blob: 93416ecae5d0967da4db7450ef6d67a2d85a6d6d [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200606-27">
<title>Mutt: Buffer overflow</title>
Mutt contains a buffer overflow that could result in arbitrary code
<product type="ebuild">mutt</product>
<announced>June 28, 2006</announced>
<revised>June 28, 2006: 01</revised>
<package name="mail-client/mutt" auto="yes" arch="*">
<unaffected range="ge">1.5.11-r2</unaffected>
<vulnerable range="lt">1.5.11-r2</vulnerable>
Mutt is a small but very powerful text-based mail client.
TAKAHASHI Tamotsu has discovered that Mutt contains a boundary error in
the "browse_get_namespace()" function in browse.c, which can be
triggered when receiving an overly long namespace from an IMAP server.
<impact type="normal">
A malicious IMAP server can send an overly long namespace to Mutt in
order to crash the application, and possibly execute arbitrary code
with the permissions of the user running Mutt.
There is no known workaround at this time.
All Mutt users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=mail-client/mutt-1.5.11-r2&quot;</code>
<uri link="">CVE-2006-3242</uri>
<metadata tag="requester" timestamp="Tue, 27 Jun 2006 19:49:38 +0000">
<metadata tag="submitter" timestamp="Tue, 27 Jun 2006 20:02:54 +0000">
<metadata tag="bugReady" timestamp="Wed, 28 Jun 2006 10:14:15 +0000">