Unrated severityNVD Advisory· Published Dec 2, 2014· Updated May 6, 2026
CVE-2014-9116
CVE-2014-9116
Description
The write_one_header function in mutt 1.5.23 does not properly handle newline characters at the beginning of a header, which allows remote attackers to cause a denial of service (crash) via a header with an empty body, which triggers a heap-based buffer overflow in the mutt_substrdup function.
Affected products
5- cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
13- www.openwall.com/lists/oss-security/2014/11/27/5nvdExploitMailing ListThird Party Advisory
- bugs.debian.org/cgi-bin/bugreport.cginvdExploitIssue Tracking
- bugzilla.redhat.com/show_bug.cginvdExploitIssue Tracking
- advisories.mageia.org/MGASA-2014-0509.htmlnvdThird Party Advisory
- dev.mutt.org/trac/ticket/3716nvdIssue TrackingVendor Advisory
- lists.opensuse.org/opensuse-security-announce/2015-01/msg00002.htmlnvdThird Party Advisory
- www.debian.org/security/2014/dsa-3083nvdThird Party Advisory
- www.openwall.com/lists/oss-security/2014/11/27/9nvdMailing ListThird Party Advisory
- www.securityfocus.com/bid/71334nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1031266nvdThird Party AdvisoryVDB Entry
- www.mandriva.com/security/advisoriesnvdBroken Link
- www.mandriva.com/security/advisoriesnvdBroken Link
- security.gentoo.org/glsa/201701-04nvd
News mentions
0No linked articles in our index yet.