Security alert: Mutt-1.4.2 fixes buffer overflow

Posted by dave on Feb 11, 2004 6:26 AM EDT
Mailing list
Mail this story
Print this story

Mutt-1.4.2 has just been released; this version fixes a buffer overflow that can be triggered by incoming messages. There are reports about spam that has actually triggered this problem and crashed mutt.

Mutt-1.4.2 has just been released; this version fixes a buffer overflow that can be triggered by incoming messages. There are reports about spam that has actually triggered this problem and crashed mutt.

It is recommended that users of mutt versions prior to 1.4.2 upgrade to this version, or apply the patch included below.

Users of "unstable" mutt versions after 1.3.28 (including 1.5.*) do not need to upgrade, as this problem had been fixed in the unstable branch in February 2002; unfortunately, the fix was not backported before 1.4 was released.

mutt-1.4.2 can be found at ftp://ftp.mutt.org/mutt/.

Distribution files:

MD5 checksum                    file name             size
44fc379c317109f516894a7c3fd43cc9  diff-1.4.1i-1.4.2i.gz (23k)
6045b47cbba8170d6a9fdccc1aa817b9  mutt-1.4.2i.tar.gz    (2.4M)

Linux distributors are expected to release updated mutt packages shortly.

Credits: The problem in the stable mutt code base was originally reported to Red Hat, and was brought to my attention by Mark Cox.

The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2004-0078 to this issue.

Regards,
Thomas Roessler

  Nav
» Read more about: Story Type: Security

« Return to the newswire homepage

This topic does not have any threads posted yet!

You cannot post until you login.