Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat CodeReady Workspaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
All Products
Red Hat Product Errata RHSA-2007:0386 - Security Advisory
Issued:
2007-06-04
Updated:
2007-06-04

RHSA-2007:0386 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: mutt security update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An updated mutt package that fixes several security bugs is now available for
Red Hat Enterprise Linux 3, 4 and 5.

This update has been rated as having moderate security impact by the Red
Hat Security Response Team.

Description

Mutt is a text-mode mail user agent.

A flaw was found in the way Mutt used temporary files on NFS file systems.
Due to an implementation issue in the NFS protocol, Mutt was not able to
exclusively open a new file. A local attacker could conduct a
time-dependent attack and possibly gain access to e-mail attachments opened
by a victim. (CVE-2006-5297)

A flaw was found in the way Mutt processed certain APOP authentication
requests. By sending certain responses when mutt attempted to authenticate
against an APOP server, a remote attacker could potentially acquire certain
portions of a user's authentication credentials. (CVE-2007-1558)

A flaw was found in the way Mutt handled certain characters in gecos fields
which could lead to a buffer overflow. The gecos field is an entry in the
password database typically used to record general information about the
user. A local attacker could give themselves a carefully crafted "Real
Name" which could execute arbitrary code if a victim uses Mutt and expands
the attackers alias. (CVE-2007-2683)

All users of mutt should upgrade to this updated package, which
contains a backported patches to correct these issues.

Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Server 4 x86_64
  • Red Hat Enterprise Linux Server 4 ia64
  • Red Hat Enterprise Linux Server 4 i386
  • Red Hat Enterprise Linux Server 3 x86_64
  • Red Hat Enterprise Linux Server 3 ia64
  • Red Hat Enterprise Linux Server 3 i386
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.5 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.5 ia64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.5 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Workstation 4 x86_64
  • Red Hat Enterprise Linux Workstation 4 ia64
  • Red Hat Enterprise Linux Workstation 4 i386
  • Red Hat Enterprise Linux Workstation 3 x86_64
  • Red Hat Enterprise Linux Workstation 3 ia64
  • Red Hat Enterprise Linux Workstation 3 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux Desktop 4 x86_64
  • Red Hat Enterprise Linux Desktop 4 i386
  • Red Hat Enterprise Linux Desktop 3 x86_64
  • Red Hat Enterprise Linux Desktop 3 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for IBM z Systems 4 s390x
  • Red Hat Enterprise Linux for IBM z Systems 4 s390
  • Red Hat Enterprise Linux for IBM z Systems 3 s390x
  • Red Hat Enterprise Linux for IBM z Systems 3 s390
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.5 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.5 s390
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux for Power, big endian 4 ppc
  • Red Hat Enterprise Linux for Power, big endian 3 ppc
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 4.5 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 211085 - CVE-2006-5297 Multiple mutt tempfile race conditions
  • BZ - 239890 - CVE-2007-2683 Buffer overflow in mutt's gecos structure handling
  • BZ - 241191 - CVE-2007-1558 fetchmail, mutt: APOP vulnerability

CVEs

  • CVE-2007-1558
  • CVE-2006-5297
  • CVE-2007-2683

References

  • http://www.redhat.com/security/updates/classification/#moderate
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
mutt-1.4.2.2-3.0.2.el5.src.rpm SHA-256: eae2ff04029c7b77221f95a9ce2d23c76b40f87eb35bca3d03cd9081cfb0e31b
x86_64
mutt-1.4.2.2-3.0.2.el5.x86_64.rpm SHA-256: 0012e0f1e532c02bf0cfceb4d2e54e8ecfa806fbab5d470def5f779b571a3b87
ia64
mutt-1.4.2.2-3.0.2.el5.ia64.rpm SHA-256: 4861e29b66889158a941112a6ed84e4e57797e8eeef0d45d7852bb3518043dff
i386
mutt-1.4.2.2-3.0.2.el5.i386.rpm SHA-256: 6a4d995393c026da699499a71c51545374a643c727c49f982025e947cf89f5cb

Red Hat Enterprise Linux Server 4

SRPM
mutt-1.4.1-12.0.3.el4.src.rpm SHA-256: c8fbd14e921615ac98a5ba7e28d784e0001d9af37fafd18a4957ae5176c99559
x86_64
mutt-1.4.1-12.0.3.el4.x86_64.rpm SHA-256: b9ef28847e04c0cb4c3f825eb6070a0d50cb437e5dde7c7bb7516ff2a8d0f4d3
mutt-1.4.1-12.0.3.el4.x86_64.rpm SHA-256: b9ef28847e04c0cb4c3f825eb6070a0d50cb437e5dde7c7bb7516ff2a8d0f4d3
ia64
mutt-1.4.1-12.0.3.el4.ia64.rpm SHA-256: 6cae12bf6e4224262eb4837a6caa79930b17b178dff00e52a4ba0603105cda9f
mutt-1.4.1-12.0.3.el4.ia64.rpm SHA-256: 6cae12bf6e4224262eb4837a6caa79930b17b178dff00e52a4ba0603105cda9f
i386
mutt-1.4.1-12.0.3.el4.i386.rpm SHA-256: c41298ab599f33147f78ebf6864e746f046060d63ccc4a84a0ca73e0e58eafbf
mutt-1.4.1-12.0.3.el4.i386.rpm SHA-256: c41298ab599f33147f78ebf6864e746f046060d63ccc4a84a0ca73e0e58eafbf

Red Hat Enterprise Linux Server 3

SRPM
x86_64
ia64
i386

Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.5

SRPM
mutt-1.4.1-12.0.3.el4.src.rpm SHA-256: c8fbd14e921615ac98a5ba7e28d784e0001d9af37fafd18a4957ae5176c99559
x86_64
mutt-1.4.1-12.0.3.el4.x86_64.rpm SHA-256: b9ef28847e04c0cb4c3f825eb6070a0d50cb437e5dde7c7bb7516ff2a8d0f4d3
mutt-1.4.1-12.0.3.el4.x86_64.rpm SHA-256: b9ef28847e04c0cb4c3f825eb6070a0d50cb437e5dde7c7bb7516ff2a8d0f4d3
ia64
mutt-1.4.1-12.0.3.el4.ia64.rpm SHA-256: 6cae12bf6e4224262eb4837a6caa79930b17b178dff00e52a4ba0603105cda9f
mutt-1.4.1-12.0.3.el4.ia64.rpm SHA-256: 6cae12bf6e4224262eb4837a6caa79930b17b178dff00e52a4ba0603105cda9f
i386
mutt-1.4.1-12.0.3.el4.i386.rpm SHA-256: c41298ab599f33147f78ebf6864e746f046060d63ccc4a84a0ca73e0e58eafbf
mutt-1.4.1-12.0.3.el4.i386.rpm SHA-256: c41298ab599f33147f78ebf6864e746f046060d63ccc4a84a0ca73e0e58eafbf

Red Hat Enterprise Linux Workstation 5

SRPM
mutt-1.4.2.2-3.0.2.el5.src.rpm SHA-256: eae2ff04029c7b77221f95a9ce2d23c76b40f87eb35bca3d03cd9081cfb0e31b
x86_64
mutt-1.4.2.2-3.0.2.el5.x86_64.rpm SHA-256: 0012e0f1e532c02bf0cfceb4d2e54e8ecfa806fbab5d470def5f779b571a3b87
i386
mutt-1.4.2.2-3.0.2.el5.i386.rpm SHA-256: 6a4d995393c026da699499a71c51545374a643c727c49f982025e947cf89f5cb

Red Hat Enterprise Linux Workstation 4

SRPM
mutt-1.4.1-12.0.3.el4.src.rpm SHA-256: c8fbd14e921615ac98a5ba7e28d784e0001d9af37fafd18a4957ae5176c99559
x86_64
mutt-1.4.1-12.0.3.el4.x86_64.rpm SHA-256: b9ef28847e04c0cb4c3f825eb6070a0d50cb437e5dde7c7bb7516ff2a8d0f4d3
ia64
mutt-1.4.1-12.0.3.el4.ia64.rpm SHA-256: 6cae12bf6e4224262eb4837a6caa79930b17b178dff00e52a4ba0603105cda9f
i386
mutt-1.4.1-12.0.3.el4.i386.rpm SHA-256: c41298ab599f33147f78ebf6864e746f046060d63ccc4a84a0ca73e0e58eafbf

Red Hat Enterprise Linux Workstation 3

SRPM
x86_64
ia64
i386

Red Hat Enterprise Linux Desktop 5

SRPM
mutt-1.4.2.2-3.0.2.el5.src.rpm SHA-256: eae2ff04029c7b77221f95a9ce2d23c76b40f87eb35bca3d03cd9081cfb0e31b
x86_64
mutt-1.4.2.2-3.0.2.el5.x86_64.rpm SHA-256: 0012e0f1e532c02bf0cfceb4d2e54e8ecfa806fbab5d470def5f779b571a3b87
i386
mutt-1.4.2.2-3.0.2.el5.i386.rpm SHA-256: 6a4d995393c026da699499a71c51545374a643c727c49f982025e947cf89f5cb

Red Hat Enterprise Linux Desktop 4

SRPM
mutt-1.4.1-12.0.3.el4.src.rpm SHA-256: c8fbd14e921615ac98a5ba7e28d784e0001d9af37fafd18a4957ae5176c99559
x86_64
mutt-1.4.1-12.0.3.el4.x86_64.rpm SHA-256: b9ef28847e04c0cb4c3f825eb6070a0d50cb437e5dde7c7bb7516ff2a8d0f4d3
i386
mutt-1.4.1-12.0.3.el4.i386.rpm SHA-256: c41298ab599f33147f78ebf6864e746f046060d63ccc4a84a0ca73e0e58eafbf

Red Hat Enterprise Linux Desktop 3

SRPM
x86_64
i386

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
mutt-1.4.2.2-3.0.2.el5.src.rpm SHA-256: eae2ff04029c7b77221f95a9ce2d23c76b40f87eb35bca3d03cd9081cfb0e31b
s390x
mutt-1.4.2.2-3.0.2.el5.s390x.rpm SHA-256: a3b1fe21d84270fd4a8ed5b3c509d87fa4d6004a44003746ba50c3622a9b62dc

Red Hat Enterprise Linux for IBM z Systems 4

SRPM
mutt-1.4.1-12.0.3.el4.src.rpm SHA-256: c8fbd14e921615ac98a5ba7e28d784e0001d9af37fafd18a4957ae5176c99559
s390x
mutt-1.4.1-12.0.3.el4.s390x.rpm SHA-256: da9990406ea7fcad3f65da6c36041473cd060b1964a48ffe90d9af3c1abcc611
s390
mutt-1.4.1-12.0.3.el4.s390.rpm SHA-256: d3b515c102936aad2c9fdc707d366e7b3e056359b2c138f13ec3e2e957b293c3

Red Hat Enterprise Linux for IBM z Systems 3

SRPM
s390x
s390

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.5

SRPM
mutt-1.4.1-12.0.3.el4.src.rpm SHA-256: c8fbd14e921615ac98a5ba7e28d784e0001d9af37fafd18a4957ae5176c99559
s390x
mutt-1.4.1-12.0.3.el4.s390x.rpm SHA-256: da9990406ea7fcad3f65da6c36041473cd060b1964a48ffe90d9af3c1abcc611
s390
mutt-1.4.1-12.0.3.el4.s390.rpm SHA-256: d3b515c102936aad2c9fdc707d366e7b3e056359b2c138f13ec3e2e957b293c3

Red Hat Enterprise Linux for Power, big endian 5

SRPM
mutt-1.4.2.2-3.0.2.el5.src.rpm SHA-256: eae2ff04029c7b77221f95a9ce2d23c76b40f87eb35bca3d03cd9081cfb0e31b
ppc
mutt-1.4.2.2-3.0.2.el5.ppc.rpm SHA-256: c661c382a9fe36c21998b4716f6e4594de28cfd5740f17ae2f0bdb41fe9c7a57

Red Hat Enterprise Linux for Power, big endian 4

SRPM
mutt-1.4.1-12.0.3.el4.src.rpm SHA-256: c8fbd14e921615ac98a5ba7e28d784e0001d9af37fafd18a4957ae5176c99559
ppc
mutt-1.4.1-12.0.3.el4.ppc.rpm SHA-256: 252997b3555180a91f468170e6e1d9dea03abf84000cde6a07ac2f77f1a5ff2f

Red Hat Enterprise Linux for Power, big endian 3

SRPM
ppc

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 4.5

SRPM
mutt-1.4.1-12.0.3.el4.src.rpm SHA-256: c8fbd14e921615ac98a5ba7e28d784e0001d9af37fafd18a4957ae5176c99559
ppc
mutt-1.4.1-12.0.3.el4.ppc.rpm SHA-256: 252997b3555180a91f468170e6e1d9dea03abf84000cde6a07ac2f77f1a5ff2f

Red Hat Enterprise Linux Server from RHUI 5

SRPM
mutt-1.4.2.2-3.0.2.el5.src.rpm SHA-256: eae2ff04029c7b77221f95a9ce2d23c76b40f87eb35bca3d03cd9081cfb0e31b
x86_64
mutt-1.4.2.2-3.0.2.el5.x86_64.rpm SHA-256: 0012e0f1e532c02bf0cfceb4d2e54e8ecfa806fbab5d470def5f779b571a3b87
i386
mutt-1.4.2.2-3.0.2.el5.i386.rpm SHA-256: 6a4d995393c026da699499a71c51545374a643c727c49f982025e947cf89f5cb

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2022 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter