Oracle Linux 3 / 4 / 5 : mutt (ELSA-2007-0386)

This script is Copyright (C) 2013 Tenable Network Security, Inc.


Synopsis :

The remote Oracle Linux host is missing a security update.

Description :

From Red Hat Security Advisory 2007:0386 :

An updated mutt package that fixes several security bugs is now
available for Red Hat Enterprise Linux 3, 4 and 5.

This update has been rated as having moderate security impact by the
Red Hat Security Response Team.

Mutt is a text-mode mail user agent.

A flaw was found in the way Mutt used temporary files on NFS file
systems. Due to an implementation issue in the NFS protocol, Mutt was
not able to exclusively open a new file. A local attacker could
conduct a time-dependent attack and possibly gain access to e-mail
attachments opened by a victim. (CVE-2006-5297)

A flaw was found in the way Mutt processed certain APOP authentication
requests. By sending certain responses when mutt attempted to
authenticate against an APOP server, a remote attacker could
potentially acquire certain portions of a user's authentication
credentials. (CVE-2007-1558)

A flaw was found in the way Mutt handled certain characters in gecos
fields which could lead to a buffer overflow. The gecos field is an
entry in the password database typically used to record general
information about the user. A local attacker could give themselves a
carefully crafted 'Real Name' which could execute arbitrary code if a
victim uses Mutt and expands the attackers alias. (CVE-2007-2683)

All users of mutt should upgrade to this updated package, which
contains a backported patches to correct these issues.

See also :

https://oss.oracle.com/pipermail/el-errata/2007-June/000168.html
https://oss.oracle.com/pipermail/el-errata/2007-June/000167.html
https://oss.oracle.com/pipermail/el-errata/2007-June/000216.html

Solution :

Update the affected mutt package.

Risk factor :

Low / CVSS Base Score : 3.5
(CVSS2#AV:L/AC:H/Au:S/C:P/I:P/A:P)

Family: Oracle Linux Local Security Checks

Nessus Plugin ID: 67505 ()

Bugtraq ID:

CVE ID: CVE-2006-5297
CVE-2007-1558
CVE-2007-2683