Debian DSA-096-2 : mutt - buffer overflow

high Nessus Plugin ID 14933

Synopsis

The remote Debian host is missing a security-related update.

Description

Joost Pol found a buffer overflow in the address handling code of mutt (a popular mail user agent). Even though this is a one byte overflow this is exploitable.

This has been fixed upstream in version 1.2.5.1 and 1.3.25. The relevant patch has been added to version 1.2.5-5 of the Debian package.

Solution

Upgrade the affected mutt package.

See Also

http://www.debian.org/security/2002/dsa-096

Plugin Details

Severity: High

ID: 14933

File Name: debian_DSA-096.nasl

Version: 1.17

Type: local

Agent: unix

Published: 9/29/2004

Updated: 1/4/2021

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:mutt, cpe:/o:debian:debian_linux:2.2

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Patch Publication Date: 1/3/2002

Reference Information

CVE: CVE-2002-0001

DSA: 096