Synopsis
The remote host is vulnerable to a 'format string' vulnerability
Description
The remote host is running a version of the Mutt email client that contains a format string vulnerability. Due to improper handling of input from IMAP servers, it may be possible for a malicious IMAP server to send a specially crafted message to the mutt client that will cause execution of arbitrary code in the context of the mutt user.
Solution
Upgrade to either 1.4.1 or 1.5. Patches/upgrades are available at www.mutt.org
Plugin Details
Risk Information
Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P
Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C
Reference Information
BID: 2502