CentOS 3 / 4 / 5 : mutt (CESA-2007:0386)

Low Nessus Plugin ID 25403

Synopsis

The remote CentOS host is missing a security update.

Description

An updated mutt package that fixes several security bugs is now available for Red Hat Enterprise Linux 3, 4 and 5.

This update has been rated as having moderate security impact by the Red Hat Security Response Team.

Mutt is a text-mode mail user agent.

A flaw was found in the way Mutt used temporary files on NFS file systems. Due to an implementation issue in the NFS protocol, Mutt was not able to exclusively open a new file. A local attacker could conduct a time-dependent attack and possibly gain access to e-mail attachments opened by a victim. (CVE-2006-5297)

A flaw was found in the way Mutt processed certain APOP authentication requests. By sending certain responses when mutt attempted to authenticate against an APOP server, a remote attacker could potentially acquire certain portions of a user's authentication credentials. (CVE-2007-1558)

A flaw was found in the way Mutt handled certain characters in gecos fields which could lead to a buffer overflow. The gecos field is an entry in the password database typically used to record general information about the user. A local attacker could give themselves a carefully crafted 'Real Name' which could execute arbitrary code if a victim uses Mutt and expands the attackers alias. (CVE-2007-2683)

All users of mutt should upgrade to this updated package, which contains a backported patches to correct these issues.

Solution

Update the affected mutt package.

See Also

http://www.nessus.org/u?dd0b0883

http://www.nessus.org/u?9936db1e

http://www.nessus.org/u?5cb89483

http://www.nessus.org/u?51345981

http://www.nessus.org/u?bb361ced

http://www.nessus.org/u?cfe13dce

http://www.nessus.org/u?74e7828b

http://www.nessus.org/u?8e015e59

Plugin Details

Severity: Low

ID: 25403

File Name: centos_RHSA-2007-0386.nasl

Version: 1.15

Type: local

Agent: unix

Published: 2007/06/04

Updated: 2019/10/03

Dependencies: 12634

Risk Information

Risk Factor: Low

CVSS v2.0

Base Score: 3.5

Temporal Score: 2.7

Vector: CVSS2#AV:L/AC:H/Au:S/C:P/I:P/A:P

Temporal Vector: CVSS2#E:POC/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:centos:centos:mutt, cpe:/o:centos:centos:3, cpe:/o:centos:centos:4, cpe:/o:centos:centos:5

Required KB Items: Host/local_checks_enabled, Host/CentOS/release, Host/CentOS/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2007/06/04

Vulnerability Publication Date: 2006/10/16

Reference Information

CVE: CVE-2006-5297, CVE-2007-1558, CVE-2007-2683

BID: 23257

RHSA: 2007:0386