RHEL 3 / 4 / 5 : mutt (RHSA-2007:0386)

Low Nessus Plugin ID 25404

Synopsis

The remote Red Hat host is missing a security update.

Description

An updated mutt package that fixes several security bugs is now available for Red Hat Enterprise Linux 3, 4 and 5.

This update has been rated as having moderate security impact by the Red Hat Security Response Team.

Mutt is a text-mode mail user agent.

A flaw was found in the way Mutt used temporary files on NFS file systems. Due to an implementation issue in the NFS protocol, Mutt was not able to exclusively open a new file. A local attacker could conduct a time-dependent attack and possibly gain access to e-mail attachments opened by a victim. (CVE-2006-5297)

A flaw was found in the way Mutt processed certain APOP authentication requests. By sending certain responses when mutt attempted to authenticate against an APOP server, a remote attacker could potentially acquire certain portions of a user's authentication credentials. (CVE-2007-1558)

A flaw was found in the way Mutt handled certain characters in gecos fields which could lead to a buffer overflow. The gecos field is an entry in the password database typically used to record general information about the user. A local attacker could give themselves a carefully crafted 'Real Name' which could execute arbitrary code if a victim uses Mutt and expands the attackers alias. (CVE-2007-2683)

All users of mutt should upgrade to this updated package, which contains a backported patches to correct these issues.

Solution

Update the affected mutt package.

See Also

https://access.redhat.com/security/cve/cve-2006-5297

https://access.redhat.com/security/cve/cve-2007-1558

https://access.redhat.com/security/cve/cve-2007-2683

https://access.redhat.com/errata/RHSA-2007:0386

Plugin Details

Severity: Low

ID: 25404

File Name: redhat-RHSA-2007-0386.nasl

Version: 1.22

Type: local

Agent: unix

Published: 2007/06/04

Updated: 2019/09/17

Dependencies: 12634

Risk Information

Risk Factor: Low

CVSS v2.0

Base Score: 3.5

Temporal Score: 2.7

Vector: CVSS2#AV:L/AC:H/Au:S/C:P/I:P/A:P

Temporal Vector: CVSS2#E:POC/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:mutt, cpe:/o:redhat:enterprise_linux:3, cpe:/o:redhat:enterprise_linux:4, cpe:/o:redhat:enterprise_linux:4.5, cpe:/o:redhat:enterprise_linux:5

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2007/06/04

Vulnerability Publication Date: 2006/10/16

Reference Information

CVE: CVE-2006-5297, CVE-2007-1558, CVE-2007-2683

BID: 23257

RHSA: 2007:0386