{"id":"DEBIAN-CVE-2003-0167","details":"Multiple off-by-one buffer overflows in the IMAP capability for Mutt 1.3.28 and earlier, and Balsa 1.2.4 and earlier, allow a remote malicious IMAP server to cause a denial of service (crash) and possibly execute arbitrary code via a specially crafted mail folder, a different vulnerability than CVE-2003-0140.","modified":"2026-04-28T20:03:25.614845Z","published":"2003-04-02T05:00:00Z","upstream":["CVE-2003-0167"],"references":[{"type":"ADVISORY","url":"https://security-tracker.debian.org/tracker/CVE-2003-0167"}],"affected":[{"package":{"name":"balsa","ecosystem":"Debian:11","purl":"pkg:deb/debian/balsa?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.0.10"}]}],"ecosystem_specific":{"urgency":"not yet assigned"},"database_specific":{"source":"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2003-0167.json"}},{"package":{"name":"balsa","ecosystem":"Debian:12","purl":"pkg:deb/debian/balsa?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.0.10"}]}],"ecosystem_specific":{"urgency":"not yet assigned"},"database_specific":{"source":"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2003-0167.json"}},{"package":{"name":"balsa","ecosystem":"Debian:13","purl":"pkg:deb/debian/balsa?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.0.10"}]}],"ecosystem_specific":{"urgency":"not yet assigned"},"database_specific":{"source":"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2003-0167.json"}},{"package":{"name":"balsa","ecosystem":"Debian:14","purl":"pkg:deb/debian/balsa?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.0.10"}]}],"ecosystem_specific":{"urgency":"not yet assigned"},"database_specific":{"source":"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2003-0167.json"}},{"package":{"name":"mutt","ecosystem":"Debian:11","purl":"pkg:deb/debian/mutt?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.4.0"}]}],"ecosystem_specific":{"urgency":"not yet assigned"},"database_specific":{"source":"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2003-0167.json"}},{"package":{"name":"mutt","ecosystem":"Debian:12","purl":"pkg:deb/debian/mutt?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.4.0"}]}],"ecosystem_specific":{"urgency":"not yet assigned"},"database_specific":{"source":"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2003-0167.json"}},{"package":{"name":"mutt","ecosystem":"Debian:13","purl":"pkg:deb/debian/mutt?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.4.0"}]}],"ecosystem_specific":{"urgency":"not yet assigned"},"database_specific":{"source":"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2003-0167.json"}},{"package":{"name":"mutt","ecosystem":"Debian:14","purl":"pkg:deb/debian/mutt?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.4.0"}]}],"ecosystem_specific":{"urgency":"not yet assigned"},"database_specific":{"source":"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2003-0167.json"}}],"schema_version":"1.7.5"}