Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (E-mail Client)  >   Mutt Vendors:
(Trustix Issues Fix) Mutt Index Menu Code Lets Remote Users Crash the Client
SecurityTracker Alert ID:  1009041
SecurityTracker URL:
CVE Reference:   CVE-2004-0078   (Links to External Site)
Date:  Feb 13 2004
Impact:   Denial of service via network, Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 1.4.1
Description:   A vulnerability was reported in Mutt. A remote user can cause the target user's mail client to crash and may be able to execute arbitrary code.

It is reported that there is a vulnerability in the index menu code in mutt. A remote user can send a specially crafted e-mail message to the target user that will cause the target user's mutt client to crash (segfault). It may be possible to execute arbitrary code, the report said.

The nature of the flaw was not disclosed.

Impact:   A remote user can cause the target user's mutt client to crash.

It may also be possible for a remote user to cause arbitrary code to be executed on the target user's system.

Solution:   Trustix has released a fix, available at:

Users of the SWUP tool can update automatically using 'swup --upgrade'.

The MD5sums of the packages are:

af3f777eb67ef6c40eacb156f30758a4 2.0/rpms/mutt-1.4.2-1tr.i586.rpm
3af99011808a6eb0132e452077529cf7 2.0/srpms/mutt-1.4.2-1tr.src.rpm

Vendor URL: (Links to External Site)
Cause:   Not specified
Underlying OS:  Linux (Trustix)
Underlying OS Comments:  2.0

Message History:   This archive entry is a follow-up to the message listed below.
Feb 11 2004 Mutt Index Menu Code Lets Remote Users Crash the Client

 Source Message Contents

Subject:  TSLSA-2004-0006 - mutt

Hash: SHA1

- --------------------------------------------------------------------------
Trustix Secure Linux Security Advisory #2004-0006

Package name:      mutt
Summary:           remote crash
Date:              2004-02-13
Affected versions: Trustix 2.0

- --------------------------------------------------------------------------
Package description:
  Mutt is a text mode mail user agent. Mutt supports color, threading,
  arbitrary key remapping, and a lot of customization.

Problem description:
  It was discovered that certain messages would cause mutt to crash.
  Mutt 1.4.2 fixes this bug.  See CAN-2004-0078.

  We recommend that all systems with this package installed be upgraded.
  Please note that if you do not need the functionality provided by this
  package, you may want to remove it from your system.

  All Trustix updates are available from

About Trustix Secure Linux:
  Trustix Secure Linux is a small Linux distribution for servers. With focus
  on security and stability, the system is painlessly kept safe and up to
  date from day one using swup, the automated software updater.

Automatic updates:
  Users of the SWUP tool can enjoy having updates automatically
  installed using 'swup --upgrade'.

Public testing:
  Most updates for Trustix are made available for public testing some time
  before release.
  If you want to contribute by testing the various packages in the
  testing tree, please feel free to share your findings on the
  tsl-discuss mailinglist.
  The testing tree is located at

  You may also use swup for public testing of updates:
  site {
      class = 0
      location = ""
      regexp = ".*"

  Check out our mailing lists:

  This advisory along with all Trustix packages are signed with the
  TSL sign key.
  This key is available from:

  The advisory itself is available from the errata pages at
  or directly at

MD5sums of the packages:
- --------------------------------------------------------------------------
af3f777eb67ef6c40eacb156f30758a4  2.0/rpms/mutt-1.4.2-1tr.i586.rpm
3af99011808a6eb0132e452077529cf7  2.0/srpms/mutt-1.4.2-1tr.src.rpm
- --------------------------------------------------------------------------

Trustix Security Team

Version: GnuPG v1.2.2 (GNU/Linux)

tsl-announce mailing list


Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, LLC