Home > Security > Advisories

Advisories

Mandriva Advisories

Package name mutt
Date January 8th, 2002
Advisory ID MDKSA-2002:002
Affected versions 7.1, 7.2, 8.0, 8.1, CS1.0
Synopsis Updated mutt packages fix buffer overflow

Problem Description

Joost Pol reported a remotely exploitable buffer overflow in the mutt
email client. It is recommended that all mutt users upgrade their
packages immediately.

Updated Packages

Mandrakelinux 7.1

 dc0844339910b9ec881bcbda9386bc11  7.1/RPMS/mutt-1.2.5i-6.1mdk.i586.rpm
08e163b11b3ed5db88cc835d98240a87  7.1/SRPMS/mutt-1.2.5i-6.1mdk.src.rpm

Mandrakelinux 7.2

 edb37e0a3eff7cb05b5552e793cd9584  7.2/RPMS/mutt-1.2.5i-6.2mdk.i586.rpm
da26b763cbd25cb70b7dc7ea0eb67f80  7.2/SRPMS/mutt-1.2.5i-6.2mdk.src.rpm

Mandrakelinux 8.0

 155bec67a9f85c0d83f47a9521a177eb  8.0/RPMS/mutt-1.3.25i-1.1mdk.i586.rpm
39c63a5b76b6956f0d750970c58ab952  8.0/SRPMS/mutt-1.3.25i-1.1mdk.src.rpm

Mandrakelinux 8.0/PPC

 0adec05415db85e16cd462380e695e34  ppc/8.0/RPMS/mutt-1.3.25i-1.1mdk.ppc.rpm
39c63a5b76b6956f0d750970c58ab952  ppc/8.0/SRPMS/mutt-1.3.25i-1.1mdk.src.rpm

Mandrakelinux 8.1

 ed4d390b9b84dbff3a049b1f4b56aece  8.1/RPMS/mutt-1.3.25i-1.1mdk.i586.rpm
39c63a5b76b6956f0d750970c58ab952  8.1/SRPMS/mutt-1.3.25i-1.1mdk.src.rpm

Mandrakelinux 8.1/IA64

 bf0fb036e1fd4a263ff2f05fe3a0b29b  ia64/8.1/RPMS/mutt-1.3.25i-1.1mdk.ia64.rpm
39c63a5b76b6956f0d750970c58ab952  ia64/8.1/SRPMS/mutt-1.3.25i-1.1mdk.src.rpm

Corporate Server 1.0.1

 dc0844339910b9ec881bcbda9386bc11  1.0.1/RPMS/mutt-1.2.5i-6.1mdk.i586.rpm
08e163b11b3ed5db88cc835d98240a87  1.0.1/SRPMS/mutt-1.2.5i-6.1mdk.src.rpm

References

http://online.securityfocus.com/bid/3774

Upgrade

To upgrade automatically, use MandrivaUpdate.


Verification

Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command :

                rpm --checksig package.rpm
                

You can get the GPG public key of the Mandriva Security Team to verify the GPG signature of each RPM.

If you use MandrivaUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.