Slackware 8.1 / 9.0 : Mutt buffer overflow in IMAP support

High Nessus Plugin ID 54859


The remote Slackware host is missing a security update.


The mutt mail client packages in Slackware 8.1 and 9.0 have been upgraded to mutt-1.4.1i to fix a security problem discovered by Core Security Technologies. This issue may allow a remote attacker controlling a malicious IMAP server to execute code on your machine as the user running mutt if you connect to the IMAP server using mutt.
All sites running mutt are advised to upgrade.


Update the affected mutt package.

See Also

Plugin Details

Severity: High

ID: 54859

File Name: Slackware_c49545d06f5284313c545de2a6416a0e.nasl

Version: $Revision: 1.5 $

Type: local

Published: 2011/05/28

Modified: 2013/06/01

Dependencies: 12634

Risk Information

Risk Factor: High

Vulnerability Information

CPE: p-cpe:/a:slackware:slackware_linux:mutt, cpe:/o:slackware:slackware_linux:8.1, cpe:/o:slackware:slackware_linux:9.0

Required KB Items: Host/local_checks_enabled, Host/Slackware/release, Host/Slackware/packages

Patch Publication Date: 2003/03/29