SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (E-mail Client)  >   Mutt Vendors:   Mutt.org
Mutt Buffer Overflow May Cause Arbitrary Code to Be Executed When Downloading Mail
SecurityTracker Alert ID:  1006330
SecurityTracker URL:  http://securitytracker.com/id/1006330
CVE Reference:   CVE-2003-0140   (Links to External Site)
Date:  Mar 20 2003
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 1.4.1
Description:   A buffer overflow vulnerability was reported in the Mutt e-mail client. A remote IMAP server may be able to cause arbitrary code to be executed on the target client when the client downloads mail from the server.

The buffer overflow reportedly resides in the IMAP client code.

The report credits CORE Security with discovering the flaw.

Impact:   A remote server can cause arbitrary code to be executed on the target user's e-mail client when the client retrieves mail from the server.
Solution:   The vendor has released fixed versions (1.4.1 of the stable branch, 1.5.4 of the development branch). The code will be available shortly at:

ftp://ftp.mutt.org/mutt/

Vendor URL:  www.mutt.org/ (Links to External Site)
Cause:   Boundary error
Underlying OS:  Linux (Any), UNIX (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
(SuSE Issues Fix) Mutt Buffer Overflow May Cause Arbitrary Code to Be Executed When Downloading Mail
SuSE has released a fix.
(Debian Issues Fix) Mutt Buffer Overflow May Cause Arbitrary Code to Be Executed When Downloading Mail
Debian has released a fix.
(Slackware Issues Fix) Mutt Buffer Overflow May Cause Arbitrary Code to Be Executed When Downloading Mail
Slackware has released a fix.
(Red Hat Issues Fix) Mutt Buffer Overflow May Cause Arbitrary Code to Be Executed When Downloading Mail
Red Hat has released a fix for Mutt.
(Red Hat Issues Fix for Balsa) Mutt Buffer Overflow May Cause Arbitrary Code to Be Executed When Downloading Mail
The vendor has released a fix.
(Conectiva Issues Fix) Mutt Buffer Overflow May Cause Arbitrary Code to Be Executed When Downloading Mail
Conectiva has released a fix.
(Conectiva Issues Fix for Balsa) Mutt Buffer Overflow May Cause Arbitrary Code to Be Executed When Downloading Mail
Conectiva has released a fix for Balsa.



 Source Message Contents

Subject:  mutt-1.4.1 fixes a buffer overflow.


--mP3DRpeJDSE+ciuQ
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

Mutt versions 1.4.1 and 1.5.4 have just been released and will soon
be available from ftp://ftp.mutt.org/mutt/.

Both versions fix a buffer overflow in mutt's IMAP client code which
was identified by Core Security Technologies, and fixed by Edmund
Grimley Evans.  A more detailed advisory will be published by Core
Security.

Version 1.4.1 is a release on mutt's stable branch.  The only
differences against 1.4 are a number of bug fixes.  If you are
currently using mutt 1.4, it's probably a very good idea to update.

Version 1.5.4 is a snapshot of mutt's unstable branch, and may be
interesting to those brave souls who would like to play with the
latest features.  (Or want to help us to identify some bugs in that
code.)


--=20
Thomas Roessler                        <roessler@does-not-exist.org>

--mP3DRpeJDSE+ciuQ
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iQEVAwUBPnj6ItImKUTOasbBAQJDnQgAvqFMClSrFBMuuBKAW51UIa0w64pDYLEp
ewyozzXZF+0UayIV+zelvsfVqRp1537y74iDq97aJifTvsjh9EcZ1rbgWzQwNTQU
FQXCQGgwuKDm4yX3w4qVBO3ebo0m5jnTQjTyuMJyKNjpaLtXlf3h9dv1F0S9fNDw
6mO4j+HDpDE6sEK+qwfluiW14TZ4+agTx6bZ8PZuCfozqW7e9t0Yw/IIvHbE+c2q
EzorZ5Vcooq3krnCeYgjZfA57NzsTG1jrl6fsDYggJitYx7FuUia8VpXZ7xMi4Aq
l/KTCCNCPPW0+BXZRX4xmx0dDqmUQUnnV/eoMmN3pAFPMwzxVV76uA==
=Ev2i
-----END PGP SIGNATURE-----

--mP3DRpeJDSE+ciuQ--

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC