Lucene search

K
ubuntuUbuntuUSN-373-1
HistoryNov 01, 2006 - 12:00 a.m.

mutt vulnerabilities

2006-11-0100:00:00
ubuntu.com
30

1.2 Low

CVSS2

Attack Vector

LOCAL

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:L/AC:H/Au:N/C:N/I:P/A:N

6.2 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

10.1%

Releases

  • Ubuntu 6.10
  • Ubuntu 6.06
  • Ubuntu 5.10

Details

Race conditions were discovered in mutt’s handling of temporary files.
Under certain conditions when using a shared temp directory (the
default), other local users could overwrite arbitrary files owned by the
user running mutt. This vulnerability is more likely when the temp
directory is over NFS.

OSVersionArchitecturePackageVersionFilename
Ubuntu6.10noarchmutt< 1.5.12-1ubuntu1.1UNKNOWN
Ubuntu6.06noarchmutt< 1.5.11-3ubuntu2.2UNKNOWN
Ubuntu5.10noarchmutt< 1.5.9-2ubuntu1.2UNKNOWN

1.2 Low

CVSS2

Attack Vector

LOCAL

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:L/AC:H/Au:N/C:N/I:P/A:N

6.2 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

10.1%