int(3193)

Vulnerability Bulletins


Desbordamiento de búfer en Mutt

Vulnerability classification

Property Value
Confidence level Oficial
Impact Obtener acceso
Dificulty Experto
Required attacker level Acceso remoto con cuenta

System information

Property Value
Affected manufacturer GNU/Linux
Affected software Mutt 1.4.2

Description

Se ha encontrado una vulnerabilidad del tipo desbordamiento de búfer en Mutt en la versión 1.4.2. La vulnerabilidad reside en un error al manejar determinados caracteres en los campos gecos.

Un atacante local podría ejecutar código remoto mediante el uso de caracteres "&" en el campo gecos.

Solution



Actualización de software

Red Hat (RHSA-2007:0386-4)
Red Hat Desktop (v. 3)
Red Hat Desktop (v. 4)
Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux AS (v. 3)
Red Hat Enterprise Linux AS (v. 4)
Red Hat Enterprise Linux Desktop (v. 5 client)
Red Hat Enterprise Linux ES (v. 3)
Red Hat Enterprise Linux ES (v. 4)
Red Hat Enterprise Linux WS (v. 3)
Red Hat Enterprise Linux WS (v. 4)
https://rhn.redhat.com/

Mandriva

Corporate Server 3.0
X86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/i586/mutt-1.5.5.1i-2.3.C30mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/i586/mutt-utf8-1.5.5.1i-2.3.C30mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/SRPMS/mutt-1.5.5.1i-2.3.C30mdk.src.rpm
X86_64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/x86_64/mutt-1.5.5.1i-2.3.C30mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/x86_64/mutt-utf8-1.5.5.1i-2.3.C30mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/SRPMS/mutt-1.5.5.1i-2.3.C30mdk.src.rpm

Mandriva Linux 2007
X86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/i586/mutt-1.5.11-5.2mdv2007.0.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/i586/mutt-utf8-1.5.11-5.2mdv2007.0.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/SRPMS/mutt-1.5.11-5.2mdv2007.0.src.rpm
X86_64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/x86_64/mutt-1.5.11-5.2mdv2007.0.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/x86_64/mutt-utf8-1.5.11-5.2mdv2007.0.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/SRPMS/mutt-1.5.11-5.2mdv2007.0.src.rpm

Mandriva Linux 2007.1
X86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.1/i586/mutt-1.5.14-1.1mdv2007.1.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.1/i586/mutt-utf8-1.5.14-1.1mdv2007.1.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.1/SRPMS/mutt-1.5.14-1.1mdv2007.1.src.rpm
X86_64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.1/x86_64/mutt-1.5.14-1.1mdv2007.1.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.1/x86_64/mutt-utf8-1.5.14-1.1mdv2007.1.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.1/SRPMS/mutt-1.5.14-1.1mdv2007.1.src.rpm

SGI
Advanced Linux Environment 3 / RPM / Patch 10415
ftp://oss.sgi.com/projects/sgi_propack/download/3/updates/RPMS
Advanced Linux Environment 3 / SRPM / Patch 10415
ftp://oss.sgi.com/projects/sgi_propack/download/3/updates/SRPMS

Standar resources

Property Value
CVE CVE-2007-2683
BID

Other resources

Red Hat Security Advisory (RHSA-2007:0386-4)
https://rhn.redhat.com/errata/RHSA-2007-0386.html

Mandriva Security Advisory (MDKSA-2007:113)
http://www.mandriva.com/security/advisories?name=MDKSA-2007:113

SGI Security Advisory (20070601-01-P)
ftp://patches.sgi.com/support/free/security/advisories/20070601-01-P.asc

Version history

Version Comments Date
1.0 Aviso emitido 2007-06-05
1.1 Aviso emitido por Mandriva (MDKSA-2007:113) 2007-06-06
1.2 Aviso emitido por SGI (20070601-01-P) 2007-06-11
Ministerio de Defensa
CNI
CCN
CCN-CERT