Slackware 8.1 / 9.0 : Mutt buffer overflow in IMAP support

high Nessus Plugin ID 54859

Synopsis

The remote Slackware host is missing a security update.

Description

The mutt mail client packages in Slackware 8.1 and 9.0 have been upgraded to mutt-1.4.1i to fix a security problem discovered by Core Security Technologies. This issue may allow a remote attacker controlling a malicious IMAP server to execute code on your machine as the user running mutt if you connect to the IMAP server using mutt.
All sites running mutt are advised to upgrade.

Solution

Update the affected mutt package.

See Also

http://www.coresecurity.com/common/showdoc.php?idx=310&idxseccion=10

http://www.nessus.org/u?a9c6a7e3

Plugin Details

Severity: High

ID: 54859

File Name: Slackware_c49545d06f5284313c545de2a6416a0e.nasl

Version: Revision: 1.5

Type: local

Published: 5/28/2011

Updated: 6/1/2013

Supported Sensors: Nessus

Vulnerability Information

CPE: p-cpe:/a:slackware:slackware_linux:mutt, cpe:/o:slackware:slackware_linux:8.1, cpe:/o:slackware:slackware_linux:9.0

Required KB Items: Host/local_checks_enabled, Host/Slackware/release, Host/Slackware/packages

Patch Publication Date: 3/29/2003