ArchLinux: 201503-6: mutt: denial of service
Summary
The write_one_header function does not properly handle newline characters at the beginning of a header, which allows remote attackers to cause a denial of service (crash) via a header with an empty body, which triggers a heap-based buffer overflow in the mutt_substrdup function.
Resolution
Upgrade to 1.5.23-2.
# pacman -Syu "mutt>=1.5.23-2"
The problem has been fixed upstream but no release is available yet.
References
https://seclists.org/oss-sec/2014/q4/835 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-9116 https://bugs.archlinux.org/task/44110
Workaround
None.