CVE-2022-1328

Buffer Overflow in uudecoder in Mutt affecting all versions starting from 0.94.13 before 2.2.3 allows read past end of input line
Configurations

Configuration 1 (hide)

cpe:2.3:a:mutt:mutt:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*

History

14 Oct 2022, 12:49

Type Values Removed Values Added
References
  • {'url': 'http://packetstormsecurity.com/files/167717/Mutt-mutt_decode_uuencoded-Memory-Disclosure.html', 'name': 'http://packetstormsecurity.com/files/167717/Mutt-mutt_decode_uuencoded-Memory-Disclosure.html', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'http://www.openwall.com/lists/oss-security/2022/04/14/3', 'name': '[oss-security] 20220414 mutt 2.2.3 released - fixes CVE-2022-1328', 'tags': ['Mailing List', 'Patch', 'Third Party Advisory'], 'refsource': 'MLIST'}
  • {'url': 'https://lists.debian.org/debian-lts-announce/2022/05/msg00010.html', 'name': '[debian-lts-announce] 20220510 [SECURITY] [DLA 2999-1] mutt security update', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'MLIST'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/35CD7NH4NFPF5OEG2PHI3CZ3UOK3ICXR/', 'name': 'FEDORA-2022-f1a8f72bb8', 'tags': [], 'refsource': 'FEDORA'}
CPE cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*

12 Jul 2022, 14:15

Type Values Removed Values Added
References
  • (MISC) http://packetstormsecurity.com/files/167717/Mutt-mutt_decode_uuencoded-Memory-Disclosure.html -

10 Jun 2022, 03:15

Type Values Removed Values Added
References
  • (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/35CD7NH4NFPF5OEG2PHI3CZ3UOK3ICXR/ -

12 May 2022, 17:29

Type Values Removed Values Added
References (MLIST) https://lists.debian.org/debian-lts-announce/2022/05/msg00010.html - (MLIST) https://lists.debian.org/debian-lts-announce/2022/05/msg00010.html - Mailing List, Third Party Advisory
CPE cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

11 May 2022, 00:15

Type Values Removed Values Added
References
  • (MLIST) https://lists.debian.org/debian-lts-announce/2022/05/msg00010.html -

22 Apr 2022, 15:08

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : 5.0
v3 : 5.3
References (CONFIRM) https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-1328.json - (CONFIRM) https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-1328.json - Third Party Advisory
References (MISC) https://gitlab.com/muttmua/mutt/-/issues/404 - (MISC) https://gitlab.com/muttmua/mutt/-/issues/404 - Exploit, Issue Tracking, Patch, Third Party Advisory
References (MLIST) http://www.openwall.com/lists/oss-security/2022/04/14/3 - (MLIST) http://www.openwall.com/lists/oss-security/2022/04/14/3 - Mailing List, Patch, Third Party Advisory
References (MISC) https://gitlab.com/muttmua/mutt/-/commit/e5ed080c00e59701ca62ef9b2a6d2612ebf765a5 - (MISC) https://gitlab.com/muttmua/mutt/-/commit/e5ed080c00e59701ca62ef9b2a6d2612ebf765a5 - Patch, Third Party Advisory
CPE cpe:2.3:a:mutt:mutt:*:*:*:*:*:*:*:*
CWE CWE-120

15 Apr 2022, 03:15

Type Values Removed Values Added
References
  • (MLIST) http://www.openwall.com/lists/oss-security/2022/04/14/3 -

14 Apr 2022, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-04-14 21:15

Updated : 2024-02-04 22:29


NVD link : CVE-2022-1328

Mitre link : CVE-2022-1328

CVE.ORG link : CVE-2022-1328


JSON object : View

Products Affected

mutt

  • mutt

debian

  • debian_linux

fedoraproject

  • fedora
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')