Skip to navigation

Security Advisory Moderate: mutt security update

Advisory: RHSA-2007:0386-4
Type: Security Advisory
Severity: Moderate
Issued on: 2007-06-04
Last updated on: 2007-06-04
Affected Products: Red Hat Desktop (v. 3)
Red Hat Desktop (v. 4)
Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux AS (v. 3)
Red Hat Enterprise Linux AS (v. 4)
Red Hat Enterprise Linux AS (v. 4.5.z)
Red Hat Enterprise Linux Desktop (v. 5 client)
Red Hat Enterprise Linux ES (v. 3)
Red Hat Enterprise Linux ES (v. 4)
Red Hat Enterprise Linux ES (v. 4.5.z)
Red Hat Enterprise Linux WS (v. 3)
Red Hat Enterprise Linux WS (v. 4)
CVEs (cve.mitre.org): CVE-2006-5297
CVE-2007-1558
CVE-2007-2683

Details

An updated mutt package that fixes several security bugs is now available for
Red Hat Enterprise Linux 3, 4 and 5.

This update has been rated as having moderate security impact by the Red
Hat Security Response Team.

Mutt is a text-mode mail user agent.

A flaw was found in the way Mutt used temporary files on NFS file systems.
Due to an implementation issue in the NFS protocol, Mutt was not able to
exclusively open a new file. A local attacker could conduct a
time-dependent attack and possibly gain access to e-mail attachments opened
by a victim. (CVE-2006-5297)

A flaw was found in the way Mutt processed certain APOP authentication
requests. By sending certain responses when mutt attempted to authenticate
against an APOP server, a remote attacker could potentially acquire certain
portions of a user's authentication credentials. (CVE-2007-1558)

A flaw was found in the way Mutt handled certain characters in gecos fields
which could lead to a buffer overflow. The gecos field is an entry in the
password database typically used to record general information about the
user. A local attacker could give themselves a carefully crafted "Real
Name" which could execute arbitrary code if a victim uses Mutt and expands
the attackers alias. (CVE-2007-2683)

All users of mutt should upgrade to this updated package, which
contains a backported patches to correct these issues.


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

Updated packages

Red Hat Desktop (v. 3)

SRPMS:
mutt-1.4.1-5.el3.src.rpm     MD5: 8384ce3449be51139647256577f84079
 
IA-32:
mutt-1.4.1-5.el3.i386.rpm     MD5: 2491e70c876b4261c801f5d8f08bb392
 
x86_64:
mutt-1.4.1-5.el3.x86_64.rpm     MD5: 0abea22f29179dd610cf494a5fd6323a
 
Red Hat Desktop (v. 4)

SRPMS:
mutt-1.4.1-12.0.3.el4.src.rpm     MD5: 8b5b2979f71429bc79633117cbfea087
 
IA-32:
mutt-1.4.1-12.0.3.el4.i386.rpm     MD5: f5e48dd55303f02b11e0ad769e089f9a
 
x86_64:
mutt-1.4.1-12.0.3.el4.x86_64.rpm     MD5: eb57c8f98d7efd4bed436348b3ab0d1d
 
Red Hat Enterprise Linux (v. 5 server)

SRPMS:
mutt-1.4.2.2-3.0.2.el5.src.rpm
File outdated by:  RHBA-2012:1143
    MD5: c7d486555a31e762e5c79f7691ba7f19
 
IA-32:
mutt-1.4.2.2-3.0.2.el5.i386.rpm
File outdated by:  RHBA-2012:1143
    MD5: 1a6a3d9926ff827a50d7fefd3ab005a6
 
IA-64:
mutt-1.4.2.2-3.0.2.el5.ia64.rpm
File outdated by:  RHBA-2012:1143
    MD5: 2b8b495900de249098a271b4636744f9
 
PPC:
mutt-1.4.2.2-3.0.2.el5.ppc.rpm
File outdated by:  RHBA-2012:1143
    MD5: de51bdae7b7e88051b090fb70bdcc1d1
 
s390x:
mutt-1.4.2.2-3.0.2.el5.s390x.rpm
File outdated by:  RHBA-2012:1143
    MD5: 5d67045d1f2c21dfb113daed38e6f14c
 
x86_64:
mutt-1.4.2.2-3.0.2.el5.x86_64.rpm
File outdated by:  RHBA-2012:1143
    MD5: 49a78928ccb308daadf1d125a0fabd55
 
Red Hat Enterprise Linux AS (v. 3)

SRPMS:
mutt-1.4.1-5.el3.src.rpm     MD5: 8384ce3449be51139647256577f84079
 
IA-32:
mutt-1.4.1-5.el3.i386.rpm     MD5: 2491e70c876b4261c801f5d8f08bb392
 
IA-64:
mutt-1.4.1-5.el3.ia64.rpm     MD5: c62127857df26687f905249b271b27d6
 
PPC:
mutt-1.4.1-5.el3.ppc.rpm     MD5: 57497e15115caf7d52e7d91ac3e2f554
 
s390:
mutt-1.4.1-5.el3.s390.rpm     MD5: 84e28ce45290142edb5c79c8673a94ee
 
s390x:
mutt-1.4.1-5.el3.s390x.rpm     MD5: ae6de5d72918b2e786cc8b716ee394e2
 
x86_64:
mutt-1.4.1-5.el3.x86_64.rpm     MD5: 0abea22f29179dd610cf494a5fd6323a
 
Red Hat Enterprise Linux AS (v. 4)

SRPMS:
mutt-1.4.1-12.0.3.el4.src.rpm     MD5: 8b5b2979f71429bc79633117cbfea087
 
IA-32:
mutt-1.4.1-12.0.3.el4.i386.rpm     MD5: f5e48dd55303f02b11e0ad769e089f9a
 
IA-64:
mutt-1.4.1-12.0.3.el4.ia64.rpm     MD5: b68fe87f13d4d4349c2fe1227633d96c
 
PPC:
mutt-1.4.1-12.0.3.el4.ppc.rpm     MD5: 483f45a70c44269805327a0b388627a8
 
s390:
mutt-1.4.1-12.0.3.el4.s390.rpm     MD5: 4ea9d9bca972ee5bde1a032438390f9d
 
s390x:
mutt-1.4.1-12.0.3.el4.s390x.rpm     MD5: f9ac874d0337bad04384342c1a97e3ba
 
x86_64:
mutt-1.4.1-12.0.3.el4.x86_64.rpm     MD5: eb57c8f98d7efd4bed436348b3ab0d1d
 
Red Hat Enterprise Linux AS (v. 4.5.z)

SRPMS:
mutt-1.4.1-12.0.3.el4.src.rpm     MD5: 8b5b2979f71429bc79633117cbfea087
 
IA-32:
mutt-1.4.1-12.0.3.el4.i386.rpm     MD5: f5e48dd55303f02b11e0ad769e089f9a
 
IA-64:
mutt-1.4.1-12.0.3.el4.ia64.rpm     MD5: b68fe87f13d4d4349c2fe1227633d96c
 
PPC:
mutt-1.4.1-12.0.3.el4.ppc.rpm     MD5: 483f45a70c44269805327a0b388627a8
 
s390:
mutt-1.4.1-12.0.3.el4.s390.rpm     MD5: 4ea9d9bca972ee5bde1a032438390f9d
 
s390x:
mutt-1.4.1-12.0.3.el4.s390x.rpm     MD5: f9ac874d0337bad04384342c1a97e3ba
 
x86_64:
mutt-1.4.1-12.0.3.el4.x86_64.rpm     MD5: eb57c8f98d7efd4bed436348b3ab0d1d
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
mutt-1.4.2.2-3.0.2.el5.src.rpm
File outdated by:  RHBA-2012:1143
    MD5: c7d486555a31e762e5c79f7691ba7f19
 
IA-32:
mutt-1.4.2.2-3.0.2.el5.i386.rpm
File outdated by:  RHBA-2012:1143
    MD5: 1a6a3d9926ff827a50d7fefd3ab005a6
 
x86_64:
mutt-1.4.2.2-3.0.2.el5.x86_64.rpm
File outdated by:  RHBA-2012:1143
    MD5: 49a78928ccb308daadf1d125a0fabd55
 
Red Hat Enterprise Linux ES (v. 3)

SRPMS:
mutt-1.4.1-5.el3.src.rpm     MD5: 8384ce3449be51139647256577f84079
 
IA-32:
mutt-1.4.1-5.el3.i386.rpm     MD5: 2491e70c876b4261c801f5d8f08bb392
 
IA-64:
mutt-1.4.1-5.el3.ia64.rpm     MD5: c62127857df26687f905249b271b27d6
 
x86_64:
mutt-1.4.1-5.el3.x86_64.rpm     MD5: 0abea22f29179dd610cf494a5fd6323a
 
Red Hat Enterprise Linux ES (v. 4)

SRPMS:
mutt-1.4.1-12.0.3.el4.src.rpm     MD5: 8b5b2979f71429bc79633117cbfea087
 
IA-32:
mutt-1.4.1-12.0.3.el4.i386.rpm     MD5: f5e48dd55303f02b11e0ad769e089f9a
 
IA-64:
mutt-1.4.1-12.0.3.el4.ia64.rpm     MD5: b68fe87f13d4d4349c2fe1227633d96c
 
x86_64:
mutt-1.4.1-12.0.3.el4.x86_64.rpm     MD5: eb57c8f98d7efd4bed436348b3ab0d1d
 
Red Hat Enterprise Linux ES (v. 4.5.z)

SRPMS:
mutt-1.4.1-12.0.3.el4.src.rpm     MD5: 8b5b2979f71429bc79633117cbfea087
 
IA-32:
mutt-1.4.1-12.0.3.el4.i386.rpm     MD5: f5e48dd55303f02b11e0ad769e089f9a
 
IA-64:
mutt-1.4.1-12.0.3.el4.ia64.rpm     MD5: b68fe87f13d4d4349c2fe1227633d96c
 
x86_64:
mutt-1.4.1-12.0.3.el4.x86_64.rpm     MD5: eb57c8f98d7efd4bed436348b3ab0d1d
 
Red Hat Enterprise Linux WS (v. 3)

SRPMS:
mutt-1.4.1-5.el3.src.rpm     MD5: 8384ce3449be51139647256577f84079
 
IA-32:
mutt-1.4.1-5.el3.i386.rpm     MD5: 2491e70c876b4261c801f5d8f08bb392
 
IA-64:
mutt-1.4.1-5.el3.ia64.rpm     MD5: c62127857df26687f905249b271b27d6
 
x86_64:
mutt-1.4.1-5.el3.x86_64.rpm     MD5: 0abea22f29179dd610cf494a5fd6323a
 
Red Hat Enterprise Linux WS (v. 4)

SRPMS:
mutt-1.4.1-12.0.3.el4.src.rpm     MD5: 8b5b2979f71429bc79633117cbfea087
 
IA-32:
mutt-1.4.1-12.0.3.el4.i386.rpm     MD5: f5e48dd55303f02b11e0ad769e089f9a
 
IA-64:
mutt-1.4.1-12.0.3.el4.ia64.rpm     MD5: b68fe87f13d4d4349c2fe1227633d96c
 
x86_64:
mutt-1.4.1-12.0.3.el4.x86_64.rpm     MD5: eb57c8f98d7efd4bed436348b3ab0d1d
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

211085 - CVE-2006-5297 Multiple mutt tempfile race conditions
239890 - CVE-2007-2683 Buffer overflow in mutt's gecos structure handling
241191 - CVE-2007-1558 fetchmail, mutt: APOP vulnerability


References


Keywords

/tmp, APOP, buffer, gecos, NFS, overflow, O_EXCL, race


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/