Scientific Linux Security Update : mutt on SL5.x, SL4.x, SL3.x i386/x86_64

Low Nessus Plugin ID 60195

New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.

VPR Score: 6.6

Synopsis

The remote Scientific Linux host is missing a security update.

Description

A flaw was found in the way Mutt used temporary files on NFS file systems. Due to an implementation issue in the NFS protocol, Mutt was not able to exclusively open a new file. A local attacker could conduct a time-dependent attack and possibly gain access to e-mail attachments opened by a victim. (CVE-2006-5297)

A flaw was found in the way Mutt processed certain APOP authentication requests. By sending certain responses when mutt attempted to authenticate against an APOP server, a remote attacker could potentially acquire certain portions of a user's authentication credentials. (CVE-2007-1558)

A flaw was found in the way Mutt handled certain characters in gecos fields which could lead to a buffer overflow. The gecos field is an entry in the password database typically used to record general information about the user. A local attacker could give themselves a carefully crafted 'Real Name' which could execute arbitrary code if a victim uses Mutt and expands the attackers alias. (CVE-2007-2683)

Solution

Update the affected mutt package.

See Also

http://www.nessus.org/u?57a3a75e

Plugin Details

Severity: Low

ID: 60195

File Name: sl_20070604_mutt_on_SL5_x.nasl

Version: 1.5

Type: local

Agent: unix

Published: 2012/08/01

Updated: 2021/01/14

Dependencies: 12634

Risk Information

Risk Factor: Low

VPR Score: 6.6

CVSS v2.0

Base Score: 3.5

Vector: CVSS2#AV:L/AC:H/Au:S/C:P/I:P/A:P

Vulnerability Information

CPE: x-cpe:/o:fermilab:scientific_linux

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/RedHat/release, Host/RedHat/rpm-list

Patch Publication Date: 2007/06/04

Reference Information

CVE: CVE-2006-5297, CVE-2007-1558, CVE-2007-2683