Home > Security > Advisories

Advisories

Mandriva Advisories

Package name mutt
Date January 17th, 2002
Advisory ID MDKSA-2002:002-1
Affected versions 7.1, 7.2, 8.0, 8.1, CS1.0
Synopsis Updated mutt packages fix buffer overflow

Problem Description

Joost Pol reported a remotely exploitable buffer overflow in the mutt
email client. It is recommended that all mutt users upgrade their
packages immediately.

Update:

The previous packages released for 8.x were unable to recall postponed
messages due to an incorrect patch. These new packages also provide
the compressed folders patch that was unavailable when MDKSA-2002:002
was announced.

Updated Packages

Mandrakelinux 7.1

 dc0844339910b9ec881bcbda9386bc11  7.1/RPMS/mutt-1.2.5i-6.1mdk.i586.rpm
08e163b11b3ed5db88cc835d98240a87  7.1/SRPMS/mutt-1.2.5i-6.1mdk.src.rpm

Mandrakelinux 7.2

 edb37e0a3eff7cb05b5552e793cd9584  7.2/RPMS/mutt-1.2.5i-6.2mdk.i586.rpm
da26b763cbd25cb70b7dc7ea0eb67f80  7.2/SRPMS/mutt-1.2.5i-6.2mdk.src.rpm

Mandrakelinux 8.0

 55ab5eee102e0f4654bbc889cde06fab  8.0/RPMS/mutt-1.3.25i-1.2mdk.i586.rpm
09345e308a1e7ab87be085f58287e430  8.0/SRPMS/mutt-1.3.25i-1.2mdk.src.rpm

Mandrakelinux 8.0/PPC

 288ee63878e6b442f6eb5e8ac8b5eb2d  ppc/8.0/RPMS/mutt-1.3.25i-1.2mdk.ppc.rpm
09345e308a1e7ab87be085f58287e430  ppc/8.0/SRPMS/mutt-1.3.25i-1.2mdk.src.rpm

Mandrakelinux 8.1

 86ba9f85f30adafa7132ca3a4b3af151  8.1/RPMS/mutt-1.3.25i-1.2mdk.i586.rpm
09345e308a1e7ab87be085f58287e430  8.1/SRPMS/mutt-1.3.25i-1.2mdk.src.rpm

Mandrakelinux 8.1/IA64

 e92bb7c4e0cc3ff3758671908fc5c59b  ia64/8.1/RPMS/mutt-1.3.25i-1.2mdk.ia64.rpm
09345e308a1e7ab87be085f58287e430  ia64/8.1/SRPMS/mutt-1.3.25i-1.2mdk.src.rpm

Corporate Server 1.0.1

 dc0844339910b9ec881bcbda9386bc11  1.0.1/RPMS/mutt-1.2.5i-6.1mdk.i586.rpm
08e163b11b3ed5db88cc835d98240a87  1.0.1/SRPMS/mutt-1.2.5i-6.1mdk.src.rpm

References

http://online.securityfocus.com/bid/3774

Upgrade

To upgrade automatically, use MandrivaUpdate.


Verification

Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command :

                rpm --checksig package.rpm
                

You can get the GPG public key of the Mandriva Security Team to verify the GPG signature of each RPM.

If you use MandrivaUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.