Login
Newsletter
Werbung

Sicherheit: Pufferüberlauf in mutt
Aktuelle Meldungen Distributionen
Name: Pufferüberlauf in mutt
ID: MDKSA-2006:115
Distribution: Mandriva
Plattformen: Mandriva Corporate 3.0, Mandriva 10.2, Mandriva 2006.0
Datum: Do, 29. Juni 2006, 03:40
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3242
Applikationen: mutt

Originalnachricht

This is a multi-part message in MIME format...

------------=_1151545222-2181-2346


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDKSA-2006:115
http://www.mandriva.com/security/
_______________________________________________________________________

Package : mutt
Date : June 28, 2006
Affected: 10.2, 2006.0, Corporate 3.0
_______________________________________________________________________

Problem Description:

A stack-based buffer overflow in the browse_get_namespace function in
imap/browse.c of Mutt allows remote attackers to cause a denial of service
(crash) or execute arbitrary code via long namespaces received from the
IMAP server.

Updated packages have been patched to address this issue.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2006-3242
_______________________________________________________________________

Updated Packages:

Mandriva Linux 10.2:
4754ced22986cf85a1800f1505598e37 10.2/RPMS/mutt-1.5.6i-5.1.102mdk.i586.rpm
8821801bcfcd24e2c83a0650300ab3a6
10.2/RPMS/mutt-utf8-1.5.6i-5.1.102mdk.i586.rpm
013916fa3ad5714b2d54fbfebc226d2f 10.2/SRPMS/mutt-1.5.6i-5.1.102mdk.src.rpm

Mandriva Linux 10.2/X86_64:
3a92d59daad0f99898c19ee1ec3ab5c5
x86_64/10.2/RPMS/mutt-1.5.6i-5.1.102mdk.x86_64.rpm
45306ab4c8ee90b95f0590e859391118
x86_64/10.2/RPMS/mutt-utf8-1.5.6i-5.1.102mdk.x86_64.rpm
013916fa3ad5714b2d54fbfebc226d2f
x86_64/10.2/SRPMS/mutt-1.5.6i-5.1.102mdk.src.rpm

Mandriva Linux 2006.0:
76aff600c45f2144b4cce08bf54bb27a
2006.0/RPMS/mutt-1.5.9i-9.1.20060mdk.i586.rpm
7e892d544ddfb5631bd299359b828ded
2006.0/RPMS/mutt-utf8-1.5.9i-9.1.20060mdk.i586.rpm
9e5067db02225e3b35ce9dbdfe17050d
2006.0/SRPMS/mutt-1.5.9i-9.1.20060mdk.src.rpm

Mandriva Linux 2006.0/X86_64:
7e6c0716940e1b9e19155d7af11bf1fa
x86_64/2006.0/RPMS/mutt-1.5.9i-9.1.20060mdk.x86_64.rpm
f5315ffc0c03aa99fc7b106d4081e09d
x86_64/2006.0/RPMS/mutt-utf8-1.5.9i-9.1.20060mdk.x86_64.rpm
9e5067db02225e3b35ce9dbdfe17050d
x86_64/2006.0/SRPMS/mutt-1.5.9i-9.1.20060mdk.src.rpm

Corporate 3.0:
bfc81580fea8bc093ee286001dc9a90d
corporate/3.0/RPMS/mutt-1.5.5.1i-2.1.C30mdk.i586.rpm
9979b1df2e7b70e801e362f1344cffdc
corporate/3.0/RPMS/mutt-utf8-1.5.5.1i-2.1.C30mdk.i586.rpm
0b5f6bdc942633d280c44c6cf064f59f
corporate/3.0/SRPMS/mutt-1.5.5.1i-2.1.C30mdk.src.rpm

Corporate 3.0/X86_64:
e6093d7bd4127c7d107894514c729f12
x86_64/corporate/3.0/RPMS/mutt-1.5.5.1i-2.1.C30mdk.x86_64.rpm
b6390789c46013fb8396d6cc9e2b18ac
x86_64/corporate/3.0/RPMS/mutt-utf8-1.5.5.1i-2.1.C30mdk.x86_64.rpm
0b5f6bdc942633d280c44c6cf064f59f
x86_64/corporate/3.0/SRPMS/mutt-1.5.5.1i-2.1.C30mdk.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)

iD8DBQFEovkJmqjQ0CJFipgRAkhdAJ0ZglcrON2vkMd93rii6dW2wbrmqQCg9mq5
R/PHPisF3txjtylXIRNwUl0=
=nvnj
-----END PGP SIGNATURE-----


------------=_1151545222-2181-2346
Content-Type: text/plain; name="message-footer.txt"
Content-Disposition: inline; filename="message-footer.txt"
Content-Transfer-Encoding: 8bit

To unsubscribe, send a email to sympa@mandrivalinux.org
with this subject : unsubscribe security-announce
_______________________________________________________
Want to buy your Pack or Services from Mandriva?
Go to http://www.mandrivastore.com
Join the Club : http://www.mandrivaclub.com
_______________________________________________________

------------=_1151545222-2181-2346--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung