7.5
CVSSv2

CVE-2006-3242

Published: 27/06/2006 Updated: 07/11/2023
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Stack-based buffer overflow in the browse_get_namespace function in imap/browse.c of Mutt 1.4.2.1 and previous versions allows remote malicious users to cause a denial of service (crash) or execute arbitrary code via long namespaces received from the IMAP server.

Vulnerable Product Search on Vulmon Subscribe to Product

mutt mutt 1.4.2.1

mutt mutt 1.4.2

Vendor Advisories

Debian Bug report logs - #375828 mutt: IMAP remote code execution Package: mutt; Maintainer for mutt is Mutt maintainers <mutt@packagesdebianorg>; Source for mutt is src:mutt (PTS, buildd, popcon) Reported by: Martin Pitt <martinpitt@ubuntucom> Date: Wed, 28 Jun 2006 11:03:03 UTC Severity: important Tags: patch, ...
It was discovered that the mutt mail reader performs insufficient validation of values returned from an IMAP server, which might overflow a buffer and potentially lead to the injection of arbitrary code For the stable distribution (sarge) this problem has been fixed in version 159-2sarge2 For the unstable distribution (sid) this problem has bee ...

References

NVD-CWE-Otherhttp://dev.mutt.org/cgi-bin/viewcvs.cgi/mutt/imap/browse.c?r1=1.34.2.2&r2=1.34.2.3http://www.securityfocus.com/bid/18642http://secunia.com/advisories/20810http://www.gentoo.org/security/en/glsa/glsa-200606-27.xmlhttp://secunia.com/advisories/20854http://secunia.com/advisories/20879http://secunia.com/advisories/20836https://issues.rpath.com/browse/RPL-471http://secunia.com/advisories/20895http://www.trustix.org/errata/2006/0038http://secunia.com/advisories/20887http://www.debian.org/security/2006/dsa-1108http://www.redhat.com/support/errata/RHSA-2006-0577.htmlhttp://www.openpkg.org/security/advisories/OpenPKG-SA-2006.013-mutt.htmlhttp://securitytracker.com/id?1016482http://secunia.com/advisories/21039http://www.novell.com/linux/security/advisories/2006_16_sr.htmlhttp://secunia.com/advisories/21124ftp://patches.sgi.com/support/free/security/advisories/20060701-01-Uhttp://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472221http://secunia.com/advisories/21135http://secunia.com/advisories/21220http://secunia.com/advisories/20960http://www.mandriva.com/security/advisories?name=MDKSA-2006:115http://www.vupen.com/english/advisories/2006/2522https://exchange.xforce.ibmcloud.com/vulnerabilities/27428https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10826https://usn.ubuntu.com/307-1/http://www.securityfocus.com/archive/1/438712/100/0/threadedhttp://dev.mutt.org/cgi-bin/gitweb.cgi?p=mutt/.git%3Ba=commit%3Bh=dc0272b749f0e2b102973b7ac43dbd3908507540https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=375828https://nvd.nist.govhttps://www.debian.org/security/./dsa-1108