Oracle Linux 3 / 4 / 5 : mutt (ELSA-2007-0386)

Low Nessus Plugin ID 67505

New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.

VPR Score: 6.6

Synopsis

The remote Oracle Linux host is missing a security update.

Description

From Red Hat Security Advisory 2007:0386 :

An updated mutt package that fixes several security bugs is now available for Red Hat Enterprise Linux 3, 4 and 5.

This update has been rated as having moderate security impact by the Red Hat Security Response Team.

Mutt is a text-mode mail user agent.

A flaw was found in the way Mutt used temporary files on NFS file systems. Due to an implementation issue in the NFS protocol, Mutt was not able to exclusively open a new file. A local attacker could conduct a time-dependent attack and possibly gain access to e-mail attachments opened by a victim. (CVE-2006-5297)

A flaw was found in the way Mutt processed certain APOP authentication requests. By sending certain responses when mutt attempted to authenticate against an APOP server, a remote attacker could potentially acquire certain portions of a user's authentication credentials. (CVE-2007-1558)

A flaw was found in the way Mutt handled certain characters in gecos fields which could lead to a buffer overflow. The gecos field is an entry in the password database typically used to record general information about the user. A local attacker could give themselves a carefully crafted 'Real Name' which could execute arbitrary code if a victim uses Mutt and expands the attackers alias. (CVE-2007-2683)

All users of mutt should upgrade to this updated package, which contains a backported patches to correct these issues.

Solution

Update the affected mutt package.

See Also

https://oss.oracle.com/pipermail/el-errata/2007-June/000167.html

https://oss.oracle.com/pipermail/el-errata/2007-June/000168.html

https://oss.oracle.com/pipermail/el-errata/2007-June/000216.html

Plugin Details

Severity: Low

ID: 67505

File Name: oraclelinux_ELSA-2007-0386.nasl

Version: 1.10

Type: local

Agent: unix

Published: 2013/07/12

Updated: 2021/01/14

Dependencies: 12634

Risk Information

Risk Factor: Low

VPR Score: 6.6

CVSS v2.0

Base Score: 3.5

Temporal Score: 2.7

Vector: CVSS2#AV:L/AC:H/Au:S/C:P/I:P/A:P

Temporal Vector: CVSS2#E:POC/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:oracle:linux:mutt, cpe:/o:oracle:linux:3, cpe:/o:oracle:linux:4, cpe:/o:oracle:linux:5

Required KB Items: Host/local_checks_enabled, Host/OracleLinux, Host/RedHat/release, Host/RedHat/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2007/06/26

Vulnerability Publication Date: 2006/10/16

Reference Information

CVE: CVE-2006-5297, CVE-2007-1558, CVE-2007-2683

BID: 23257

RHSA: 2007:0386