FreeBSD : mutt -- buffer overflow vulnerability (863f95d3-3df1-11dc-b3d3-0016179b2dd5)

Low Nessus Plugin ID 25804


The remote FreeBSD host is missing one or more security-related updates.


Securityfocus reports :

Mutt is prone to a local buffer-overflow vulnerability because it fails to properly bounds-check user-supplied input before using it in a memory copy operation. An attacker can exploit this issue to execute arbitrary code with the with the privileges of the victim. Failed exploit attempts will result in a denial of service.


Update the affected packages.

See Also

Plugin Details

Severity: Low

ID: 25804

File Name: freebsd_pkg_863f95d33df111dcb3d30016179b2dd5.nasl

Version: $Revision: 1.11 $

Type: local

Published: 2007/07/30

Modified: 2013/06/22

Dependencies: 12634

Risk Information

Risk Factor: Low


Base Score: 3.5

Temporal Score: 2.7

Vector: CVSS2#AV:L/AC:H/Au:S/C:P/I:P/A:P

Temporal Vector: CVSS2#E:POC/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:ja-mutt, p-cpe:/a:freebsd:freebsd:mutt, p-cpe:/a:freebsd:freebsd:mutt-lite, p-cpe:/a:freebsd:freebsd:zh-mutt, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2007/07/29

Vulnerability Publication Date: 2007/05/28

Reference Information

CVE: CVE-2007-2683

BID: 24192