| Title | Mutt および NeoMutt におけるバッファエラーの脆弱性 |
|---|---|
| Summary | Mutt および NeoMutt には、バッファエラーの脆弱性が存在します。 |
| Possible impacts | 情報を取得される、情報を改ざんされる、およびサービス運用妨害 (DoS) 状態にされる可能性があります。 |
| Solution | ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。 |
| Publication Date | July 16, 2018, midnight |
| Registration Date | Oct. 9, 2018, 2:51 p.m. |
| Last Update | Oct. 9, 2018, 2:51 p.m. |
| CVSS3.0 : 緊急 | |
| Score | 9.8 |
|---|---|
| Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
| CVSS2.0 : 危険 | |
| Score | 7.5 |
|---|---|
| Vector | AV:N/AC:L/Au:N/C:P/I:P/A:P |
| レッドハット |
| Red Hat Enterprise Linux |
| Red Hat Enterprise Linux Desktop |
| Red Hat Enterprise Linux Server |
| Red Hat Enterprise Linux Server EUS |
| Red Hat Enterprise Linux Workstation |
| Debian |
| Debian GNU/Linux |
| Mutt |
| Mutt 1.10.1 未満 |
| NeoMutt |
| NeoMutt 2018/07/16 より前 |
| No | Changed Details | Date of change |
|---|---|---|
| 1 | [2018年10月09日] 掲載 |
Oct. 9, 2018, 2:51 p.m. |
| Summary | An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. pop.c does not forbid characters that may have unsafe interaction with message-cache pathnames, as demonstrated by a '/' character. |
|---|---|
| Publication Date | July 18, 2018, 2:29 a.m. |
| Registration Date | March 1, 2021, 6:56 p.m. |
| Last Update | Nov. 21, 2024, 12:48 p.m. |
| Configuration1 | or higher | or less | more than | less than | |
| cpe:2.3:a:mutt:mutt:*:*:*:*:*:*:*:* | 1.10.1 | ||||
| cpe:2.3:a:neomutt:neomutt:*:*:*:*:*:*:*:* | 20180716 | ||||
| Configuration2 | or higher | or less | more than | less than | |
| cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:* | |||||
| Configuration3 | or higher | or less | more than | less than | |
| cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* | |||||
| Configuration4 | or higher | or less | more than | less than | |
| cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:redhat:enterprise_linux_server_eus:7.7:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:* | |||||