Index: mail/mutt/Makefile =================================================================== --- mail/mutt/Makefile +++ mail/mutt/Makefile @@ -2,8 +2,7 @@ # $FreeBSD$ PORTNAME= mutt -DISTVERSION= 1.10.0 -PORTREVISION?= 1 +DISTVERSION= 1.10.1 CATEGORIES+= mail ipv6 MASTER_SITES= ftp://ftp.mutt.org/pub/mutt/ \ ftp://ftp.fu-berlin.de/pub/unix/mail/mutt/ \ Index: mail/mutt/distinfo =================================================================== --- mail/mutt/distinfo +++ mail/mutt/distinfo @@ -1,6 +1,6 @@ -TIMESTAMP = 1531128584 -SHA256 (mutt/mutt-1.10.0.tar.gz) = 0215b5f90ef9cc33441a6ca842379b64412ed7f8da83ed68bfaa319179f5535b -SIZE (mutt/mutt-1.10.0.tar.gz) = 4249980 +TIMESTAMP = 1531761572 +SHA256 (mutt/mutt-1.10.1.tar.gz) = 734a3883158ec3d180cf6538d8bd7f685ce641d2cdef657aa0038f76e79a54a0 +SIZE (mutt/mutt-1.10.1.tar.gz) = 4255890 SHA256 (mutt/mutt-1.10.0.vc.greeting) = e33b0659290cfbcff0055a5e3ec0762fed7eb76127e0c29cd00586d62cb92df8 SIZE (mutt/mutt-1.10.0.vc.greeting) = 4560 SHA256 (mutt/patch-1.10.0.vvv.nntp.gz) = 895c168f00cd073234c6cbb0d6972b5b390c64bf9ee5a13f58e0ea0652cabe4a Index: security/vuxml/vuln.xml =================================================================== --- security/vuxml/vuln.xml +++ security/vuxml/vuln.xml @@ -58,6 +58,62 @@ * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> + + mutt -- remote code injection and path traversal vulnerability + + + mutt + 1.10.1 + + + + +

Kevin J. McCarthy reports:

+
+

Fixes a remote code injection vulnerability when "subscribing" + to an IMAP mailbox, either via $imap_check_subscribed, or via the + <subscribe> function in the browser menu. Mutt was generating a + "mailboxes" command and sending that along to the muttrc parser. + However, it was not escaping "`", which executes code and inserts + the result. This would allow a malicious IMAP server to execute + arbitrary code (for $imap_check_subscribed).

+

Fixes POP body caching path traversal vulnerability.

+

Fixes IMAP header caching path traversal vulnerability.

+

CVE-2018-14349 - NO Response Heap Overflow

+

CVE-2018-14350 - INTERNALDATE Stack Overflow

+

CVE-2018-14351 - STATUS Literal Length relative write

+

CVE-2018-14352 - imap_quote_string off-by-one stack overflow

+

CVE-2018-14353 - imap_quote_string int underflow

+

CVE-2018-14354 - imap_subscribe Remote Code Execution

+

CVE-2018-14355 - STATUS mailbox header cache directory traversal

+

CVE-2018-14356 - POP empty UID NULL deref

+

CVE-2018-14357 - LSUB Remote Code Execution

+

CVE-2018-14358 - RFC822.SIZE Stack Overflow

+

CVE-2018-14359 - base64 decode Stack Overflow

+

CVE-2018-14362 - POP Message Cache Directory Traversal

+
+ +
+ + CVE-2018-14349 + CVE-2018-14350 + CVE-2018-14351 + CVE-2018-14352 + CVE-2018-14353 + CVE-2018-14354 + CVE-2018-14355 + CVE-2018-14356 + CVE-2018-14357 + CVE-2018-14358 + CVE-2018-14359 + CVE-2018-14362 + http://lists.mutt.org/pipermail/mutt-announce/Week-of-Mon-20180716/000004.html + + + 2018-07-15 + 2018-07-17 + +
jenkins -- multiple vulnerabilities @@ -172,6 +228,63 @@ + + mutt -- remote code injection and path traversal vulnerability + + + mutt + 1.10.1 + + + + +

Kevin J. McCarthy reports:

+
+

Fixes a remote code injection vulnerability when "subscribing" + to an IMAP mailbox, either via $imap_check_subscribed, or via the + <subscribe> function in the browser menu. Mutt was generating a + "mailboxes" command and sending that along to the muttrc parser. + However, it was not escaping "`", which executes code and inserts + the result. This would allow a malicious IMAP server to execute + arbitrary code (for $imap_check_subscribed).

+

Fixes POP body caching path traversal vulnerability.

+

Fixes IMAP header caching path traversal vulnerability.

+

CVE-2018-14349 - NO Response Heap Overflow

+

CVE-2018-14350 - INTERNALDATE Stack Overflow

+

CVE-2018-14351 - STATUS Literal Length relative write

+

CVE-2018-14352 - imap_quote_string off-by-one stack overflow

+

CVE-2018-14353 - imap_quote_string int underflow

+

CVE-2018-14354 - imap_subscribe Remote Code Execution

+

CVE-2018-14355 - STATUS mailbox header cache directory traversal

+

CVE-2018-14356 - POP empty UID NULL deref

+

CVE-2018-14357 - LSUB Remote Code Execution

+

CVE-2018-14358 - RFC822.SIZE Stack Overflow

+

CVE-2018-14359 - base64 decode Stack Overflow

+

CVE-2018-14362 - POP Message Cache Directory Traversal

+
+ +
+ + CVE-2018-14349 + CVE-2018-14350 + CVE-2018-14351 + CVE-2018-14352 + CVE-2018-14353 + CVE-2018-14354 + CVE-2018-14355 + CVE-2018-14356 + CVE-2018-14357 + CVE-2018-14358 + CVE-2018-14359 + CVE-2018-14362 + http://lists.mutt.org/pipermail/mutt-announce/Week-of-Mon-20180716/000004.html + + + 2018-07-15 + 2018-07-17 + +
+ typo3 -- multiple vulnerabilities