CVE-2005-2642 The advisory has been revoked - it doesn't affect any version of package mutt  (opens in a new tab)


Threat Intelligence

EPSS
11.68% (96th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN11-MUTT-604165
  • published19 Aug 2020
  • disclosed23 Aug 2005

Introduced: 23 Aug 2005

CVE-2005-2642  (opens in a new tab)

Amendment

The Debian security team deemed this advisory irrelevant for Debian:11.

NVD Description

Note: Versions mentioned in the description apply only to the upstream mutt package and not the mutt package as distributed by Debian.

Buffer overflow in the mutt_decode_xbit function in Handler.c for Mutt 1.5.10 allows remote attackers to execute arbitrary code, possibly due to interactions with libiconv or gettext.