Show plain JSON{"id": "CVE-2014-0467", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 5.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2014-03-14T15:55:05.637", "references": [{"url": "http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00001.html", "source": "security@debian.org"}, {"url": "http://lists.opensuse.org/opensuse-updates/2014-03/msg00083.html", "source": "security@debian.org"}, {"url": "http://lists.opensuse.org/opensuse-updates/2014-03/msg00085.html", "source": "security@debian.org"}, {"url": "http://rhn.redhat.com/errata/RHSA-2014-0304.html", "source": "security@debian.org"}, {"url": "http://www.debian.org/security/2014/dsa-2874", "source": "security@debian.org"}, {"url": "http://www.mutt.org/doc/devel/ChangeLog", "source": "security@debian.org"}, {"url": "http://www.securityfocus.com/bid/66165", "source": "security@debian.org"}, {"url": "http://www.securitytracker.com/id/1029919", "source": "security@debian.org"}, {"url": "http://www.ubuntu.com/usn/USN-2147-1", "source": "security@debian.org"}, {"url": "http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00001.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://lists.opensuse.org/opensuse-updates/2014-03/msg00083.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://lists.opensuse.org/opensuse-updates/2014-03/msg00085.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://rhn.redhat.com/errata/RHSA-2014-0304.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.debian.org/security/2014/dsa-2874", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.mutt.org/doc/devel/ChangeLog", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/66165", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securitytracker.com/id/1029919", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.ubuntu.com/usn/USN-2147-1", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-119"}]}], "descriptions": [{"lang": "en", "value": "Buffer overflow in copy.c in Mutt before 1.5.23 allows remote attackers to cause a denial of service (crash) via a crafted RFC2047 header line, related to address expansion."}, {"lang": "es", "value": "Desbordamiento de buffer en copy.c en Mutt anterior a 1.5.23 permite a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda) a trav\u00e9s de una l\u00ednea de cabecera RFC2047 manipulada, relacionado con la expansi\u00f3n de direcci\u00f3n."}], "lastModified": "2025-04-12T10:46:40.837", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:mutt:mutt:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FA6A52BC-0914-4D26-BB4B-FB81621582B8", "versionEndIncluding": "1.5.22"}, {"criteria": "cpe:2.3:a:mutt:mutt:1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8C9BFED5-6D19-4B2E-8F1E-8262C908F1C6"}, {"criteria": "cpe:2.3:a:mutt:mutt:1.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A6A82602-1948-47C8-8F55-58B2BC602DD5"}, {"criteria": "cpe:2.3:a:mutt:mutt:1.5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "704F1CE0-6A42-42D9-A5EA-DA385D9C437A"}, {"criteria": "cpe:2.3:a:mutt:mutt:1.5.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6AA1A4E0-9405-408C-B15B-D9FDB797081A"}, {"criteria": "cpe:2.3:a:mutt:mutt:1.5.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A3FCC90B-E7EB-4467-90BE-6A75489DF719"}, {"criteria": "cpe:2.3:a:mutt:mutt:1.5.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D55642D8-06F7-4274-ABF1-6EA9EC8E22BB"}, {"criteria": "cpe:2.3:a:mutt:mutt:1.5.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E55271CE-1724-46F7-8E97-FD9D918ED4F4"}, {"criteria": "cpe:2.3:a:mutt:mutt:1.5.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "22ED4127-38FF-4271-A443-9C5ED0C9A5AB"}, {"criteria": "cpe:2.3:a:mutt:mutt:1.5.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2F8A1007-8993-4637-9DC6-2D1FF4216FC4"}, {"criteria": "cpe:2.3:a:mutt:mutt:1.5.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F4234D39-57E4-4C90-A1C2-23F08801CF74"}, {"criteria": "cpe:2.3:a:mutt:mutt:1.5.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3E9C0F76-89D9-483A-8EF6-638C4B2FE1DB"}, {"criteria": "cpe:2.3:a:mutt:mutt:1.5.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "98E2B705-7739-4671-9D34-6644BA85FF03"}, {"criteria": "cpe:2.3:a:mutt:mutt:1.5.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "74C786A0-E910-4C49-B0CC-FAD26E7141D2"}, {"criteria": "cpe:2.3:a:mutt:mutt:1.5.13:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E70B1F82-CD76-4204-BBAD-56447CB759ED"}, {"criteria": "cpe:2.3:a:mutt:mutt:1.5.14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0AC099BE-9FD3-4B1C-9DC8-2C3C553C617C"}, {"criteria": "cpe:2.3:a:mutt:mutt:1.5.15:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DBD01EFC-261E-4F3E-8A5A-FD2A53BF1A8A"}, {"criteria": "cpe:2.3:a:mutt:mutt:1.5.16:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2CD5E120-7D45-4B4F-A97F-69EF1A07C137"}, {"criteria": "cpe:2.3:a:mutt:mutt:1.5.17:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "11DAD8B2-2DE4-43C0-B425-7F9D6E6BE40A"}, {"criteria": "cpe:2.3:a:mutt:mutt:1.5.18:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FFF70DC6-9B24-4E48-B917-11FF64F751F1"}, {"criteria": "cpe:2.3:a:mutt:mutt:1.5.19:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "89C33B31-B9BC-4E43-8221-219380B4B682"}, {"criteria": "cpe:2.3:a:mutt:mutt:1.5.20:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "591AA471-643C-49FB-8922-F91774946177"}, {"criteria": "cpe:2.3:a:mutt:mutt:1.5.21:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "925C4B83-A399-4DF1-BCAE-45EEAF522371"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DE554781-1EB9-446E-911F-6C11970C47F4"}, {"criteria": "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DFBF430B-0832-44B0-AA0E-BA9E467F7668"}, {"criteria": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A10BC294-9196-425F-9FB0-B1625465B47F"}], "operator": "OR"}]}], "sourceIdentifier": "security@debian.org"}