Debian: 'mutt' buffer overflow vulnerability
Debian: 'mutt' buffer overflow vulnerability
Joost Pol found a buffer overflow in the address handling code ofmutt (a popular mail user agent). Even though this is a one byteoverflow this is exploitable.
------------------------------------------------------------------------ Debian Security Advisory DSA-096-1 This email address is being protected from spambots. You need JavaScript enabled to view it. https://www.debian.org/security/ Wichert Akkerman January 2, 2002 ------------------------------------------------------------------------ Package : mutt Problem type : buffer overflow Debian-specific: no Joost Pol found a buffer overflow in the address handling code of mutt (a popular mail user agent). Even though this is a one byte overflow this is exploitable. This has been fixed upstream in version 1.2.5.1 and 1.3.25. The relevant patch has been added to version 1.2.5-5 of the Debian package. wget url will fetch the file for you dpkg -i file.deb will install the referenced file. Debian GNU/Linux 2.2 alias potato --------------------------------- Potato was released for alpha, arm, i386, m68k, powerpc and sparc. At this moment packages for sparc are not yet available. Source archives: https://security.debian.org/dists/stable/updates/main/source/mutt_1.2.5-5.diff.gz MD5 checksum: 04f7c13c3bf6a1d4fcb4bf1a594522a1 https://security.debian.org/dists/stable/updates/main/source/mutt_1.2.5-5.dsc MD5 checksum: 0ba73a6dd8029339329c27b56087ebce https://security.debian.org/dists/stable/updates/main/source/mutt_1.2.5.orig.tar.gz MD5 checksum: 0ba5367059abdd55daceb82dce6be42f Alpha architecture: https://security.debian.org/dists/stable/updates/main/binary-alpha/mutt_1.2.5-5_alpha.deb MD5 checksum: b206557565607833551219ff67737cd4 ARM architecture: https://security.debian.org/dists/stable/updates/main/binary-arm/mutt_1.2.5-5_arm.deb MD5 checksum: 57c0c2602c3bfde3f459f01515432eac Intel IA-32 architecture: https://security.debian.org/dists/stable/updates/main/binary-i386/mutt_1.2.5-5_i386.deb MD5 checksum: d72fa58b0914762674648a68d410b4b9 Motorola 680x0 architecture: https://security.debian.org/dists/stable/updates/main/binary-m68k/mutt_1.2.5-5_m68k.deb MD5 checksum: 266c451cee06693e7f40917b0465981a PowerPC architecture: https://security.debian.org/dists/stable/updates/main/binary-powerpc/mutt_1.2.5-5_powerpc.deb MD5 checksum: aec60dae6148ac9da29c111e70ea77b0 These packages will be moved into the stable distribution on its next revision. For not yet released architectures please refer to the appropriate directory ftp://ftp.debian.org/debian/dists/sid/binary-$arch/ . -- ---------------------------------------------------------------------------- apt-get: deb https://security.debian.org/ stable/updates main dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.