Pufferüberlauf in mutt
ID: | USN-2147-1 |
Distribution: | Ubuntu |
Plattformen: | Ubuntu 10.04 LTS, Ubuntu 12.04 LTS, Ubuntu 12.10, Ubuntu 13.10 |
Datum: | Fr, 14. März 2014, 08:53 |
Referenzen: | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0467 |
Applikationen: | mutt |
Originalnachricht |
|
--===============8904358801629842010== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="h31gzZEtNLTqOjlF" Content-Disposition: inline --h31gzZEtNLTqOjlF Content-Type: text/plain; charset=us-ascii Content-Disposition: inline ========================================================================== Ubuntu Security Notice USN-2147-1 March 13, 2014 mutt vulnerability ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 13.10 - Ubuntu 12.10 - Ubuntu 12.04 LTS - Ubuntu 10.04 LTS Summary: The mutt mail client could be made to crash or run programs as your login if it opened a specially crafted email. Software Description: - mutt: text-based mailreader supporting MIME, GPG, PGP and threading Details: Beatrice Torracca and Evgeni Golov discovered a buffer overflow in mutt while expanding addresses when parsing email headers. An attacker could specially craft an email to cause mutt to crash, resulting in a denial of service, or possibly execute arbitrary code with the privileges of the user invoking mutt. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 13.10: mutt 1.5.21-6.4ubuntu1.1 mutt-patched 1.5.21-6.4ubuntu1.1 Ubuntu 12.10: mutt 1.5.21-6ubuntu0.1 mutt-patched 1.5.21-6ubuntu0.1 Ubuntu 12.04 LTS: mutt 1.5.21-5ubuntu2.1 mutt-patched 1.5.21-5ubuntu2.1 Ubuntu 10.04 LTS: mutt 1.5.20-7ubuntu1.2 mutt-patched 1.5.20-7ubuntu1.2 After a standard system update you need to restart mutt to make all the necessary changes. References: http://www.ubuntu.com/usn/usn-2147-1 CVE-2014-0467 Package Information: https://launchpad.net/ubuntu/+source/mutt/1.5.21-6.4ubuntu1.1 https://launchpad.net/ubuntu/+source/mutt/1.5.21-6ubuntu0.1 https://launchpad.net/ubuntu/+source/mutt/1.5.21-5ubuntu2.1 https://launchpad.net/ubuntu/+source/mutt/1.5.20-7ubuntu1.2 --h31gzZEtNLTqOjlF Content-Type: application/pgp-signature; name="signature.asc" Content-Description: Digital signature -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCgAGBQJTIjViAAoJEC8Jno0AXoH07p0P/iALR249ESBZALChG25yChNR 4vIihAKa5WT1i+b1VkudAJkuluFzbYUeAAaRXK/MiCZaruerRDsOLqBew2ldyyQs zoW2Jtv5f4Kjzgll9Yup8VSPDYn+eoY6/qSmnyT5PNHLNBbAx2J2rvFBDDpgRwpa 8VaUK5sFXOWuHZo7p4cbokdUNcpUbYAVwV+f9imK2HP2WDeMbUvR/pVSGRmsPGQQ AFSici8O4FRnMqzE+mhMU2ZGXF5hjWonKLNgj93q96YYcqEcOW6zsCYxec6CSyDo 9NOsswFWLxu+9iqooDaqlSg6NHP1XTdZu/IXY0Lb0Z05L6v+BtO4a+kO9EpM8fy0 Dh6F1hoXLoV2qVoCWbxGXCtSc9IYhHCjZH/HfN8u1NiaKULjnJahImYl+C2xvDNL AznTi/zaR7RpNmnU8n8vDKckO+AQ4xBcASJVdGeZMJvIKJwkLp613beBpvxnA5gV Lapf6CwFnA0T81ib5lorMuoqz03HQJ/vRrwF2t/y4BkxAqGzZA0mHlkIrdL8BR0c 1QW7PIq6VxGJolqRlIWCoxl6K+BtXn7s5E491JfY7LlOL1xo9MFq08IKXBjGIiew EyobMHl849EaprO3ezzCW6SVvYiyvRjyb5XBtzf5c0IgpNUyhFUKZSi+uQbAgCyT 6H+HDo/hVRtRs8VnNaVl =s/Z2 -----END PGP SIGNATURE----- --h31gzZEtNLTqOjlF-- --===============8904358801629842010== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline -- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce --===============8904358801629842010==-- |