Upstream information

CVE-2021-3181 at MITRE

Description

rfc822.c in Mutt through 2.0.4 allows remote attackers to cause a denial of service (mailbox unavailability) by sending email messages with sequences of semicolon characters in RFC822 address fields (aka terminators of empty groups). A small email message from the attacker can cause large memory consumption, and the victim may then be unable to see email messages from other persons.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having moderate severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 4.3
Vector AV:N/AC:M/Au:N/C:N/I:N/A:P
Access Vector Network
Access Complexity Medium
Authentication None
Confidentiality Impact None
Integrity Impact None
Availability Impact Partial
CVSS v3 Scores
  National Vulnerability Database SUSE
Base Score 6.5 6.5
Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Attack Vector Network Network
Attack Complexity Low Low
Privileges Required None None
User Interaction Required Required
Scope Unchanged Unchanged
Confidentiality Impact None None
Integrity Impact None None
Availability Impact High High
CVSSv3 Version 3.1 3.1
SUSE Bugzilla entries: 1181221 [IN_PROGRESS], 1181505 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
Image SLES12-SP4-SAP-Azure
Image SLES12-SP4-SAP-Azure-BYOS
Image SLES12-SP4-SAP-Azure-LI-BYOS-Production
Image SLES12-SP4-SAP-Azure-VLI-BYOS-Production
Image SLES12-SP4-SAP-EC2-HVM
Image SLES12-SP4-SAP-EC2-HVM-BYOS
Image SLES12-SP4-SAP-GCE
Image SLES12-SP4-SAP-GCE-BYOS
Image SLES12-SP4-SAP-OCI-BYOS
Image SLES12-SP5-Azure-SAP-BYOS
Image SLES12-SP5-Azure-SAP-On-Demand
Image SLES12-SP5-EC2-SAP-BYOS
Image SLES12-SP5-EC2-SAP-On-Demand
Image SLES12-SP5-GCE-SAP-BYOS
Image SLES12-SP5-GCE-SAP-On-Demand
Image SLES12-SP5-OCI-BYOS-SAP-BYOS
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production
  • mutt >= 1.10.1-55.24.1
SUSE Enterprise Storage 7.1
SUSE Linux Enterprise Desktop 15 SP3
SUSE Linux Enterprise High Performance Computing 15 SP3
SUSE Linux Enterprise Module for Basesystem 15 SP3
SUSE Linux Enterprise Server 15 SP3
SUSE Linux Enterprise Server for SAP Applications 15 SP3
SUSE Manager Proxy 4.2
SUSE Manager Retail Branch Server 4.2
SUSE Manager Server 4.2
  • mutt >= 1.10.1-3.20.1
  • mutt-doc >= 1.10.1-3.20.1
  • mutt-lang >= 1.10.1-3.20.1
Patchnames:
SUSE Linux Enterprise Module for Basesystem 15 SP3 GA mutt-1.10.1-3.20.1
SUSE Enterprise Storage 7
SUSE Linux Enterprise Desktop 15 SP2
SUSE Linux Enterprise High Performance Computing 15 SP2
SUSE Linux Enterprise Module for Basesystem 15 SP2
SUSE Linux Enterprise Server 15 SP2
SUSE Linux Enterprise Server for SAP Applications 15 SP2
SUSE Manager Proxy 4.1
SUSE Manager Retail Branch Server 4.1
SUSE Manager Server 4.1
  • mutt >= 1.10.1-3.20.1
  • mutt-doc >= 1.10.1-3.20.1
  • mutt-lang >= 1.10.1-3.20.1
Patchnames:
SUSE-SLE-Module-Basesystem-15-SP2-2021-195
SUSE Linux Enterprise Desktop 15 SP4
SUSE Linux Enterprise High Performance Computing 15 SP4
SUSE Linux Enterprise Module for Basesystem 15 SP4
SUSE Linux Enterprise Server 15 SP4
SUSE Linux Enterprise Server for SAP Applications 15 SP4
SUSE Manager Proxy 4.3
SUSE Manager Retail Branch Server 4.3
SUSE Manager Server 4.3
  • mutt >= 1.10.1-150000.3.23.1
  • mutt-doc >= 1.10.1-150000.3.23.1
  • mutt-lang >= 1.10.1-150000.3.23.1
Patchnames:
SUSE Linux Enterprise Module for Basesystem 15 SP4 GA mutt-1.10.1-150000.3.23.1
SUSE Linux Enterprise Server 12 SP5
SUSE Linux Enterprise Server for SAP Applications 12 SP5
  • mutt >= 1.10.1-55.24.1
Patchnames:
SUSE-SLE-SERVER-12-SP5-2021-196
openSUSE Leap 15.1
  • mutt >= 1.10.1-lp151.2.15.1
  • mutt-doc >= 1.10.1-lp151.2.15.1
  • mutt-lang >= 1.10.1-lp151.2.15.1
Patchnames:
openSUSE-2021-161
openSUSE Leap 15.2
  • mutt >= 1.10.1-lp152.3.15.1
  • mutt-doc >= 1.10.1-lp152.3.15.1
  • mutt-lang >= 1.10.1-lp152.3.15.1
Patchnames:
openSUSE-2021-162
openSUSE Tumbleweed
  • mutt >= 2.0.7-2.2
  • mutt-doc >= 2.0.7-2.2
  • mutt-lang >= 2.0.7-2.2
Patchnames:
openSUSE Tumbleweed GA mutt-2.0.7-2.2


First public cloud image revisions this CVE is fixed in:


Status of this issue by product and package

Please note that this evaluation state might be work in progress, incomplete or outdated. Also information for service packs in the LTSS phase is only included for issues meeting the LTSS criteria. If in doubt, feel free to contact us for clarification.

Product(s) Source package State
HPE Helion OpenStack 8 mutt Released
SUSE CaaS Platform 4.0 mutt Released
SUSE Enterprise Storage 5 mutt Released
SUSE Enterprise Storage 6 mutt Released
SUSE Enterprise Storage 7 mutt Released
SUSE Enterprise Storage 7.1 mutt Affected
SUSE Linux Enterprise Desktop 12 mutt Affected
SUSE Linux Enterprise Desktop 12 SP1 mutt Affected
SUSE Linux Enterprise Desktop 12 SP2 mutt Affected
SUSE Linux Enterprise Desktop 12 SP3 mutt Affected
SUSE Linux Enterprise Desktop 12 SP4 mutt Affected
SUSE Linux Enterprise Desktop 15 mutt Affected
SUSE Linux Enterprise Desktop 15 SP1 mutt Released
SUSE Linux Enterprise Desktop 15 SP2 mutt Released
SUSE Linux Enterprise Desktop 15 SP3 mutt Affected
SUSE Linux Enterprise Desktop 15 SP4 mutt Affected
SUSE Linux Enterprise High Performance Computing 12 SP5 mutt Released
SUSE Linux Enterprise High Performance Computing 15 mutt Affected
SUSE Linux Enterprise High Performance Computing 15 SP1 mutt Released
SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS mutt Affected
SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS mutt Released
SUSE Linux Enterprise High Performance Computing 15 SP2 mutt Released
SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS mutt Affected
SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS mutt Affected
SUSE Linux Enterprise High Performance Computing 15 SP3 mutt Affected
SUSE Linux Enterprise High Performance Computing 15 SP4 mutt Affected
SUSE Linux Enterprise High Performance Computing 15-ESPOS mutt Affected
SUSE Linux Enterprise High Performance Computing 15-LTSS mutt Released
SUSE Linux Enterprise Module for Basesystem 15 mutt Affected
SUSE Linux Enterprise Module for Basesystem 15 SP1 mutt Released
SUSE Linux Enterprise Module for Basesystem 15 SP2 mutt Released
SUSE Linux Enterprise Module for Basesystem 15 SP3 mutt Affected
SUSE Linux Enterprise Module for Basesystem 15 SP4 mutt Affected
SUSE Linux Enterprise Point of Service 11 SP3 mutt Released
SUSE Linux Enterprise Point of Service Image Server 12 SP2 mutt Released
SUSE Linux Enterprise Real Time 15 SP2 mutt Affected
SUSE Linux Enterprise Real Time 15 SP3 mutt Affected
SUSE Linux Enterprise Server 11 SP3 mutt Affected
SUSE Linux Enterprise Server 11 SP3-LTSS mutt Affected
SUSE Linux Enterprise Server 11 SP4 mutt Affected
SUSE Linux Enterprise Server 11 SP4 LTSS mutt Released
SUSE Linux Enterprise Server 11 SP4-LTSS mutt Affected
SUSE Linux Enterprise Server 12 mutt Affected
SUSE Linux Enterprise Server 12 SP1 mutt Affected
SUSE Linux Enterprise Server 12 SP1-LTSS mutt Affected
SUSE Linux Enterprise Server 12 SP2 mutt Affected
SUSE Linux Enterprise Server 12 SP2-BCL mutt Released
SUSE Linux Enterprise Server 12 SP2-ESPOS mutt Released
SUSE Linux Enterprise Server 12 SP2-LTSS mutt Released
SUSE Linux Enterprise Server 12 SP3 mutt Affected
SUSE Linux Enterprise Server 12 SP3-BCL mutt Released
SUSE Linux Enterprise Server 12 SP3-ESPOS mutt Released
SUSE Linux Enterprise Server 12 SP3-LTSS mutt Released
SUSE Linux Enterprise Server 12 SP4 mutt Affected
SUSE Linux Enterprise Server 12 SP4-ESPOS mutt Released
SUSE Linux Enterprise Server 12 SP4-LTSS mutt Released
SUSE Linux Enterprise Server 12 SP5 mutt Released
SUSE Linux Enterprise Server 12-LTSS mutt Affected
SUSE Linux Enterprise Server 15 mutt Affected
SUSE Linux Enterprise Server 15 SP1 mutt Released
SUSE Linux Enterprise Server 15 SP1-BCL mutt Affected
SUSE Linux Enterprise Server 15 SP1-LTSS mutt Released
SUSE Linux Enterprise Server 15 SP2 mutt Released
SUSE Linux Enterprise Server 15 SP2-BCL mutt Affected
SUSE Linux Enterprise Server 15 SP2-LTSS mutt Affected
SUSE Linux Enterprise Server 15 SP3 mutt Affected
SUSE Linux Enterprise Server 15 SP4 mutt Affected
SUSE Linux Enterprise Server 15-ESPOS mutt Released
SUSE Linux Enterprise Server 15-LTSS mutt Released
SUSE Linux Enterprise Server Business Critical Linux 15 SP1 mutt Released
SUSE Linux Enterprise Server for Raspberry Pi 12 SP2 mutt Affected
SUSE Linux Enterprise Server for SAP Applications 12 SP1 mutt Affected
SUSE Linux Enterprise Server for SAP Applications 12 SP2 mutt Released
SUSE Linux Enterprise Server for SAP Applications 12 SP3 mutt Released
SUSE Linux Enterprise Server for SAP Applications 12 SP4 mutt Released
SUSE Linux Enterprise Server for SAP Applications 12 SP5 mutt Released
SUSE Linux Enterprise Server for SAP Applications 15 mutt Released
SUSE Linux Enterprise Server for SAP Applications 15 SP1 mutt Released
SUSE Linux Enterprise Server for SAP Applications 15 SP2 mutt Released
SUSE Linux Enterprise Server for SAP Applications 15 SP3 mutt Affected
SUSE Linux Enterprise Server for SAP Applications 15 SP4 mutt Affected
SUSE Manager Proxy 4.0 mutt Released
SUSE Manager Proxy 4.1 mutt Released
SUSE Manager Proxy 4.2 mutt Affected
SUSE Manager Proxy 4.3 mutt Affected
SUSE Manager Retail Branch Server 4.0 mutt Released
SUSE Manager Retail Branch Server 4.1 mutt Released
SUSE Manager Retail Branch Server 4.2 mutt Affected
SUSE Manager Retail Branch Server 4.3 mutt Affected
SUSE Manager Server 4.0 mutt Released
SUSE Manager Server 4.1 mutt Released
SUSE Manager Server 4.2 mutt Affected
SUSE Manager Server 4.3 mutt Affected
SUSE OpenStack Cloud 7 mutt Released
SUSE OpenStack Cloud 8 mutt Released
SUSE OpenStack Cloud 9 mutt Released
SUSE OpenStack Cloud Crowbar 8 mutt Released
SUSE OpenStack Cloud Crowbar 9 mutt Released


SUSE Timeline for this CVE

CVE page created: Tue Jan 19 19:09:01 2021
CVE page last modified: Wed Nov 30 23:54:08 2022