vulnerability
FreeBSD: VID-a2f35081-8a02-11e8-8fa5-4437e6ad11c4 (CVE-2018-14362): mutt -- remote code injection and path traversal vulnerability
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:N/AC:L/Au:N/C:P/I:P/A:P) | Jul 17, 2018 | Jul 20, 2018 | Dec 10, 2025 |
Severity
7
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
Jul 17, 2018
Added
Jul 20, 2018
Modified
Dec 10, 2025
Description
Kevin J. McCarthy reports: Fixes a remote code injection vulnerability when "subscribing" to an IMAP mailbox, either via $imap_check_subscribed, or via the <subscribe> function in the browser menu. Mutt was generating a "mailboxes" command and sending that along to the muttrc parser. However, it was not escaping "`", which executes code and inserts the result. This would allow a malicious IMAP server to execute arbitrary code (for $imap_check_subscribed). Fixes POP body caching path traversal vulnerability. Fixes IMAP header caching path traversal vulnerability. CVE-2018-14349 - NO Response Heap Overflow CVE-2018-14350 - INTERNALDATE Stack Overflow CVE-2018-14351 - STATUS Literal Length relative write CVE-2018-14352 - imap_quote_string off-by-one stack overflow CVE-2018-14353 - imap_quote_string int underflow CVE-2018-14354 - imap_subscribe Remote Code Execution CVE-2018-14355 - STATUS mailbox header cache directory traversal CVE-2018-14356 - POP empty UID NULL deref CVE-2018-14357 - LSUB Remote Code Execution CVE-2018-14358 - RFC822.SIZE Stack Overflow CVE-2018-14359 - base64 decode Stack Overflow CVE-2018-14362 - POP Message Cache Directory Traversal
Solutions
freebsd-upgrade-package-muttfreebsd-upgrade-package-neomuttfreebsd-upgrade-package-mutt14
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.