Bug 907453 (CVE-2014-9116) - VUL-0: CVE-2014-9116: mutt: heap-based buffer overflow in mutt_substrdup()
Summary: VUL-0: CVE-2014-9116: mutt: heap-based buffer overflow in mutt_substrdup()
Status: RESOLVED FIXED
Alias: CVE-2014-9116
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Major
Target Milestone: ---
Deadline: 2015-04-07
Assignee: Dr. Werner Fink
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/111071/
Whiteboard: maint:released:sle11-sp1:61025 maint...
Keywords:
Depends on:
Blocks:
 
Reported: 2014-11-27 09:39 UTC by Victor Pereira
Modified: 2015-04-24 08:05 UTC (History)
4 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments
CVE-2014-9116 reproducer mbox (84 bytes, application/x-gzip)
2014-12-15 09:57 UTC, Alexander Bergmann
Details

Note You need to log in before you can comment on or make changes to this bug.
Description Victor Pereira 2014-11-27 09:39:12 UTC
CVE-2014-9116

A heap-based buffer overflow flaw was reported in the mutt_substrdup() function in Mutt. Opening a specially-crafted mail message could cause mutt to crash or, potentially, execute arbitrary code.




References:
https://bugzilla.redhat.com/show_bug.cgi?id=1168463
Comment 1 Swamp Workflow Management 2014-11-27 23:00:23 UTC
bugbot adjusting priority
Comment 2 Dr. Werner Fink 2014-12-04 12:43:30 UTC
Hmmm ... IMHO SLES 11 is nt affected.  I'd like to see a reproducer
Comment 3 Dr. Werner Fink 2014-12-04 12:51:11 UTC
(In reply to Dr. Werner Fink from comment #2)

The same for SLE-10-SP3 and later ... reason: then function write_one_header() does not exist and the function mutt_write_one_header() is totally different from mutt-1.5.21
Comment 5 Bernhard Wiedemann 2014-12-04 13:00:28 UTC
This is an autogenerated message for OBS integration:
This bug (907453) was mentioned in
https://build.opensuse.org/request/show/264030 12.3 / mutt
https://build.opensuse.org/request/show/264031 13.1 / mutt
https://build.opensuse.org/request/show/264032 13.2 / mutt
Comment 7 Alexander Bergmann 2014-12-15 09:57:07 UTC
Created attachment 617079 [details]
CVE-2014-9116 reproducer mbox


1. Create user crasher.
   #> useradd -m crasher
2. Copy reproduer file to the spool directory and change ownership.
   #> gunzip -c crasher.mbox.gz > /var/spool/mail/crasher
   #> chown crasher:mail /var/spool/mail/crasher
3. Use user crasher, open the email and show header information.
   #> su - crasher
   #> mutt

I've tested this already with SLES-11-SP3 and the system is not vulnarable. Same should go for SLES-11-SP1 and SLES-10-SP3 but wasn't tested by me.
Comment 8 Swamp Workflow Management 2014-12-15 12:05:08 UTC
openSUSE-SU-2014:1635-1: An update that fixes one vulnerability is now available.

Category: security (moderate)
Bug References: 907453
CVE References: CVE-2014-9116
Sources used:
openSUSE 13.2 (src):    mutt-1.5.21-44.4.1
openSUSE 13.1 (src):    mutt-1.5.21-41.8.1
openSUSE 12.3 (src):    mutt-1.5.21-36.20.1
Comment 9 Alexander Bergmann 2015-01-06 13:08:48 UTC
Additional note to comment 7:

To get the mutt "Segmentation fault" it is necessary to open the email inside the reproducer spool file from "jwilk@jwilk.net" - just select it via cursor and hit enter. Then press 'h' for viewing the header information. That should trigger the crash.
Comment 10 Swamp Workflow Management 2015-01-06 17:05:06 UTC
SUSE-SU-2015:0012-1: An update that solves one vulnerability and has one errata is now available.

Category: security (important)
Bug References: 899712,907453
CVE References: CVE-2014-9116
Sources used:
SUSE Linux Enterprise Server 12 (src):    mutt-1.5.21-49.1
SUSE Linux Enterprise Desktop 12 (src):    mutt-1.5.21-49.1
Comment 12 Johannes Segitz 2015-02-12 08:36:17 UTC
all updates released
Comment 15 Swamp Workflow Management 2015-03-09 23:38:02 UTC
An update workflow for this issue was started.
This issue was rated as low.
Please submit fixed packages until 2015-04-07.
When done, reassign the bug to security-team@suse.de.
https://swamp.suse.de/webswamp/wf/61011
Comment 16 Swamp Workflow Management 2015-04-23 20:05:13 UTC
SUSE-SU-2015:0758-1: An update that solves one vulnerability and has one errata is now available.

Category: security (low)
Bug References: 905481,907453
CVE References: CVE-2014-9116
Sources used:
SUSE Linux Enterprise Server 11 SP3 for VMware (src):    mutt-1.5.17-42.39.1
SUSE Linux Enterprise Server 11 SP3 (src):    mutt-1.5.17-42.39.1
SUSE Linux Enterprise Desktop 11 SP3 (src):    mutt-1.5.17-42.39.1