mutt is vulnerable to arbitrary code execution. A flaw was found in the way Mutt handled certain characters in gecos fields which could lead to a buffer overflow. The gecos field is an entry in the password database typically used to record general information about the user. A local attacker could give themselves a carefully crafted “Real Name” which could execute arbitrary code if a victim uses Mutt and expands the attackers alias.
dev.mutt.org/trac/ticket/2885
osvdb.org/34973
secunia.com/advisories/25408
secunia.com/advisories/25515
secunia.com/advisories/25529
secunia.com/advisories/25546
secunia.com/advisories/26415
www.mandriva.com/security/advisories?name=MDKSA-2007:113
www.redhat.com/security/updates/classification/#moderate
www.redhat.com/support/errata/RHSA-2007-0386.html
www.securityfocus.com/bid/24192
www.securitytracker.com/id?1018066
www.trustix.org/errata/2007/0024/
access.redhat.com/errata/RHSA-2007:0386
bugzilla.redhat.com/bugzilla/show_bug.cgi?id=239890
exchange.xforce.ibmcloud.com/vulnerabilities/34441
issues.rpath.com/browse/RPL-1391
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10543