==========================================================================
Ubuntu Security Notice USN-2147-1
March 13, 2014
mutt vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 13.10
– Ubuntu 12.10
– Ubuntu 12.04 LTS
– Ubuntu 10.04 LTS
Summary:
The mutt mail client could be made to crash or run programs as your
login if it opened a specially crafted email.
Software Description:
– mutt: text-based mailreader supporting MIME, GPG, PGP and threading
Details:
Beatrice Torracca and Evgeni Golov discovered a buffer overflow
in mutt while expanding addresses when parsing email headers. An
attacker could specially craft an email to cause mutt to crash,
resulting in a denial of service, or possibly execute arbitrary code
with the privileges of the user invoking mutt.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 13.10:
mutt 1.5.21-6.4ubuntu1.1
mutt-patched 1.5.21-6.4ubuntu1.1
Ubuntu 12.10:
mutt 1.5.21-6ubuntu0.1
mutt-patched 1.5.21-6ubuntu0.1
Ubuntu 12.04 LTS:
mutt 1.5.21-5ubuntu2.1
mutt-patched 1.5.21-5ubuntu2.1
Ubuntu 10.04 LTS:
mutt 1.5.20-7ubuntu1.2
mutt-patched 1.5.20-7ubuntu1.2
After a standard system update you need to restart mutt to make
all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-2147-1
CVE-2014-0467
Package Information:
https://launchpad.net/ubuntu/+source/mutt/1.5.21-6.4ubuntu1.1
https://launchpad.net/ubuntu/+source/mutt/1.5.21-6ubuntu0.1
https://launchpad.net/ubuntu/+source/mutt/1.5.21-5ubuntu2.1
https://launchpad.net/ubuntu/+source/mutt/1.5.20-7ubuntu1.2
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1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=s/Z2
—–END PGP SIGNATURE—–
—