1.2
CVSSv2

CVE-2006-5297

Published: 16/10/2006 Updated: 11/10/2017
CVSS v2 Base Score: 1.2 | Impact Score: 2.9 | Exploitability Score: 1.9
VMScore: 107
Vector: AV:L/AC:H/Au:N/C:N/I:P/A:N

Vulnerability Summary

Race condition in the safe_open function in the Mutt mail client 1.5.12 and previous versions, when creating temporary files in an NFS filesystem, allows local users to overwrite arbitrary files due to limitations of the use of the O_EXCL flag on NFS filesystems.

Vulnerable Product Search on Vulmon Subscribe to Product

mutt mutt 1.2.1

mutt mutt 1.2.5

mutt mutt 1.3.12.1

mutt mutt 1.3.16

mutt mutt 1.4.0

mutt mutt 1.4.1

mutt mutt 0.95.6

mutt mutt 1.2.5.5

mutt mutt 1.3.12

mutt mutt 1.3.27

mutt mutt 1.3.28

mutt mutt 1.2.5.1

mutt mutt 1.2.5.12

mutt mutt 1.3.17

mutt mutt 1.3.22

mutt mutt 1.4.2

mutt mutt 1.4.2.1

mutt mutt 1.2.5.12_ol

mutt mutt 1.2.5.4

mutt mutt 1.3.24

mutt mutt 1.3.25

mutt mutt 1.5.10

mutt mutt 1.5.3

mutt mutt

Vendor Advisories

Debian Bug report logs - #396104 CVE-2006-529[78]: tempfile race conditions in mutt Package: mutt; Maintainer for mutt is Mutt maintainers <mutt@packagesdebianorg>; Source for mutt is src:mutt (PTS, buildd, popcon) Reported by: Stefan Fritsch <sf@sfritschde> Date: Sun, 29 Oct 2006 20:33:02 UTC Severity: grave Tag ...
Race conditions were discovered in mutt’s handling of temporary files Under certain conditions when using a shared temp directory (the default), other local users could overwrite arbitrary files owned by the user running mutt This vulnerability is more likely when the temp directory is over NFS ...