Mandrake Linux Security Advisory : mutt (MDKSA-2006:115)

High Nessus Plugin ID 21777

Synopsis

The remote Mandrake Linux host is missing one or more security updates.

Description

A stack-based buffer overflow in the browse_get_namespace function in imap/browse.c of Mutt allows remote attackers to cause a denial of service (crash) or execute arbitrary code via long namespaces received from the IMAP server.

Updated packages have been patched to address this issue.

Solution

Update the affected mutt and / or mutt-utf8 packages.

Plugin Details

Severity: High

ID: 21777

File Name: mandrake_MDKSA-2006-115.nasl

Version: 1.14

Type: local

Published: 2006/06/29

Updated: 2018/07/19

Dependencies: 12634

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:mutt, p-cpe:/a:mandriva:linux:mutt-utf8, cpe:/o:mandriva:linux:2006, x-cpe:/o:mandrakesoft:mandrake_linux:le2005

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Patch Publication Date: 2006/06/28

Reference Information

CVE: CVE-2006-3242

MDKSA: 2006:115