The writeoneheader function in mutt 1.5.23 does not properly handle newline characters at the beginning of a header, which allows remote attackers to cause a denial of service (crash) via a header with an empty body, which triggers a heap-based buffer overflow in the mutt_substrdup function.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "1.5.21-6.4ubuntu2.1", "binary_name": "mutt" }, { "binary_version": "1.5.21-6.4ubuntu2.1", "binary_name": "mutt-dbg" }, { "binary_version": "1.5.21-6.4ubuntu2.1", "binary_name": "mutt-patched" } ] }