GLSA Advocate
Joined: 12 May 2004 Posts: 2663
|
Posted: Wed Jun 28, 2006 8:26 pm Post subject: [ GLSA 200606-27 ] Mutt: Buffer overflow |
|
|
Gentoo Linux Security Advisory
Title: Mutt: Buffer overflow (GLSA 200606-27)
Severity: normal
Exploitable: remote
Date: June 28, 2006
Bug(s): #138125
ID: 200606-27
Synopsis
Mutt contains a buffer overflow that could result in arbitrary code execution.
Background
Mutt is a small but very powerful text-based mail client.
Affected Packages
Package: mail-client/mutt
Vulnerable: < 1.5.11-r2
Unaffected: >= 1.5.11-r2
Architectures: All supported architectures
Description
TAKAHASHI Tamotsu has discovered that Mutt contains a boundary error in the "browse_get_namespace()" function in browse.c, which can be triggered when receiving an overly long namespace from an IMAP server.
Impact
A malicious IMAP server can send an overly long namespace to Mutt in order to crash the application, and possibly execute arbitrary code with the permissions of the user running Mutt.
Workaround
There is no known workaround at this time.
Resolution
All Mutt users should upgrade to the latest version: Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=mail-client/mutt-1.5.11-r2" |
References
CVE-2006-3242 |
|