You are here
Home > Preporuke > Sigurnosni nedostatak programskog paketa mutt

Sigurnosni nedostatak programskog paketa mutt

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LUB

==========================================================================
Ubuntu Security Notice USN-2147-1
March 13, 2014

mutt vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 13.10
– Ubuntu 12.10
– Ubuntu 12.04 LTS
– Ubuntu 10.04 LTS

Summary:

The mutt mail client could be made to crash or run programs as your
login if it opened a specially crafted email.

Software Description:
– mutt: text-based mailreader supporting MIME, GPG, PGP and threading

Details:

Beatrice Torracca and Evgeni Golov discovered a buffer overflow
in mutt while expanding addresses when parsing email headers. An
attacker could specially craft an email to cause mutt to crash,
resulting in a denial of service, or possibly execute arbitrary code
with the privileges of the user invoking mutt.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 13.10:
mutt 1.5.21-6.4ubuntu1.1
mutt-patched 1.5.21-6.4ubuntu1.1

Ubuntu 12.10:
mutt 1.5.21-6ubuntu0.1
mutt-patched 1.5.21-6ubuntu0.1

Ubuntu 12.04 LTS:
mutt 1.5.21-5ubuntu2.1
mutt-patched 1.5.21-5ubuntu2.1

Ubuntu 10.04 LTS:
mutt 1.5.20-7ubuntu1.2
mutt-patched 1.5.20-7ubuntu1.2

After a standard system update you need to restart mutt to make
all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-2147-1
CVE-2014-0467

Package Information:
https://launchpad.net/ubuntu/+source/mutt/1.5.21-6.4ubuntu1.1
https://launchpad.net/ubuntu/+source/mutt/1.5.21-6ubuntu0.1
https://launchpad.net/ubuntu/+source/mutt/1.5.21-5ubuntu2.1
https://launchpad.net/ubuntu/+source/mutt/1.5.20-7ubuntu1.2

—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
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=s/Z2
—–END PGP SIGNATURE—–

AutorMarko Stanec
Cert idNCERT-REF-2014-03-0038-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Sigurnosni nedostaci programskog paketa Xen

Otkriveni su sigurnosni nedostaci u programskom paketu Xen za operacijski sustav Fedora. Otkriveni nedostaci potencijalnim napadačima omogućuju izvođenje napada uskraćivanja...

Close