Vulnerability Details : CVE-2021-3181
rfc822.c in Mutt through 2.0.4 allows remote attackers to cause a denial of service (mailbox unavailability) by sending email messages with sequences of semicolon characters in RFC822 address fields (aka terminators of empty groups). A small email message from the attacker can cause large memory consumption, and the victim may then be unable to see email messages from other persons.
Vulnerability category: Denial of service
Products affected by CVE-2021-3181
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
- cpe:2.3:a:mutt:mutt:*:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-3181
0.91%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 83 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-3181
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:N/A:P |
8.6
|
2.9
|
NIST | |
6.5
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |
2.8
|
3.6
|
NIST |
CWE ids for CVE-2021-3181
-
The product does not sufficiently track and release allocated memory after it has been used, which slowly consumes remaining memory.Assigned by: nvd@nist.gov (Primary)
References for CVE-2021-3181
-
https://www.debian.org/security/2021/dsa-4838
Debian -- Security Information -- DSA-4838-1 muttThird Party Advisory
-
https://gitlab.com/muttmua/mutt/-/commit/d4305208955c5cdd9fe96dfa61e7c1e14e176a14
Add group terminator if it is left off. (d4305208) · Commits · Mutt Project / mutt · GitLabPatch;Third Party Advisory
-
https://gitlab.com/muttmua/mutt/-/commit/939b02b33ae29bc0d642570c1dcfd4b339037d19
Don't allocate a group terminator unless we are in a group-list. (939b02b3) · Commits · Mutt Project / mutt · GitLabPatch;Third Party Advisory
-
https://security.gentoo.org/glsa/202101-25
Mutt: Denial of service (GLSA 202101-25) — Gentoo securityThird Party Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P2OMLQKAOHPYQA4GI7ZUO6UKCPUHLYO7/
[SECURITY] Fedora 33 Update: mutt-2.0.5-1.fc33 - package-announce - Fedora Mailing-ListsMailing List;Third Party Advisory
-
https://lists.debian.org/debian-lts-announce/2021/01/msg00017.html
[SECURITY] [DLA 2529-1] mutt security updateMailing List;Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2021/01/27/3
oss-security - glibc iconv crash with ISO-2022-JP-3Mailing List;Third Party Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DXGWXFO77HBCD3VYEIYHHYU33LYWWWNQ/
[SECURITY] Fedora 32 Update: mutt-2.0.5-1.fc32 - package-announce - Fedora Mailing-ListsMailing List;Third Party Advisory
-
https://gitlab.com/muttmua/mutt/-/issues/323
rfc822 group recipient parsing leaks memory (#323) · Issues · Mutt Project / mutt · GitLabThird Party Advisory
-
https://gitlab.com/muttmua/mutt/-/commit/4a2becbdb4422aaffe3ce314991b9d670b7adf17
Fix memory leak parsing group addresses without a display name. (4a2becbd) · Commits · Mutt Project / mutt · GitLabPatch;Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2021/01/19/10
oss-security - Re: mutt recipient parsing memory leakMailing List;Third Party Advisory
Jump to