SB2018072440 - Stack-based buffer overflow in mutt (Alpine package)
Published: July 24, 2018
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Stack-based buffer overflow (CVE-ID: CVE-2018-14358)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to stack-based buffer overflow in imap/message.c. A remote attacker can use FETCH response with a long RFC822.SIZE field, trigger memory corruption and execute arbitrary code with elevated privileges.
Successful exploitation of the vulnerability may result in system compromise.
Remediation
Install update from vendor's website.
References
- https://git.alpinelinux.org/aports/commit/?id=0d3886cdea880fe65aff164040ab54f9e2d5ee93
- https://git.alpinelinux.org/aports/commit/?id=7b76ef5a44a34f2aa0ab6dcbd05653a7f384d5cd
- https://git.alpinelinux.org/aports/commit/?id=8096bf545fbce05d5535cb01173187a08a4e7f14
- https://git.alpinelinux.org/aports/commit/?id=e16a7290cad51651c51b16468159e0bb5a11f234