Mutt E-mail Client Buffer Overflow May Let Remote Users Cause Arbitary Commands to Be Executed on the Mutt User's Host
SecurityTracker Alert ID: 1003085|
SecurityTracker URL: http://securitytracker.com/id/1003085
(Links to External Site)
Updated: Jan 2 2002|
Original Entry Date: Jan 2 2002
Execution of arbitrary code via network, User access via network|
Fix Available: Yes Vendor Confirmed: Yes |
Version(s): mutt-1.2.5 and 1.3.24 and prior releases|
A buffer overflow vulnerability was reported in the Mutt e-mail client that may allow remote users to cause arbitrary commands to be executed by another user's Mutt e-mail client.|
It is reported that this vulnerability is remotely exploitable. The bug is apparently due to a one byte buffer overflow. No other details on the vulnerability were provided.
A remote user may be able to create an e-mail message that, when viewed by another user with the Mutt client, will cause arbitrary commands to be executed by the Mutt client with the privileges of the user running Mutt.|
mutt-18.104.22.168 and mutt-1.3.25 have been released to correct the problem. They are available at the Vendor URL or http://www.mutt.org/|
Vendor URL: www.mutt.org/announce/mutt-22.214.171.124-1.3.25.html (Links to External Site)
Linux (Any), UNIX (Any)|
This archive entry has one or more follow-up message(s) listed below.|
Source Message Contents
Date: Tue, 1 Jan 2002 21:40:31 +0100|
Subject: [Announce] SECURITY: mutt-126.96.36.199 and mutt-1.3.25 released.
Content-Type: text/plain; charset=us-ascii; format=flowed
mutt-188.8.131.52 and mutt-1.3.25 have just been released.
These releases both fix a security hole which can be remotely
exploited. The problem was found and a fix suggested by Joost Pol
<email@example.com>. Thanks for that.
mutt-184.108.40.206 is released as an update to the last stable version of
mutt, mutt-1.2.5. The ONLY relevant change in this version is the
fix mentioned above. No other bugs present in 1.2.5 have been
fixed. You only want to upgrade to this version of mutt if you
absolutely have to stick with the mutt-1.2 series.
mutt-1.3.25 is the latest BETA version of mutt, and very close to
what will eventually become mutt-1.4. Personally, I'd recommend
that you download and use this version.
The tar balls, with detached PGP signatures, will be available from
<ftp://ftp.mutt.org/pub/mutt/> in some minutes.
As an alternative, you can apply the patch available from
<ftp://ftp.mutt.org/pub/mutt/patch-1.2,3.rfc822_terminate.1> to any
1.2 or 1.3 series mutt source code, and rebuild.
I apologize for the problem, and wish all of you a happy new year.
Thomas Roessler http://log.does-not-exist.org/
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
-----END PGP SIGNATURE-----