Lucene search

K
gentooGentoo FoundationGLSA-200606-27
HistoryJun 28, 2006 - 12:00 a.m.

Mutt: Buffer overflow

2006-06-2800:00:00
Gentoo Foundation
security.gentoo.org
22

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.241

Percentile

96.6%

Background

Mutt is a small but very powerful text-based mail client.

Description

TAKAHASHI Tamotsu has discovered that Mutt contains a boundary error in the β€œbrowse_get_namespace()” function in browse.c, which can be triggered when receiving an overly long namespace from an IMAP server.

Impact

A malicious IMAP server can send an overly long namespace to Mutt in order to crash the application, and possibly execute arbitrary code with the permissions of the user running Mutt.

Workaround

There is no known workaround at this time.

Resolution

All Mutt users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=mail-client/mutt-1.5.11-r2"
OSVersionArchitecturePackageVersionFilename
Gentooanyallmail-client/mutt<Β 1.5.11-r2UNKNOWN

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.241

Percentile

96.6%