Bug#771125: CVE request: mutt: heap-based buffer overflow in mutt_substrdup()

2014-11-27 Thread Antonio Radici
On Thu, Nov 27, 2014 at 02:49:27PM +1100, Murray McAllister wrote: > Good morning, > > Jakub Wilk reported a crash in mutt: > > https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=771125 > > Looking in mutt-1.5.23-2.fc20.x86_64: [...] I'll have a patch/solution ready for this by tonight; thanks f

Bug#771125: CVE request: mutt: heap-based buffer overflow in mutt_substrdup()

2014-11-26 Thread cve-assign
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 > https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=771125 > mutt segfaults when trying to show the attached message. (You might need > to disable header weeding to trigger the crash.) Use CVE-2014-9116. - -- CVE assignment team, MITRE CVE Numberin

Bug#771125: CVE request: mutt: heap-based buffer overflow in mutt_substrdup()

2014-11-26 Thread Murray McAllister
Good morning, Jakub Wilk reported a crash in mutt: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=771125 Looking in mutt-1.5.23-2.fc20.x86_64: char *mutt_substrdup (const char *begin, const char *end) { size_t len; char *p; if (end) len = end - begin; else len = strlen (beg