:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1.10.1", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:neomutt:neomutt:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "20180716", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-14359" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. They have a buffer overflow via base64 data." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-120" } ] } ] }, "references": { "reference_data": [ { "name": "https://neomutt.org/2018/07/16/release", "refsource": "MISC", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://neomutt.org/2018/07/16/release" }, { "name": "https://gitlab.com/muttmua/mutt/commit/3d9028fec8f4d08db2251096307c0bbbebce669a", "refsource": "MISC", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://gitlab.com/muttmua/mutt/commit/3d9028fec8f4d08db2251096307c0bbbebce669a" }, { "name": "https://github.com/neomutt/neomutt/commit/6f163e07ae68654d7ac5268cbb7565f6df79ad85", "refsource": "MISC", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/neomutt/neomutt/commit/6f163e07ae68654d7ac5268cbb7565f6df79ad85" }, { "name": "http://www.mutt.org/news.html", "refsource": "MISC", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "http://www.mutt.org/news.html" }, { "name": "USN-3719-2", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3719-2/" }, { "name": "USN-3719-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3719-1/" }, { "name": "[debian-lts-announce] 20180802 [SECURITY] [DLA 1455-1] mutt security update", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2018/08/msg00001.html" }, { "name": "DSA-4277", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2018/dsa-4277" }, { "name": "USN-3719-3", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3719-3/" }, { "name": "GLSA-201810-07", "refsource": "GENTOO", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201810-07" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": true, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9 } }, "lastModifiedDate": "2020-05-19T17:13Z", "publishedDate": "2018-07-17T17:29Z" } } }
cnvd-2019-19137
Vulnerability from cnvd
Title: Mutt和NeoMutt缓冲区溢出漏洞(CNVD-2019-19137)
Description:
Mutt是Michael Elkins软件开发者所研发的一款用于类Unix系统下且基于文本的邮件客户端。NeoMutt是Mutt的修复补丁版本。
Mutt 1.10.1之前版本和NeoMutt 2018-07-16之前版本中存在缓冲区溢出漏洞,该漏洞源于程序未能正确地处理请求,攻击者可借助base64数据利用该漏洞执行任意代码。
Severity: 高
Patch Name: Mutt和NeoMutt缓冲区溢出漏洞(CNVD-2019-19137)的补丁
Patch Description:
Mutt是Michael Elkins软件开发者所研发的一款用于类Unix系统下且基于文本的邮件客户端。NeoMutt是Mutt的修复补丁版本。
Mutt 1.10.1之前版本和NeoMutt 2018-07-16之前版本中存在缓冲区溢出漏洞,该漏洞源于程序未能正确地处理请求,攻击者可借助base64数据利用该漏洞执行任意代码。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description:
厂商已发布了漏洞修复程序,请及时关注更新: https://gitlab.com/muttmua/mutt/commit/3d9028fec8f4d08db2251096307c0bbbebce669a;https://github.com/neomutt/neomutt/commit/6f163e07ae68654d7ac5268cbb7565f6df79ad85
Reference: https://nvd.nist.gov/vuln/detail/CVE-2018-14359
Name | ['Michael Elkins Mutt <1.10.1', 'Michael Elkins NeoMutt <2018-07-16'] |
---|
{ "cves": { "cve": { "cveNumber": "CVE-2018-14359" } }, "description": "Mutt\u662fMichael Elkins\u8f6f\u4ef6\u5f00\u53d1\u8005\u6240\u7814\u53d1\u7684\u4e00\u6b3e\u7528\u4e8e\u7c7bUnix\u7cfb\u7edf\u4e0b\u4e14\u57fa\u4e8e\u6587\u672c\u7684\u90ae\u4ef6\u5ba2\u6237\u7aef\u3002NeoMutt\u662fMutt\u7684\u4fee\u590d\u8865\u4e01\u7248\u672c\u3002\n\nMutt 1.10.1\u4e4b\u524d\u7248\u672c\u548cNeoMutt 2018-07-16\u4e4b\u524d\u7248\u672c\u4e2d\u5b58\u5728\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7a0b\u5e8f\u672a\u80fd\u6b63\u786e\u5730\u5904\u7406\u8bf7\u6c42\uff0c\u653b\u51fb\u8005\u53ef\u501f\u52a9base64\u6570\u636e\u5229\u7528\u8be5\u6f0f\u6d1e\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002", "discovererName": "unknown", "formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://gitlab.com/muttmua/mutt/commit/3d9028fec8f4d08db2251096307c0bbbebce669a\uff1bhttps://github.com/neomutt/neomutt/commit/6f163e07ae68654d7ac5268cbb7565f6df79ad85", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2019-19137", "openTime": "2019-06-25", "patchDescription": "Mutt\u662fMichael Elkins\u8f6f\u4ef6\u5f00\u53d1\u8005\u6240\u7814\u53d1\u7684\u4e00\u6b3e\u7528\u4e8e\u7c7bUnix\u7cfb\u7edf\u4e0b\u4e14\u57fa\u4e8e\u6587\u672c\u7684\u90ae\u4ef6\u5ba2\u6237\u7aef\u3002NeoMutt\u662fMutt\u7684\u4fee\u590d\u8865\u4e01\u7248\u672c\u3002\r\n\r\nMutt 1.10.1\u4e4b\u524d\u7248\u672c\u548cNeoMutt 2018-07-16\u4e4b\u524d\u7248\u672c\u4e2d\u5b58\u5728\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7a0b\u5e8f\u672a\u80fd\u6b63\u786e\u5730\u5904\u7406\u8bf7\u6c42\uff0c\u653b\u51fb\u8005\u53ef\u501f\u52a9base64\u6570\u636e\u5229\u7528\u8be5\u6f0f\u6d1e\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "Mutt\u548cNeoMutt\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\uff08CNVD-2019-19137\uff09\u7684\u8865\u4e01", "products": { "product": [ "Michael Elkins Mutt \u003c1.10.1", "Michael Elkins NeoMutt \u003c2018-07-16" ] }, "referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2018-14359", "serverity": "\u9ad8", "submitTime": "2018-07-18", "title": "Mutt\u548cNeoMutt\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\uff08CNVD-2019-19137\uff09" }
fkie_cve-2018-14359
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
mutt | mutt | * | |
neomutt | neomutt | * | |
canonical | ubuntu_linux | 12.04 | |
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 16.04 | |
canonical | ubuntu_linux | 18.04 | |
debian | debian_linux | 8.0 | |
debian | debian_linux | 9.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mutt:mutt:*:*:*:*:*:*:*:*", "matchCriteriaId": "2FA2C3A6-423C-4BE5-8FA7-0241384D58D0", "versionEndExcluding": "1.10.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:neomutt:neomutt:*:*:*:*:*:*:*:*", "matchCriteriaId": "1C15CCD1-1752-4913-9506-32035B52A513", "versionEndExcluding": "20180716", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "matchCriteriaId": "8D305F7A-D159-4716-AB26-5E38BB5CD991", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. They have a buffer overflow via base64 data." }, { "lang": "es", "value": "Se ha descubierto un problema en Mutt en versiones anteriores a la 1.10.1 y NeoMutt en versiones anteriores al 2018-07-16. Tienen un desbordamiento de b\u00fafer mediante datos en base64." } ], "id": "CVE-2018-14359", "lastModified": "2024-11-21T03:48:54.827", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-07-17T17:29:00.810", "references": [ { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "http://www.mutt.org/news.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/neomutt/neomutt/commit/6f163e07ae68654d7ac5268cbb7565f6df79ad85" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://gitlab.com/muttmua/mutt/commit/3d9028fec8f4d08db2251096307c0bbbebce669a" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2018/08/msg00001.html" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://neomutt.org/2018/07/16/release" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201810-07" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3719-1/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3719-2/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3719-3/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2018/dsa-4277" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "http://www.mutt.org/news.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/neomutt/neomutt/commit/6f163e07ae68654d7ac5268cbb7565f6df79ad85" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://gitlab.com/muttmua/mutt/commit/3d9028fec8f4d08db2251096307c0bbbebce669a" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2018/08/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://neomutt.org/2018/07/16/release" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201810-07" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3719-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3719-2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3719-3/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2018/dsa-4277" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-120" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.