------------------------------------------------------------------------
Debian Security Advisory DSA-096-1                   security@debian.org 
Debian -- Security Information                          Wichert Akkerman
January  2, 2002
------------------------------------------------------------------------


Package        : mutt
Problem type   : buffer overflow
Debian-specific: no

Joost Pol found a buffer overflow in the address handling code of
mutt (a popular mail user agent). Even though this is a one byte
overflow this is exploitable.

This has been fixed upstream in version 1.2.5.1 and 1.3.25. The
relevant patch has been added to version 1.2.5-5 of the Debian
package.

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.


Debian GNU/Linux 2.2 alias potato
---------------------------------

  Potato was released for alpha, arm, i386, m68k, powerpc and sparc.
  At this moment packages for sparc are not yet available.

  Source archives:
      
      MD5 checksum: 04f7c13c3bf6a1d4fcb4bf1a594522a1
      
      MD5 checksum: 0ba73a6dd8029339329c27b56087ebce
      
      MD5 checksum: 0ba5367059abdd55daceb82dce6be42f

  Alpha architecture:
      
      MD5 checksum: b206557565607833551219ff67737cd4

  ARM architecture:
      
      MD5 checksum: 57c0c2602c3bfde3f459f01515432eac

  Intel IA-32 architecture:
      
      MD5 checksum: d72fa58b0914762674648a68d410b4b9

  Motorola 680x0 architecture:
      
      MD5 checksum: 266c451cee06693e7f40917b0465981a

  PowerPC architecture:
      
      MD5 checksum: aec60dae6148ac9da29c111e70ea77b0

  These packages will be moved into the stable distribution on its next
  revision.

For not yet released architectures please refer to the appropriate
directory    .

--
----------------------------------------------------------------------------
apt-get: deb  Debian -- Security Information  stable/updates main
dpkg-ftp:    dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org




Debian: 'mutt' buffer overflow vulnerability

January 2, 2002
Joost Pol found a buffer overflow in the address handling code ofmutt (a popular mail user agent)

Summary

Package : mutt
Problem type : buffer overflow
Debian-specific: no

Joost Pol found a buffer overflow in the address handling code of
mutt (a popular mail user agent). Even though this is a one byte
overflow this is exploitable.

This has been fixed upstream in version 1.2.5.1 and 1.3.25. The
relevant patch has been added to version 1.2.5-5 of the Debian
package.

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.


Debian GNU/Linux 2.2 alias potato
---------------------------------

Potato was released for alpha, arm, i386, m68k, powerpc and sparc.
At this moment packages for sparc are not yet available.

Source archives:

MD5 checksum: 04f7c13c3bf6a1d4fcb4bf1a594522a1

MD5 checksum: 0ba73a6dd8029339329c27b56087ebce

MD5 checksum: 0ba5367059abdd55daceb82dce6be42f

Alpha architecture:

MD5 checksum: b206557565607833551219ff67737cd4

ARM architecture:

MD5 checksum: 57c0c2602c3bfde3f459f01515432eac

Intel IA-32 architecture:

MD5 checksum: d72fa58b0914762674648a68d410b4b9

Motorola 680x0 architecture:

MD5 checksum: 266c451cee06693e7f40917b0465981a

PowerPC architecture:

MD5 checksum: aec60dae6148ac9da29c111e70ea77b0

These packages will be moved into the stable distribution on its next
revision.

For not yet released architectures please refer to the appropriate
directory .

--
----------------------------------------------------------------------------
apt-get: deb Debian -- Security Information stable/updates main
dpkg-ftp: dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org






Severity

Related News