drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Pufferüberlauf in mutt
Name: |
Pufferüberlauf in mutt |
|
ID: |
USN-2147-1 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 10.04 LTS, Ubuntu 12.04 LTS, Ubuntu 12.10, Ubuntu 13.10 |
|
Datum: |
Fr, 14. März 2014, 08:53 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0467 |
|
Applikationen: |
mutt |
|
Originalnachricht |
--===============8904358801629842010== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="h31gzZEtNLTqOjlF" Content-Disposition: inline
--h31gzZEtNLTqOjlF Content-Type: text/plain; charset=us-ascii Content-Disposition: inline
========================================================================== Ubuntu Security Notice USN-2147-1 March 13, 2014
mutt vulnerability ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 13.10 - Ubuntu 12.10 - Ubuntu 12.04 LTS - Ubuntu 10.04 LTS
Summary:
The mutt mail client could be made to crash or run programs as your login if it opened a specially crafted email.
Software Description: - mutt: text-based mailreader supporting MIME, GPG, PGP and threading
Details:
Beatrice Torracca and Evgeni Golov discovered a buffer overflow in mutt while expanding addresses when parsing email headers. An attacker could specially craft an email to cause mutt to crash, resulting in a denial of service, or possibly execute arbitrary code with the privileges of the user invoking mutt.
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 13.10: mutt 1.5.21-6.4ubuntu1.1 mutt-patched 1.5.21-6.4ubuntu1.1
Ubuntu 12.10: mutt 1.5.21-6ubuntu0.1 mutt-patched 1.5.21-6ubuntu0.1
Ubuntu 12.04 LTS: mutt 1.5.21-5ubuntu2.1 mutt-patched 1.5.21-5ubuntu2.1
Ubuntu 10.04 LTS: mutt 1.5.20-7ubuntu1.2 mutt-patched 1.5.20-7ubuntu1.2
After a standard system update you need to restart mutt to make all the necessary changes.
References: http://www.ubuntu.com/usn/usn-2147-1 CVE-2014-0467
Package Information: https://launchpad.net/ubuntu/+source/mutt/1.5.21-6.4ubuntu1.1 https://launchpad.net/ubuntu/+source/mutt/1.5.21-6ubuntu0.1 https://launchpad.net/ubuntu/+source/mutt/1.5.21-5ubuntu2.1 https://launchpad.net/ubuntu/+source/mutt/1.5.20-7ubuntu1.2
--h31gzZEtNLTqOjlF Content-Type: application/pgp-signature; name="signature.asc" Content-Description: Digital signature
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIcBAEBCgAGBQJTIjViAAoJEC8Jno0AXoH07p0P/iALR249ESBZALChG25yChNR 4vIihAKa5WT1i+b1VkudAJkuluFzbYUeAAaRXK/MiCZaruerRDsOLqBew2ldyyQs zoW2Jtv5f4Kjzgll9Yup8VSPDYn+eoY6/qSmnyT5PNHLNBbAx2J2rvFBDDpgRwpa 8VaUK5sFXOWuHZo7p4cbokdUNcpUbYAVwV+f9imK2HP2WDeMbUvR/pVSGRmsPGQQ AFSici8O4FRnMqzE+mhMU2ZGXF5hjWonKLNgj93q96YYcqEcOW6zsCYxec6CSyDo 9NOsswFWLxu+9iqooDaqlSg6NHP1XTdZu/IXY0Lb0Z05L6v+BtO4a+kO9EpM8fy0 Dh6F1hoXLoV2qVoCWbxGXCtSc9IYhHCjZH/HfN8u1NiaKULjnJahImYl+C2xvDNL AznTi/zaR7RpNmnU8n8vDKckO+AQ4xBcASJVdGeZMJvIKJwkLp613beBpvxnA5gV Lapf6CwFnA0T81ib5lorMuoqz03HQJ/vRrwF2t/y4BkxAqGzZA0mHlkIrdL8BR0c 1QW7PIq6VxGJolqRlIWCoxl6K+BtXn7s5E491JfY7LlOL1xo9MFq08IKXBjGIiew EyobMHl849EaprO3ezzCW6SVvYiyvRjyb5XBtzf5c0IgpNUyhFUKZSi+uQbAgCyT 6H+HDo/hVRtRs8VnNaVl =s/Z2 -----END PGP SIGNATURE-----
--h31gzZEtNLTqOjlF--
--===============8904358801629842010== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline
-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
--===============8904358801629842010==--
|
|
|
|