Slackware current : mutt remote exploit patched

High Nessus Plugin ID 54850


The remote Slackware host is missing a security update.


An exploitable overflow has been found in the address handling code of the mutt mail client version 1.2.5i supplied with Slackware 8.0. A new mutt- has been released which addresses this problem, and packages are now available for Slackware 8.0 and -current. We urge all Slackware users to upgrade to this new version of mutt as soon as possible.


Update the affected mutt package.

See Also

Plugin Details

Severity: High

ID: 54850

File Name: Slackware_3daceab82a1391a620c43d0172ec339c.nasl

Version: $Revision: 1.5 $

Type: local

Published: 2011/05/28

Modified: 2013/06/01

Dependencies: 12634

Risk Information

Risk Factor: High

Vulnerability Information

CPE: p-cpe:/a:slackware:slackware_linux:mutt, cpe:/o:slackware:slackware_linux

Required KB Items: Host/local_checks_enabled, Host/Slackware/release, Host/Slackware/packages

Patch Publication Date: 2002/01/07