Lucene search

K
ubuntuUbuntuUSN-373-1
HistoryNov 01, 2006 - 12:00 a.m.

mutt vulnerabilities

2006-11-0100:00:00
ubuntu.com
36

CVSS2

1.2

Attack Vector

LOCAL

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:L/AC:H/Au:N/C:N/I:P/A:N

AI Score

6.2

Confidence

Low

EPSS

0

Percentile

10.1%

Releases

  • Ubuntu 6.10
  • Ubuntu 6.06
  • Ubuntu 5.10

Details

Race conditions were discovered in mutt’s handling of temporary files.
Under certain conditions when using a shared temp directory (the
default), other local users could overwrite arbitrary files owned by the
user running mutt. This vulnerability is more likely when the temp
directory is over NFS.

OSVersionArchitecturePackageVersionFilename
Ubuntu6.10noarchmutt< 1.5.12-1ubuntu1.1UNKNOWN
Ubuntu6.06noarchmutt< 1.5.11-3ubuntu2.2UNKNOWN
Ubuntu5.10noarchmutt< 1.5.9-2ubuntu1.2UNKNOWN

CVSS2

1.2

Attack Vector

LOCAL

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:L/AC:H/Au:N/C:N/I:P/A:N

AI Score

6.2

Confidence

Low

EPSS

0

Percentile

10.1%