FreeBSD : mutt -- buffer overflow vulnerability (863f95d3-3df1-11dc-b3d3-0016179b2dd5)

low Nessus Plugin ID 25804

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

Securityfocus reports :

Mutt is prone to a local buffer-overflow vulnerability because it fails to properly bounds-check user-supplied input before using it in a memory copy operation. An attacker can exploit this issue to execute arbitrary code with the with the privileges of the victim. Failed exploit attempts will result in a denial of service.

Solution

Update the affected packages.

See Also

https://www.redhat.com/en/services/support

http://www.nessus.org/u?5615114d

Plugin Details

Severity: Low

ID: 25804

File Name: freebsd_pkg_863f95d33df111dcb3d30016179b2dd5.nasl

Version: 1.15

Type: local

Published: 7/30/2007

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.6

CVSS v2

Risk Factor: Low

Base Score: 3.5

Temporal Score: 2.7

Vector: CVSS2#AV:L/AC:H/Au:S/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:ja-mutt, p-cpe:/a:freebsd:freebsd:mutt, p-cpe:/a:freebsd:freebsd:mutt-lite, p-cpe:/a:freebsd:freebsd:zh-mutt, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 7/29/2007

Vulnerability Publication Date: 5/28/2007

Reference Information

CVE: CVE-2007-2683

BID: 24192