SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (E-mail Client)  >   Mutt Vendors:   Mutt.org
(Conectiva Issues Fix) Mutt Buffer Overflow May Cause Arbitrary Code to Be Executed When Downloading Mail
SecurityTracker Alert ID:  1006572
SecurityTracker URL:  http://securitytracker.com/id/1006572
CVE Reference:   CVE-2003-0140   (Links to External Site)
Date:  Apr 14 2003
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 1.4.1
Description:   A buffer overflow vulnerability was reported in the Mutt e-mail client. A remote IMAP server may be able to cause arbitrary code to be executed on the target client when the client downloads mail from the server.

The buffer overflow reportedly resides in the IMAP client code.

The report credits CORE Security with discovering the flaw.

Impact:   A remote server can cause arbitrary code to be executed on the target user's e-mail client when the client retrieves mail from the server.
Solution:   Conectiva has released a fix.

ftp://atualizacoes.conectiva.com.br/7.0/RPMS/mutt-1.3.17-8U70_2cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/7.0/SRPMS/mutt-1.3.17-8U70_2cl.src.rpm
ftp://atualizacoes.conectiva.com.br/8/RPMS/mutt-1.3.25-2U80_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/8/SRPMS/mutt-1.3.25-2U80_1cl.src.rpm

Vendor URL:  www.mutt.org/ (Links to External Site)
Cause:   Boundary error
Underlying OS:  Linux (Conectiva)
Underlying OS Comments:  7.0, 8

Message History:   This archive entry is a follow-up to the message listed below.
Mar 20 2003 Mutt Buffer Overflow May Cause Arbitrary Code to Be Executed When Downloading Mail



 Source Message Contents

Subject:  [conectiva-updates] [CLA-2003:626] Conectiva Security Announcement - mutt


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
CONECTIVA LINUX SECURITY ANNOUNCEMENT 
- --------------------------------------------------------------------------

PACKAGE   : mutt
SUMMARY   : Buffer overflow in IMAP code
DATE      : 2003-04-14 16:58:00
ID        : CLA-2003:626
RELEVANT
RELEASES  : 7.0, 8

- -------------------------------------------------------------------------

DESCRIPTION
 Mutt[1] is a text-mode email client.
 
 Core Security Technologies discovered[2] a buffer overflow
 vulnerability in the mutt code that handles IMAP folders. An attacker
 who is able to control an IMAP server accessed by mutt can exploit
 this vulnerability to remotely crash the mutt client or to execute
 arbitrary code with the privileges of the user running it.
 
 The Common Vulnerabilities and Exposures (CVE) project has assigned
 the name CAN-2003-0201 to this issue[3].


SOLUTION
 All mutt users should upgrade.
 
 
 REFERENCES
 1.http://www.mutt.org
 2.http://www.coresecurity.com/common/showdoc.php?idx=310&idxseccion=10
 3.http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0140


UPDATED PACKAGES
ftp://atualizacoes.conectiva.com.br/7.0/RPMS/mutt-1.3.17-8U70_2cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/7.0/SRPMS/mutt-1.3.17-8U70_2cl.src.rpm
ftp://atualizacoes.conectiva.com.br/8/RPMS/mutt-1.3.25-2U80_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/8/SRPMS/mutt-1.3.25-2U80_1cl.src.rpm


ADDITIONAL INSTRUCTIONS
 The apt tool can be used to perform RPM packages upgrades:

 - run:                 apt-get update
 - after that, execute: apt-get upgrade

 Detailed instructions reagarding the use of apt and upgrade examples 
 can be found at http://distro.conectiva.com.br/atualizacoes/#apt?idioma=en

- -------------------------------------------------------------------------
All packages are signed with Conectiva's GPG key. The key and instructions
on how to import it can be found at 
http://distro.conectiva.com.br/seguranca/chave/?idioma=en
Instructions on how to check the signatures of the RPM packages can be
found at http://distro.conectiva.com.br/seguranca/politica/?idioma=en

- -------------------------------------------------------------------------
All our advisories and generic update instructions can be viewed at
http://distro.conectiva.com.br/atualizacoes/?idioma=en

- -------------------------------------------------------------------------
Copyright (c) 2003 Conectiva Inc.
http://www.conectiva.com

- -------------------------------------------------------------------------
subscribe: conectiva-updates-subscribe@papaleguas.conectiva.com.br
unsubscribe: conectiva-updates-unsubscribe@papaleguas.conectiva.com.br
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE+mxMl42jd0JmAcZARApb6AJ9nnm238wzqJhBc93AblM9hTQzWsACgvT2y
XEQiflHlDddsvjeWEbYuB9M=
=WAEK
-----END PGP SIGNATURE-----



 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC