{"id":"MGASA-2014-0141","summary":"Updated mutt package fixes security vulnerability","details":"A heap-based buffer overflow flaw was found in the way mutt processed\ncertain email headers. A remote attacker could use this flaw to send an\nemail with specially crafted headers that, when processed, could cause\nmutt to crash or, potentially, execute arbitrary code with the permissions\nof the user running mutt (CVE-2014-0467).\n","modified":"2026-04-16T06:22:24.993347693Z","published":"2014-03-31T19:30:41Z","upstream":["CVE-2014-0467"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2014-0141.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=13004"},{"type":"WEB","url":"https://rhn.redhat.com/errata/RHSA-2014-0304.html"}],"affected":[{"package":{"name":"mutt","ecosystem":"Mageia:3","purl":"pkg:rpm/mageia/mutt?arch=source&distro=mageia-3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.5.21-10.1.mga3"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2014-0141.json"}},{"package":{"name":"mutt","ecosystem":"Mageia:4","purl":"pkg:rpm/mageia/mutt?arch=source&distro=mageia-4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.5.21-12.1.mga4"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2014-0141.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}