Mandrake Linux Security Advisory : mutt (MDKSA-2006:115)

high Nessus Plugin ID 21777

Synopsis

The remote Mandrake Linux host is missing one or more security updates.

Description

A stack-based buffer overflow in the browse_get_namespace function in imap/browse.c of Mutt allows remote attackers to cause a denial of service (crash) or execute arbitrary code via long namespaces received from the IMAP server.

Updated packages have been patched to address this issue.

Solution

Update the affected mutt and / or mutt-utf8 packages.

Plugin Details

Severity: High

ID: 21777

File Name: mandrake_MDKSA-2006-115.nasl

Version: 1.16

Type: local

Published: 6/29/2006

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.5

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:mutt, p-cpe:/a:mandriva:linux:mutt-utf8, cpe:/o:mandriva:linux:2006, x-cpe:/o:mandrakesoft:mandrake_linux:le2005

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Patch Publication Date: 6/28/2006

Reference Information

CVE: CVE-2006-3242

MDKSA: 2006:115