{"affected":[{"ecosystem_specific":{"binaries":[{"mutt":"1.5.17-42.43.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Point of Sale 11 SP3","name":"mutt","purl":"pkg:rpm/suse/mutt&distro=SUSE%20Linux%20Enterprise%20Point%20of%20Sale%2011%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.5.17-42.43.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"mutt":"1.5.17-42.43.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 11 SP3-LTSS","name":"mutt","purl":"pkg:rpm/suse/mutt&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.5.17-42.43.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"mutt":"1.5.17-42.43.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 11 SP3-TERADATA","name":"mutt","purl":"pkg:rpm/suse/mutt&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-TERADATA"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.5.17-42.43.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"mutt":"1.5.17-42.43.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 11 SP4","name":"mutt","purl":"pkg:rpm/suse/mutt&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.5.17-42.43.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"mutt":"1.5.17-42.43.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 11 SP4","name":"mutt","purl":"pkg:rpm/suse/mutt&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.5.17-42.43.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for mutt fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2018-14352: Fix imap_quote_string in imap/util.c that does not leave room for quote characters (bsc#1101582).\n- CVE-2018-14353: Fix imap_quote_string in imap/util.c that has an integer underflow (bsc#1101581).\n- CVE-2018-14362: Fix pop.c that does not forbid characters that may have unsafe interaction with message-cache pathnames (bsc#1101567).\n- CVE-2018-14354: Fix arbitrary command execution from remote IMAP servers via backquote characters (bsc#1101578).\n- CVE-2018-14356: Fix pop.c that mishandles a zero-length UID (bsc#1101576).\n- CVE-2018-14355: Fix imap/util.c that mishandles '..' directory traversal in a mailbox name (bsc#1101577).\n- CVE-2018-14349: Fix imap/command.c that mishandles a NO response without a message (bsc#1101589).\n- CVE-2018-14350: Fix imap/message.c that has a stack-based buffer overflow for a FETCH response with along INTERNALDATE field (bsc#1101588).\n- CVE-2018-14357: Fix that remote IMAP servers are allowed to execute arbitrary commands via backquote characters (bsc#1101573).\n- CVE-2018-14359: Fix buffer overflow via base64 data (bsc#1101570).\n- CVE-2018-14358: Fix imap/message.c that has a stack-based buffer overflow for a FETCH response with along RFC822.SIZE field (bsc#1101571).\n\n\nBug fixes:\n\n- bsc#936807: On entering a 70 character subject line in mutt, a tab is added to the text after 67 characters.\n","id":"SUSE-SU-2018:2403-1","modified":"2018-08-17T06:54:36Z","published":"2018-08-17T06:54:36Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2018/suse-su-20182403-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1101567"},{"type":"REPORT","url":"https://bugzilla.suse.com/1101570"},{"type":"REPORT","url":"https://bugzilla.suse.com/1101571"},{"type":"REPORT","url":"https://bugzilla.suse.com/1101573"},{"type":"REPORT","url":"https://bugzilla.suse.com/1101576"},{"type":"REPORT","url":"https://bugzilla.suse.com/1101577"},{"type":"REPORT","url":"https://bugzilla.suse.com/1101578"},{"type":"REPORT","url":"https://bugzilla.suse.com/1101581"},{"type":"REPORT","url":"https://bugzilla.suse.com/1101582"},{"type":"REPORT","url":"https://bugzilla.suse.com/1101588"},{"type":"REPORT","url":"https://bugzilla.suse.com/1101589"},{"type":"REPORT","url":"https://bugzilla.suse.com/936807"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-14349"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-14350"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-14352"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-14353"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-14354"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-14355"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-14356"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-14357"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-14358"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-14359"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-14362"}],"related":["CVE-2018-14349","CVE-2018-14350","CVE-2018-14352","CVE-2018-14353","CVE-2018-14354","CVE-2018-14355","CVE-2018-14356","CVE-2018-14357","CVE-2018-14358","CVE-2018-14359","CVE-2018-14362"],"summary":"Security update for mutt","upstream":["CVE-2018-14349","CVE-2018-14350","CVE-2018-14352","CVE-2018-14353","CVE-2018-14354","CVE-2018-14355","CVE-2018-14356","CVE-2018-14357","CVE-2018-14358","CVE-2018-14359","CVE-2018-14362"]}