Synopsis
Moderate: mutt security update
Type/Severity
Security Advisory: Moderate
Topic
An updated mutt package that fixes several security bugs is now available for
Red Hat Enterprise Linux 3, 4 and 5.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
Description
Mutt is a text-mode mail user agent.
A flaw was found in the way Mutt used temporary files on NFS file systems.
Due to an implementation issue in the NFS protocol, Mutt was not able to
exclusively open a new file. A local attacker could conduct a
time-dependent attack and possibly gain access to e-mail attachments opened
by a victim. (CVE-2006-5297)
A flaw was found in the way Mutt processed certain APOP authentication
requests. By sending certain responses when mutt attempted to authenticate
against an APOP server, a remote attacker could potentially acquire certain
portions of a user's authentication credentials. (CVE-2007-1558)
A flaw was found in the way Mutt handled certain characters in gecos fields
which could lead to a buffer overflow. The gecos field is an entry in the
password database typically used to record general information about the
user. A local attacker could give themselves a carefully crafted "Real
Name" which could execute arbitrary code if a victim uses Mutt and expands
the attackers alias. (CVE-2007-2683)
All users of mutt should upgrade to this updated package, which
contains a backported patches to correct these issues.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188
Affected Products
-
Red Hat Enterprise Linux Server 5 x86_64
-
Red Hat Enterprise Linux Server 5 ia64
-
Red Hat Enterprise Linux Server 5 i386
-
Red Hat Enterprise Linux Server 4 x86_64
-
Red Hat Enterprise Linux Server 4 ia64
-
Red Hat Enterprise Linux Server 4 i386
-
Red Hat Enterprise Linux Server 3 x86_64
-
Red Hat Enterprise Linux Server 3 ia64
-
Red Hat Enterprise Linux Server 3 i386
-
Red Hat Enterprise Linux Server - Extended Update Support 4.5 x86_64
-
Red Hat Enterprise Linux Server - Extended Update Support 4.5 ia64
-
Red Hat Enterprise Linux Server - Extended Update Support 4.5 i386
-
Red Hat Enterprise Linux Workstation 5 x86_64
-
Red Hat Enterprise Linux Workstation 5 i386
-
Red Hat Enterprise Linux Workstation 4 x86_64
-
Red Hat Enterprise Linux Workstation 4 ia64
-
Red Hat Enterprise Linux Workstation 4 i386
-
Red Hat Enterprise Linux Workstation 3 x86_64
-
Red Hat Enterprise Linux Workstation 3 ia64
-
Red Hat Enterprise Linux Workstation 3 i386
-
Red Hat Enterprise Linux Desktop 5 x86_64
-
Red Hat Enterprise Linux Desktop 5 i386
-
Red Hat Enterprise Linux Desktop 4 x86_64
-
Red Hat Enterprise Linux Desktop 4 i386
-
Red Hat Enterprise Linux Desktop 3 x86_64
-
Red Hat Enterprise Linux Desktop 3 i386
-
Red Hat Enterprise Linux for IBM z Systems 5 s390x
-
Red Hat Enterprise Linux for IBM z Systems 4 s390x
-
Red Hat Enterprise Linux for IBM z Systems 4 s390
-
Red Hat Enterprise Linux for IBM z Systems 3 s390x
-
Red Hat Enterprise Linux for IBM z Systems 3 s390
-
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.5 s390x
-
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.5 s390
-
Red Hat Enterprise Linux for Power, big endian 5 ppc
-
Red Hat Enterprise Linux for Power, big endian 4 ppc
-
Red Hat Enterprise Linux for Power, big endian 3 ppc
-
Red Hat Enterprise Linux for Power, big endian - Extended Update Support 4.5 ppc
-
Red Hat Enterprise Linux Server from RHUI 5 x86_64
-
Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 211085 - CVE-2006-5297 Multiple mutt tempfile race conditions
- BZ - 239890 - CVE-2007-2683 Buffer overflow in mutt's gecos structure handling
- BZ - 241191 - CVE-2007-1558 fetchmail, mutt: APOP vulnerability
CVEs
References
Note:
More recent versions of these packages may be available.
Click a package name for more details.
Red Hat Enterprise Linux Server 5
| SRPM |
|
mutt-1.4.2.2-3.0.2.el5.src.rpm
|
SHA-256: eae2ff04029c7b77221f95a9ce2d23c76b40f87eb35bca3d03cd9081cfb0e31b |
| x86_64 |
|
mutt-1.4.2.2-3.0.2.el5.x86_64.rpm
|
SHA-256: 0012e0f1e532c02bf0cfceb4d2e54e8ecfa806fbab5d470def5f779b571a3b87 |
| ia64 |
|
mutt-1.4.2.2-3.0.2.el5.ia64.rpm
|
SHA-256: 4861e29b66889158a941112a6ed84e4e57797e8eeef0d45d7852bb3518043dff |
| i386 |
|
mutt-1.4.2.2-3.0.2.el5.i386.rpm
|
SHA-256: 6a4d995393c026da699499a71c51545374a643c727c49f982025e947cf89f5cb |
Red Hat Enterprise Linux Server 4
| SRPM |
|
mutt-1.4.1-12.0.3.el4.src.rpm
|
SHA-256: c8fbd14e921615ac98a5ba7e28d784e0001d9af37fafd18a4957ae5176c99559 |
| x86_64 |
|
mutt-1.4.1-12.0.3.el4.x86_64.rpm
|
SHA-256: b9ef28847e04c0cb4c3f825eb6070a0d50cb437e5dde7c7bb7516ff2a8d0f4d3 |
|
mutt-1.4.1-12.0.3.el4.x86_64.rpm
|
SHA-256: b9ef28847e04c0cb4c3f825eb6070a0d50cb437e5dde7c7bb7516ff2a8d0f4d3 |
| ia64 |
|
mutt-1.4.1-12.0.3.el4.ia64.rpm
|
SHA-256: 6cae12bf6e4224262eb4837a6caa79930b17b178dff00e52a4ba0603105cda9f |
|
mutt-1.4.1-12.0.3.el4.ia64.rpm
|
SHA-256: 6cae12bf6e4224262eb4837a6caa79930b17b178dff00e52a4ba0603105cda9f |
| i386 |
|
mutt-1.4.1-12.0.3.el4.i386.rpm
|
SHA-256: c41298ab599f33147f78ebf6864e746f046060d63ccc4a84a0ca73e0e58eafbf |
|
mutt-1.4.1-12.0.3.el4.i386.rpm
|
SHA-256: c41298ab599f33147f78ebf6864e746f046060d63ccc4a84a0ca73e0e58eafbf |
Red Hat Enterprise Linux Server - Extended Update Support 4.5
| SRPM |
|
mutt-1.4.1-12.0.3.el4.src.rpm
|
SHA-256: c8fbd14e921615ac98a5ba7e28d784e0001d9af37fafd18a4957ae5176c99559 |
| x86_64 |
|
mutt-1.4.1-12.0.3.el4.x86_64.rpm
|
SHA-256: b9ef28847e04c0cb4c3f825eb6070a0d50cb437e5dde7c7bb7516ff2a8d0f4d3 |
|
mutt-1.4.1-12.0.3.el4.x86_64.rpm
|
SHA-256: b9ef28847e04c0cb4c3f825eb6070a0d50cb437e5dde7c7bb7516ff2a8d0f4d3 |
| ia64 |
|
mutt-1.4.1-12.0.3.el4.ia64.rpm
|
SHA-256: 6cae12bf6e4224262eb4837a6caa79930b17b178dff00e52a4ba0603105cda9f |
|
mutt-1.4.1-12.0.3.el4.ia64.rpm
|
SHA-256: 6cae12bf6e4224262eb4837a6caa79930b17b178dff00e52a4ba0603105cda9f |
| i386 |
|
mutt-1.4.1-12.0.3.el4.i386.rpm
|
SHA-256: c41298ab599f33147f78ebf6864e746f046060d63ccc4a84a0ca73e0e58eafbf |
|
mutt-1.4.1-12.0.3.el4.i386.rpm
|
SHA-256: c41298ab599f33147f78ebf6864e746f046060d63ccc4a84a0ca73e0e58eafbf |
Red Hat Enterprise Linux Workstation 5
| SRPM |
|
mutt-1.4.2.2-3.0.2.el5.src.rpm
|
SHA-256: eae2ff04029c7b77221f95a9ce2d23c76b40f87eb35bca3d03cd9081cfb0e31b |
| x86_64 |
|
mutt-1.4.2.2-3.0.2.el5.x86_64.rpm
|
SHA-256: 0012e0f1e532c02bf0cfceb4d2e54e8ecfa806fbab5d470def5f779b571a3b87 |
| i386 |
|
mutt-1.4.2.2-3.0.2.el5.i386.rpm
|
SHA-256: 6a4d995393c026da699499a71c51545374a643c727c49f982025e947cf89f5cb |
Red Hat Enterprise Linux Workstation 4
| SRPM |
|
mutt-1.4.1-12.0.3.el4.src.rpm
|
SHA-256: c8fbd14e921615ac98a5ba7e28d784e0001d9af37fafd18a4957ae5176c99559 |
| x86_64 |
|
mutt-1.4.1-12.0.3.el4.x86_64.rpm
|
SHA-256: b9ef28847e04c0cb4c3f825eb6070a0d50cb437e5dde7c7bb7516ff2a8d0f4d3 |
| ia64 |
|
mutt-1.4.1-12.0.3.el4.ia64.rpm
|
SHA-256: 6cae12bf6e4224262eb4837a6caa79930b17b178dff00e52a4ba0603105cda9f |
| i386 |
|
mutt-1.4.1-12.0.3.el4.i386.rpm
|
SHA-256: c41298ab599f33147f78ebf6864e746f046060d63ccc4a84a0ca73e0e58eafbf |
Red Hat Enterprise Linux Desktop 5
| SRPM |
|
mutt-1.4.2.2-3.0.2.el5.src.rpm
|
SHA-256: eae2ff04029c7b77221f95a9ce2d23c76b40f87eb35bca3d03cd9081cfb0e31b |
| x86_64 |
|
mutt-1.4.2.2-3.0.2.el5.x86_64.rpm
|
SHA-256: 0012e0f1e532c02bf0cfceb4d2e54e8ecfa806fbab5d470def5f779b571a3b87 |
| i386 |
|
mutt-1.4.2.2-3.0.2.el5.i386.rpm
|
SHA-256: 6a4d995393c026da699499a71c51545374a643c727c49f982025e947cf89f5cb |
Red Hat Enterprise Linux Desktop 4
| SRPM |
|
mutt-1.4.1-12.0.3.el4.src.rpm
|
SHA-256: c8fbd14e921615ac98a5ba7e28d784e0001d9af37fafd18a4957ae5176c99559 |
| x86_64 |
|
mutt-1.4.1-12.0.3.el4.x86_64.rpm
|
SHA-256: b9ef28847e04c0cb4c3f825eb6070a0d50cb437e5dde7c7bb7516ff2a8d0f4d3 |
| i386 |
|
mutt-1.4.1-12.0.3.el4.i386.rpm
|
SHA-256: c41298ab599f33147f78ebf6864e746f046060d63ccc4a84a0ca73e0e58eafbf |
Red Hat Enterprise Linux for IBM z Systems 5
| SRPM |
|
mutt-1.4.2.2-3.0.2.el5.src.rpm
|
SHA-256: eae2ff04029c7b77221f95a9ce2d23c76b40f87eb35bca3d03cd9081cfb0e31b |
| s390x |
|
mutt-1.4.2.2-3.0.2.el5.s390x.rpm
|
SHA-256: a3b1fe21d84270fd4a8ed5b3c509d87fa4d6004a44003746ba50c3622a9b62dc |
Red Hat Enterprise Linux for IBM z Systems 4
| SRPM |
|
mutt-1.4.1-12.0.3.el4.src.rpm
|
SHA-256: c8fbd14e921615ac98a5ba7e28d784e0001d9af37fafd18a4957ae5176c99559 |
| s390x |
|
mutt-1.4.1-12.0.3.el4.s390x.rpm
|
SHA-256: da9990406ea7fcad3f65da6c36041473cd060b1964a48ffe90d9af3c1abcc611 |
| s390 |
|
mutt-1.4.1-12.0.3.el4.s390.rpm
|
SHA-256: d3b515c102936aad2c9fdc707d366e7b3e056359b2c138f13ec3e2e957b293c3 |
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.5
| SRPM |
|
mutt-1.4.1-12.0.3.el4.src.rpm
|
SHA-256: c8fbd14e921615ac98a5ba7e28d784e0001d9af37fafd18a4957ae5176c99559 |
| s390x |
|
mutt-1.4.1-12.0.3.el4.s390x.rpm
|
SHA-256: da9990406ea7fcad3f65da6c36041473cd060b1964a48ffe90d9af3c1abcc611 |
| s390 |
|
mutt-1.4.1-12.0.3.el4.s390.rpm
|
SHA-256: d3b515c102936aad2c9fdc707d366e7b3e056359b2c138f13ec3e2e957b293c3 |
Red Hat Enterprise Linux for Power, big endian 5
| SRPM |
|
mutt-1.4.2.2-3.0.2.el5.src.rpm
|
SHA-256: eae2ff04029c7b77221f95a9ce2d23c76b40f87eb35bca3d03cd9081cfb0e31b |
| ppc |
|
mutt-1.4.2.2-3.0.2.el5.ppc.rpm
|
SHA-256: c661c382a9fe36c21998b4716f6e4594de28cfd5740f17ae2f0bdb41fe9c7a57 |
Red Hat Enterprise Linux for Power, big endian 4
| SRPM |
|
mutt-1.4.1-12.0.3.el4.src.rpm
|
SHA-256: c8fbd14e921615ac98a5ba7e28d784e0001d9af37fafd18a4957ae5176c99559 |
| ppc |
|
mutt-1.4.1-12.0.3.el4.ppc.rpm
|
SHA-256: 252997b3555180a91f468170e6e1d9dea03abf84000cde6a07ac2f77f1a5ff2f |
Red Hat Enterprise Linux for Power, big endian - Extended Update Support 4.5
| SRPM |
|
mutt-1.4.1-12.0.3.el4.src.rpm
|
SHA-256: c8fbd14e921615ac98a5ba7e28d784e0001d9af37fafd18a4957ae5176c99559 |
| ppc |
|
mutt-1.4.1-12.0.3.el4.ppc.rpm
|
SHA-256: 252997b3555180a91f468170e6e1d9dea03abf84000cde6a07ac2f77f1a5ff2f |
Red Hat Enterprise Linux Server from RHUI 5
| SRPM |
|
mutt-1.4.2.2-3.0.2.el5.src.rpm
|
SHA-256: eae2ff04029c7b77221f95a9ce2d23c76b40f87eb35bca3d03cd9081cfb0e31b |
| x86_64 |
|
mutt-1.4.2.2-3.0.2.el5.x86_64.rpm
|
SHA-256: 0012e0f1e532c02bf0cfceb4d2e54e8ecfa806fbab5d470def5f779b571a3b87 |
| i386 |
|
mutt-1.4.2.2-3.0.2.el5.i386.rpm
|
SHA-256: 6a4d995393c026da699499a71c51545374a643c727c49f982025e947cf89f5cb |