Joined: 12 May 2004
|Posted: Wed Jun 28, 2006 8:26 pm Post subject: [ GLSA 200606-27 ] Mutt: Buffer overflow
|Gentoo Linux Security Advisory
Title: Mutt: Buffer overflow (GLSA 200606-27)
Date: June 28, 2006
Mutt contains a buffer overflow that could result in arbitrary code execution.
Mutt is a small but very powerful text-based mail client.
Vulnerable: < 1.5.11-r2
Unaffected: >= 1.5.11-r2
Architectures: All supported architectures
TAKAHASHI Tamotsu has discovered that Mutt contains a boundary error in the "browse_get_namespace()" function in browse.c, which can be triggered when receiving an overly long namespace from an IMAP server.
A malicious IMAP server can send an overly long namespace to Mutt in order to crash the application, and possibly execute arbitrary code with the permissions of the user running Mutt.
There is no known workaround at this time.
All Mutt users should upgrade to the latest version:
|# emerge --sync
# emerge --ask --oneshot --verbose ">=mail-client/mutt-1.5.11-r2"