Buffer Overflow in uudecoder in Mutt affecting all versions starting from 0.94.13 before 2.2.3 allows read past end of input line
References
| Link | Resource |
|---|---|
| https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-1328.json | Third Party Advisory |
| https://gitlab.com/muttmua/mutt/-/commit/e5ed080c00e59701ca62ef9b2a6d2612ebf765a5 | Patch Third Party Advisory |
| https://gitlab.com/muttmua/mutt/-/issues/404 | Exploit Issue Tracking Patch Third Party Advisory |
| https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-1328.json | Third Party Advisory |
| https://gitlab.com/muttmua/mutt/-/commit/e5ed080c00e59701ca62ef9b2a6d2612ebf765a5 | Patch Third Party Advisory |
| https://gitlab.com/muttmua/mutt/-/issues/404 | Exploit Issue Tracking Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 06:40
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : 5.0
v3 : 4.3 |
| References | () https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-1328.json - Third Party Advisory | |
| References | () https://gitlab.com/muttmua/mutt/-/commit/e5ed080c00e59701ca62ef9b2a6d2612ebf765a5 - Patch, Third Party Advisory | |
| References | () https://gitlab.com/muttmua/mutt/-/issues/404 - Exploit, Issue Tracking, Patch, Third Party Advisory |
14 Oct 2022, 12:49
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| CPE | cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:* |
12 Jul 2022, 14:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
10 Jun 2022, 03:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
12 May 2022, 17:29
| Type | Values Removed | Values Added |
|---|---|---|
| References | (MLIST) https://lists.debian.org/debian-lts-announce/2022/05/msg00010.html - Mailing List, Third Party Advisory | |
| CPE | cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* |
11 May 2022, 00:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
22 Apr 2022, 15:08
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : 5.0
v3 : 5.3 |
| References | (CONFIRM) https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-1328.json - Third Party Advisory | |
| References | (MISC) https://gitlab.com/muttmua/mutt/-/issues/404 - Exploit, Issue Tracking, Patch, Third Party Advisory | |
| References | (MLIST) http://www.openwall.com/lists/oss-security/2022/04/14/3 - Mailing List, Patch, Third Party Advisory | |
| References | (MISC) https://gitlab.com/muttmua/mutt/-/commit/e5ed080c00e59701ca62ef9b2a6d2612ebf765a5 - Patch, Third Party Advisory | |
| CPE | cpe:2.3:a:mutt:mutt:*:*:*:*:*:*:*:* | |
| CWE | CWE-120 |
15 Apr 2022, 03:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
14 Apr 2022, 21:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2022-04-14 21:15
Updated : 2024-11-21 06:40
NVD link : CVE-2022-1328
Mitre link : CVE-2022-1328
CVE.ORG link : CVE-2022-1328
JSON object : View
Products Affected
fedoraproject
- fedora
mutt
- mutt
debian
- debian_linux
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
