Login
Newsletter
Werbung

Sicherheit: Pufferüberlauf in mutt
Aktuelle Meldungen Distributionen
Name: Pufferüberlauf in mutt
ID: USN-2147-1
Distribution: Ubuntu
Plattformen: Ubuntu 10.04 LTS, Ubuntu 12.04 LTS, Ubuntu 12.10, Ubuntu 13.10
Datum: Fr, 14. März 2014, 08:53
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0467
Applikationen: mutt

Originalnachricht


--===============8904358801629842010==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="h31gzZEtNLTqOjlF"
Content-Disposition: inline


--h31gzZEtNLTqOjlF
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline

==========================================================================
Ubuntu Security Notice USN-2147-1
March 13, 2014

mutt vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 13.10
- Ubuntu 12.10
- Ubuntu 12.04 LTS
- Ubuntu 10.04 LTS

Summary:

The mutt mail client could be made to crash or run programs as your
login if it opened a specially crafted email.

Software Description:
- mutt: text-based mailreader supporting MIME, GPG, PGP and threading

Details:

Beatrice Torracca and Evgeni Golov discovered a buffer overflow
in mutt while expanding addresses when parsing email headers. An
attacker could specially craft an email to cause mutt to crash,
resulting in a denial of service, or possibly execute arbitrary code
with the privileges of the user invoking mutt.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 13.10:
mutt 1.5.21-6.4ubuntu1.1
mutt-patched 1.5.21-6.4ubuntu1.1

Ubuntu 12.10:
mutt 1.5.21-6ubuntu0.1
mutt-patched 1.5.21-6ubuntu0.1

Ubuntu 12.04 LTS:
mutt 1.5.21-5ubuntu2.1
mutt-patched 1.5.21-5ubuntu2.1

Ubuntu 10.04 LTS:
mutt 1.5.20-7ubuntu1.2
mutt-patched 1.5.20-7ubuntu1.2

After a standard system update you need to restart mutt to make
all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-2147-1
CVE-2014-0467

Package Information:
https://launchpad.net/ubuntu/+source/mutt/1.5.21-6.4ubuntu1.1
https://launchpad.net/ubuntu/+source/mutt/1.5.21-6ubuntu0.1
https://launchpad.net/ubuntu/+source/mutt/1.5.21-5ubuntu2.1
https://launchpad.net/ubuntu/+source/mutt/1.5.20-7ubuntu1.2


--h31gzZEtNLTqOjlF
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Digital signature

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=s/Z2
-----END PGP SIGNATURE-----

--h31gzZEtNLTqOjlF--


--===============8904358801629842010==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

--===============8904358801629842010==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung