View | Details | Raw Unified | Return to bug 229810 | Differences between
and this patch

Collapse All | Expand All

(-)b/security/vuxml/vuln.xml (-1 / +58 lines)
Lines 58-63 Notes: Link Here
58
  * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
58
  * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
59
-->
59
-->
60
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
60
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
61
  <vuln vid="a2f35081-8a02-11e8-8fa5-4437e6ad11c4">
62
    <topic>mutt -- remote code injection and path traversal vulnerability</topic>
63
    <affects>
64
      <package>
65
	<name>mutt</name>
66
	<range><lt>1.10.1</lt></range>
67
       </package>
68
    </affects>
69
    <description>
70
      <body xmlns="http://www.w3.org/1999/xhtml">
71
	<p>Kevin J. McCarthy reports:</p>
72
	<blockquote cite="http://lists.mutt.org/pipermail/mutt-announce/Week-of-Mon-20180716/000004.html">
73
	  <p>Fixes a remote code injection vulnerability when "subscribing"
74
	     to an IMAP mailbox, either via $imap_check_subscribed, or via the
75
	     &lt;subscribe&gt; function in the browser menu.  Mutt was generating a
76
	     "mailboxes" command and sending that along to the muttrc parser.
77
	     However, it was not escaping "`", which executes code and inserts
78
	     the result.  This would allow a malicious IMAP server to execute
79
	     arbitrary code (for $imap_check_subscribed).</p>
80
	    <p>Fixes POP body caching path traversal vulnerability.</p>
81
	    <p>Fixes IMAP header caching path traversal vulnerability.</p>
82
	    <p>CVE-2018-14349 - NO Response Heap Overflow</p>
83
	    <p>CVE-2018-14350 - INTERNALDATE Stack Overflow</p>
84
	    <p>CVE-2018-14351 - STATUS Literal Length relative write</p>
85
	    <p>CVE-2018-14352 - imap_quote_string off-by-one stack overflow</p>
86
	    <p>CVE-2018-14353 - imap_quote_string int underflow</p>
87
	    <p>CVE-2018-14354 - imap_subscribe Remote Code Execution</p>
88
	    <p>CVE-2018-14355 - STATUS mailbox header cache directory traversal</p>
89
	    <p>CVE-2018-14356 - POP empty UID NULL deref</p>
90
	    <p>CVE-2018-14357 - LSUB Remote Code Execution</p>
91
	    <p>CVE-2018-14358 - RFC822.SIZE Stack Overflow</p>
92
	    <p>CVE-2018-14359 - base64 decode Stack Overflow</p>
93
	    <p>CVE-2018-14362 - POP Message Cache Directory Traversal</p>
94
	</blockquote>
95
      </body>
96
    </description>
97
    <references>
98
      <cvename>CVE-2018-14349</cvename>
99
      <cvename>CVE-2018-14350</cvename>
100
      <cvename>CVE-2018-14351</cvename>
101
      <cvename>CVE-2018-14352</cvename>
102
      <cvename>CVE-2018-14353</cvename>
103
      <cvename>CVE-2018-14354</cvename>
104
      <cvename>CVE-2018-14355</cvename>
105
      <cvename>CVE-2018-14356</cvename>
106
      <cvename>CVE-2018-14357</cvename>
107
      <cvename>CVE-2018-14358</cvename>
108
      <cvename>CVE-2018-14359</cvename>
109
      <cvename>CVE-2018-14362</cvename>
110
      <url>http://lists.mutt.org/pipermail/mutt-announce/Week-of-Mon-20180716/000004.html</url>
111
    </references>
112
    <dates>
113
      <discovery>2018-07-15</discovery>
114
      <entry>2018-07-17</entry>
115
    </dates>
116
  </vuln>
117
61
  <vuln vid="ef013039-89cd-11e8-84e9-00e04c1ea73d">
118
  <vuln vid="ef013039-89cd-11e8-84e9-00e04c1ea73d">
62
    <topic>typo3 -- multiple vulnerabilities</topic>
119
    <topic>typo3 -- multiple vulnerabilities</topic>
63
    <affects>
120
    <affects>
Lines 133-138 Notes: Link Here
133
      </body>
190
      </body>
134
    </description>
191
    </description>
135
    <references>
192
    <references>
193
      <cvename>CVE-2018-1000180</cvename>
136
      <cvename>CVE-2018-1000180</cvename>
194
      <cvename>CVE-2018-1000180</cvename>
137
      <cvename>CVE-2018-1000613</cvename>
195
      <cvename>CVE-2018-1000613</cvename>
138
      <url>https://www.bouncycastle.org/latest_releases.html</url>
196
      <url>https://www.bouncycastle.org/latest_releases.html</url>
139
- 

Return to bug 229810