Buffer Overflow in uudecoder in Mutt affecting all versions starting from 0.94.13 before 2.2.3 allows read past end of input line
                
            References
                    | Link | Resource | 
|---|---|
| https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-1328.json | Third Party Advisory | 
| https://gitlab.com/muttmua/mutt/-/commit/e5ed080c00e59701ca62ef9b2a6d2612ebf765a5 | Patch Third Party Advisory | 
| https://gitlab.com/muttmua/mutt/-/issues/404 | Exploit Issue Tracking Patch Third Party Advisory | 
| https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-1328.json | Third Party Advisory | 
| https://gitlab.com/muttmua/mutt/-/commit/e5ed080c00e59701ca62ef9b2a6d2612ebf765a5 | Patch Third Party Advisory | 
| https://gitlab.com/muttmua/mutt/-/issues/404 | Exploit Issue Tracking Patch Third Party Advisory | 
Configurations
                    History
                    21 Nov 2024, 06:40
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-1328.json - Third Party Advisory | |
| References | () https://gitlab.com/muttmua/mutt/-/commit/e5ed080c00e59701ca62ef9b2a6d2612ebf765a5 - Patch, Third Party Advisory | |
| References | () https://gitlab.com/muttmua/mutt/-/issues/404 - Exploit, Issue Tracking, Patch, Third Party Advisory | |
| CVSS | v2 : v3 : | v2 : 5.0 v3 : 4.3 | 
Information
                Published : 2022-04-14 21:15
Updated : 2024-11-21 06:40
NVD link : CVE-2022-1328
Mitre link : CVE-2022-1328
CVE.ORG link : CVE-2022-1328
JSON object : View
Products Affected
                mutt
- mutt
debian
- debian_linux
fedoraproject
- fedora
CWE
                
                    
                        
                        CWE-120
                        
            Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
