Synopsis
Moderate: mutt security update
Type/Severity
Security Advisory: Moderate
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
View affected systems
Topic
An updated mutt package that fixes several security bugs is now available for
Red Hat Enterprise Linux 3, 4 and 5.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
Description
Mutt is a text-mode mail user agent.
A flaw was found in the way Mutt used temporary files on NFS file systems.
Due to an implementation issue in the NFS protocol, Mutt was not able to
exclusively open a new file. A local attacker could conduct a
time-dependent attack and possibly gain access to e-mail attachments opened
by a victim. (CVE-2006-5297)
A flaw was found in the way Mutt processed certain APOP authentication
requests. By sending certain responses when mutt attempted to authenticate
against an APOP server, a remote attacker could potentially acquire certain
portions of a user's authentication credentials. (CVE-2007-1558)
A flaw was found in the way Mutt handled certain characters in gecos fields
which could lead to a buffer overflow. The gecos field is an entry in the
password database typically used to record general information about the
user. A local attacker could give themselves a carefully crafted "Real
Name" which could execute arbitrary code if a victim uses Mutt and expands
the attackers alias. (CVE-2007-2683)
All users of mutt should upgrade to this updated package, which
contains a backported patches to correct these issues.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188
Affected Products
-
Red Hat Enterprise Linux Server 5 x86_64
-
Red Hat Enterprise Linux Server 5 ia64
-
Red Hat Enterprise Linux Server 5 i386
-
Red Hat Enterprise Linux Server 4 x86_64
-
Red Hat Enterprise Linux Server 4 ia64
-
Red Hat Enterprise Linux Server 4 i386
-
Red Hat Enterprise Linux Server 3 x86_64
-
Red Hat Enterprise Linux Server 3 ia64
-
Red Hat Enterprise Linux Server 3 i386
-
Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.5 x86_64
-
Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.5 ia64
-
Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.5 i386
-
Red Hat Enterprise Linux Workstation 5 x86_64
-
Red Hat Enterprise Linux Workstation 5 i386
-
Red Hat Enterprise Linux Workstation 4 x86_64
-
Red Hat Enterprise Linux Workstation 4 ia64
-
Red Hat Enterprise Linux Workstation 4 i386
-
Red Hat Enterprise Linux Workstation 3 x86_64
-
Red Hat Enterprise Linux Workstation 3 ia64
-
Red Hat Enterprise Linux Workstation 3 i386
-
Red Hat Enterprise Linux Desktop 5 x86_64
-
Red Hat Enterprise Linux Desktop 5 i386
-
Red Hat Enterprise Linux Desktop 4 x86_64
-
Red Hat Enterprise Linux Desktop 4 i386
-
Red Hat Enterprise Linux Desktop 3 x86_64
-
Red Hat Enterprise Linux Desktop 3 i386
-
Red Hat Enterprise Linux for IBM z Systems 5 s390x
-
Red Hat Enterprise Linux for IBM z Systems 4 s390x
-
Red Hat Enterprise Linux for IBM z Systems 4 s390
-
Red Hat Enterprise Linux for IBM z Systems 3 s390x
-
Red Hat Enterprise Linux for IBM z Systems 3 s390
-
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.5 s390x
-
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.5 s390
-
Red Hat Enterprise Linux for Power, big endian 5 ppc
-
Red Hat Enterprise Linux for Power, big endian 4 ppc
-
Red Hat Enterprise Linux for Power, big endian 3 ppc
-
Red Hat Enterprise Linux for Power, big endian - Extended Update Support 4.5 ppc
-
Red Hat Enterprise Linux Server from RHUI 5 x86_64
-
Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
-
BZ - 211085
- CVE-2006-5297 Multiple mutt tempfile race conditions
-
BZ - 239890
- CVE-2007-2683 Buffer overflow in mutt's gecos structure handling
-
BZ - 241191
- CVE-2007-1558 fetchmail, mutt: APOP vulnerability
Note:
More recent versions of these packages may be available.
Click a package name for more details.
Red Hat Enterprise Linux Server 5
SRPM |
mutt-1.4.2.2-3.0.2.el5.src.rpm
|
SHA-256: eae2ff04029c7b77221f95a9ce2d23c76b40f87eb35bca3d03cd9081cfb0e31b |
x86_64 |
mutt-1.4.2.2-3.0.2.el5.x86_64.rpm
|
SHA-256: 0012e0f1e532c02bf0cfceb4d2e54e8ecfa806fbab5d470def5f779b571a3b87 |
ia64 |
mutt-1.4.2.2-3.0.2.el5.ia64.rpm
|
SHA-256: 4861e29b66889158a941112a6ed84e4e57797e8eeef0d45d7852bb3518043dff |
i386 |
mutt-1.4.2.2-3.0.2.el5.i386.rpm
|
SHA-256: 6a4d995393c026da699499a71c51545374a643c727c49f982025e947cf89f5cb |
Red Hat Enterprise Linux Server 4
SRPM |
mutt-1.4.1-12.0.3.el4.src.rpm
|
SHA-256: c8fbd14e921615ac98a5ba7e28d784e0001d9af37fafd18a4957ae5176c99559 |
x86_64 |
mutt-1.4.1-12.0.3.el4.x86_64.rpm
|
SHA-256: b9ef28847e04c0cb4c3f825eb6070a0d50cb437e5dde7c7bb7516ff2a8d0f4d3 |
mutt-1.4.1-12.0.3.el4.x86_64.rpm
|
SHA-256: b9ef28847e04c0cb4c3f825eb6070a0d50cb437e5dde7c7bb7516ff2a8d0f4d3 |
ia64 |
mutt-1.4.1-12.0.3.el4.ia64.rpm
|
SHA-256: 6cae12bf6e4224262eb4837a6caa79930b17b178dff00e52a4ba0603105cda9f |
mutt-1.4.1-12.0.3.el4.ia64.rpm
|
SHA-256: 6cae12bf6e4224262eb4837a6caa79930b17b178dff00e52a4ba0603105cda9f |
i386 |
mutt-1.4.1-12.0.3.el4.i386.rpm
|
SHA-256: c41298ab599f33147f78ebf6864e746f046060d63ccc4a84a0ca73e0e58eafbf |
mutt-1.4.1-12.0.3.el4.i386.rpm
|
SHA-256: c41298ab599f33147f78ebf6864e746f046060d63ccc4a84a0ca73e0e58eafbf |
Red Hat Enterprise Linux Server 3
Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.5
SRPM |
mutt-1.4.1-12.0.3.el4.src.rpm
|
SHA-256: c8fbd14e921615ac98a5ba7e28d784e0001d9af37fafd18a4957ae5176c99559 |
x86_64 |
mutt-1.4.1-12.0.3.el4.x86_64.rpm
|
SHA-256: b9ef28847e04c0cb4c3f825eb6070a0d50cb437e5dde7c7bb7516ff2a8d0f4d3 |
mutt-1.4.1-12.0.3.el4.x86_64.rpm
|
SHA-256: b9ef28847e04c0cb4c3f825eb6070a0d50cb437e5dde7c7bb7516ff2a8d0f4d3 |
ia64 |
mutt-1.4.1-12.0.3.el4.ia64.rpm
|
SHA-256: 6cae12bf6e4224262eb4837a6caa79930b17b178dff00e52a4ba0603105cda9f |
mutt-1.4.1-12.0.3.el4.ia64.rpm
|
SHA-256: 6cae12bf6e4224262eb4837a6caa79930b17b178dff00e52a4ba0603105cda9f |
i386 |
mutt-1.4.1-12.0.3.el4.i386.rpm
|
SHA-256: c41298ab599f33147f78ebf6864e746f046060d63ccc4a84a0ca73e0e58eafbf |
mutt-1.4.1-12.0.3.el4.i386.rpm
|
SHA-256: c41298ab599f33147f78ebf6864e746f046060d63ccc4a84a0ca73e0e58eafbf |
Red Hat Enterprise Linux Workstation 5
SRPM |
mutt-1.4.2.2-3.0.2.el5.src.rpm
|
SHA-256: eae2ff04029c7b77221f95a9ce2d23c76b40f87eb35bca3d03cd9081cfb0e31b |
x86_64 |
mutt-1.4.2.2-3.0.2.el5.x86_64.rpm
|
SHA-256: 0012e0f1e532c02bf0cfceb4d2e54e8ecfa806fbab5d470def5f779b571a3b87 |
i386 |
mutt-1.4.2.2-3.0.2.el5.i386.rpm
|
SHA-256: 6a4d995393c026da699499a71c51545374a643c727c49f982025e947cf89f5cb |
Red Hat Enterprise Linux Workstation 4
SRPM |
mutt-1.4.1-12.0.3.el4.src.rpm
|
SHA-256: c8fbd14e921615ac98a5ba7e28d784e0001d9af37fafd18a4957ae5176c99559 |
x86_64 |
mutt-1.4.1-12.0.3.el4.x86_64.rpm
|
SHA-256: b9ef28847e04c0cb4c3f825eb6070a0d50cb437e5dde7c7bb7516ff2a8d0f4d3 |
ia64 |
mutt-1.4.1-12.0.3.el4.ia64.rpm
|
SHA-256: 6cae12bf6e4224262eb4837a6caa79930b17b178dff00e52a4ba0603105cda9f |
i386 |
mutt-1.4.1-12.0.3.el4.i386.rpm
|
SHA-256: c41298ab599f33147f78ebf6864e746f046060d63ccc4a84a0ca73e0e58eafbf |
Red Hat Enterprise Linux Workstation 3
Red Hat Enterprise Linux Desktop 5
SRPM |
mutt-1.4.2.2-3.0.2.el5.src.rpm
|
SHA-256: eae2ff04029c7b77221f95a9ce2d23c76b40f87eb35bca3d03cd9081cfb0e31b |
x86_64 |
mutt-1.4.2.2-3.0.2.el5.x86_64.rpm
|
SHA-256: 0012e0f1e532c02bf0cfceb4d2e54e8ecfa806fbab5d470def5f779b571a3b87 |
i386 |
mutt-1.4.2.2-3.0.2.el5.i386.rpm
|
SHA-256: 6a4d995393c026da699499a71c51545374a643c727c49f982025e947cf89f5cb |
Red Hat Enterprise Linux Desktop 4
SRPM |
mutt-1.4.1-12.0.3.el4.src.rpm
|
SHA-256: c8fbd14e921615ac98a5ba7e28d784e0001d9af37fafd18a4957ae5176c99559 |
x86_64 |
mutt-1.4.1-12.0.3.el4.x86_64.rpm
|
SHA-256: b9ef28847e04c0cb4c3f825eb6070a0d50cb437e5dde7c7bb7516ff2a8d0f4d3 |
i386 |
mutt-1.4.1-12.0.3.el4.i386.rpm
|
SHA-256: c41298ab599f33147f78ebf6864e746f046060d63ccc4a84a0ca73e0e58eafbf |
Red Hat Enterprise Linux Desktop 3
Red Hat Enterprise Linux for IBM z Systems 5
SRPM |
mutt-1.4.2.2-3.0.2.el5.src.rpm
|
SHA-256: eae2ff04029c7b77221f95a9ce2d23c76b40f87eb35bca3d03cd9081cfb0e31b |
s390x |
mutt-1.4.2.2-3.0.2.el5.s390x.rpm
|
SHA-256: a3b1fe21d84270fd4a8ed5b3c509d87fa4d6004a44003746ba50c3622a9b62dc |
Red Hat Enterprise Linux for IBM z Systems 4
SRPM |
mutt-1.4.1-12.0.3.el4.src.rpm
|
SHA-256: c8fbd14e921615ac98a5ba7e28d784e0001d9af37fafd18a4957ae5176c99559 |
s390x |
mutt-1.4.1-12.0.3.el4.s390x.rpm
|
SHA-256: da9990406ea7fcad3f65da6c36041473cd060b1964a48ffe90d9af3c1abcc611 |
s390 |
mutt-1.4.1-12.0.3.el4.s390.rpm
|
SHA-256: d3b515c102936aad2c9fdc707d366e7b3e056359b2c138f13ec3e2e957b293c3 |
Red Hat Enterprise Linux for IBM z Systems 3
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.5
SRPM |
mutt-1.4.1-12.0.3.el4.src.rpm
|
SHA-256: c8fbd14e921615ac98a5ba7e28d784e0001d9af37fafd18a4957ae5176c99559 |
s390x |
mutt-1.4.1-12.0.3.el4.s390x.rpm
|
SHA-256: da9990406ea7fcad3f65da6c36041473cd060b1964a48ffe90d9af3c1abcc611 |
s390 |
mutt-1.4.1-12.0.3.el4.s390.rpm
|
SHA-256: d3b515c102936aad2c9fdc707d366e7b3e056359b2c138f13ec3e2e957b293c3 |
Red Hat Enterprise Linux for Power, big endian 5
SRPM |
mutt-1.4.2.2-3.0.2.el5.src.rpm
|
SHA-256: eae2ff04029c7b77221f95a9ce2d23c76b40f87eb35bca3d03cd9081cfb0e31b |
ppc |
mutt-1.4.2.2-3.0.2.el5.ppc.rpm
|
SHA-256: c661c382a9fe36c21998b4716f6e4594de28cfd5740f17ae2f0bdb41fe9c7a57 |
Red Hat Enterprise Linux for Power, big endian 4
SRPM |
mutt-1.4.1-12.0.3.el4.src.rpm
|
SHA-256: c8fbd14e921615ac98a5ba7e28d784e0001d9af37fafd18a4957ae5176c99559 |
ppc |
mutt-1.4.1-12.0.3.el4.ppc.rpm
|
SHA-256: 252997b3555180a91f468170e6e1d9dea03abf84000cde6a07ac2f77f1a5ff2f |
Red Hat Enterprise Linux for Power, big endian 3
Red Hat Enterprise Linux for Power, big endian - Extended Update Support 4.5
SRPM |
mutt-1.4.1-12.0.3.el4.src.rpm
|
SHA-256: c8fbd14e921615ac98a5ba7e28d784e0001d9af37fafd18a4957ae5176c99559 |
ppc |
mutt-1.4.1-12.0.3.el4.ppc.rpm
|
SHA-256: 252997b3555180a91f468170e6e1d9dea03abf84000cde6a07ac2f77f1a5ff2f |
Red Hat Enterprise Linux Server from RHUI 5
SRPM |
mutt-1.4.2.2-3.0.2.el5.src.rpm
|
SHA-256: eae2ff04029c7b77221f95a9ce2d23c76b40f87eb35bca3d03cd9081cfb0e31b |
x86_64 |
mutt-1.4.2.2-3.0.2.el5.x86_64.rpm
|
SHA-256: 0012e0f1e532c02bf0cfceb4d2e54e8ecfa806fbab5d470def5f779b571a3b87 |
i386 |
mutt-1.4.2.2-3.0.2.el5.i386.rpm
|
SHA-256: 6a4d995393c026da699499a71c51545374a643c727c49f982025e947cf89f5cb |