Lucene search

K
centosCentOS ProjectCESA-2006:0577
HistoryJul 12, 2006 - 7:04 p.m.

mutt security update

2006-07-1219:04:58
CentOS Project
lists.centos.org
40

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.241 Low

EPSS

Percentile

96.6%

CentOS Errata and Security Advisory CESA-2006:0577

Mutt is a text-mode mail user agent.

A buffer overflow flaw was found in the way Mutt processes an overly
long namespace from a malicious imap server. In order to exploit this
flaw a user would have to use Mutt to connect to a malicious IMAP server.
(CVE-2006-3242)

Users of Mutt are advised to upgrade to these erratum packages, which
contain a backported patch to correct this issue.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2006-July/075163.html
https://lists.centos.org/pipermail/centos-announce/2006-July/075164.html
https://lists.centos.org/pipermail/centos-announce/2006-July/075165.html
https://lists.centos.org/pipermail/centos-announce/2006-July/075167.html
https://lists.centos.org/pipermail/centos-announce/2006-July/075169.html
https://lists.centos.org/pipermail/centos-announce/2006-July/075172.html
https://lists.centos.org/pipermail/centos-announce/2006-July/075173.html
https://lists.centos.org/pipermail/centos-announce/2006-July/075180.html
https://lists.centos.org/pipermail/centos-announce/2006-July/075181.html

Affected packages:
mutt

Upstream details at:
https://access.redhat.com/errata/RHSA-2006:0577

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.241 Low

EPSS

Percentile

96.6%