1.2
CVSSv2

CVE-2006-5298

Published: 16/10/2006 Updated: 18/10/2016
CVSS v2 Base Score: 1.2 | Impact Score: 2.9 | Exploitability Score: 1.9
VMScore: 107
Vector: AV:L/AC:H/Au:N/C:N/I:P/A:N

Vulnerability Summary

The mutt_adv_mktemp function in the Mutt mail client 1.5.12 and previous versions does not properly verify that temporary files have been created with restricted permissions, which might allow local users to create files with weak permissions via a race condition between the mktemp and safe_fopen function calls.

Vulnerable Product Search on Vulmon Subscribe to Product

mutt mutt 1.2.1

mutt mutt 1.2.5

mutt mutt 1.3.12.1

mutt mutt 1.3.16

mutt mutt 1.4.0

mutt mutt 1.4.1

mutt mutt 0.95.6

mutt mutt 1.2.5.5

mutt mutt 1.3.12

mutt mutt 1.3.27

mutt mutt 1.3.28

mutt mutt 1.2.5.1

mutt mutt 1.2.5.12

mutt mutt 1.3.17

mutt mutt 1.3.22

mutt mutt 1.4.2

mutt mutt 1.4.2.1

mutt mutt 1.5.10

mutt mutt 1.2.5.12_ol

mutt mutt 1.2.5.4

mutt mutt 1.3.24

mutt mutt 1.3.25

mutt mutt 1.5.3

mutt mutt

Vendor Advisories

Debian Bug report logs - #396104 CVE-2006-529[78]: tempfile race conditions in mutt Package: mutt; Maintainer for mutt is Mutt maintainers <mutt@packagesdebianorg>; Source for mutt is src:mutt (PTS, buildd, popcon) Reported by: Stefan Fritsch <sf@sfritschde> Date: Sun, 29 Oct 2006 20:33:02 UTC Severity: grave Tag ...
Race conditions were discovered in mutt’s handling of temporary files Under certain conditions when using a shared temp directory (the default), other local users could overwrite arbitrary files owned by the user running mutt This vulnerability is more likely when the temp directory is over NFS ...