Boletines de Vulnerabilidades |
Ejecución remota de código en Mutt |
|
Clasificación de la vulnerabilidad |
|
Propiedad | Valor |
Nivel de Confianza | Oficial |
Impacto | Obtener acceso |
Dificultad | Experto |
Requerimientos del atacante | Acceso remoto sin cuenta a un servicio exotico |
Información sobre el sistema |
|
Propiedad | Valor |
Fabricante afectado | GNU/Linux |
Software afectado | Mutt <= 1.4.2.1 |
Descripción |
|
Se ha descubierto una vulnerabilidad de tipo desbordamiento de búfer en Mutt 1.4.2.1 y anteriores. La vulnerabilidad reside en un error en la función "browse_get_namespace" en "imap/browse.c". Un atacante remoto podría causar una denegación de servicio o ejecutar código arbitrario mediante un servidor IMAP que envíe espacios de nombre (namespaces) especialmente diseñados. |
|
Solución |
|
Actualización de software Mandriva Corporate Server 3.0 X86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/mutt-1.5.5.1i-2.1.C30mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/mutt-utf8-1.5.5.1i-2.1.C30mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/SRPMS/mutt-1.5.5.1i-2.1.C30mdk.src.rpm X86_64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/3.0/RPMS/mutt-1.5.5.1i-2.1.C30mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/3.0/RPMS/mutt-utf8-1.5.5.1i-2.1.C30mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/3.0/SRPMS/mutt-1.5.5.1i-2.1.C30mdk.src.rpm Mandrivalinux LE2005 X86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.2/RPMS/mutt-1.5.6i-5.1.102mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.2/RPMS/mutt-utf8-1.5.6i-5.1.102mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.2/SRPMS/mutt-1.5.6i-5.1.102mdk.src.rpm X86_64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.2/RPMS/mutt-1.5.6i-5.1.102mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.2/RPMS/mutt-utf8-1.5.6i-5.1.102mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.2/SRPMS/mutt-1.5.6i-5.1.102mdk.src.rpm Mandrivalinux 2006 X86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2006.0/RPMS/mutt-1.5.9i-9.1.20060mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2006.0/RPMS/mutt-utf8-1.5.9i-9.1.20060mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2006.0/SRPMS/mutt-1.5.9i-9.1.20060mdk.src.rpm X86_64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/2006.0/RPMS/mutt-1.5.9i-9.1.20060mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/2006.0/RPMS/mutt-utf8-1.5.9i-9.1.20060mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/2006.0/SRPMS/mutt-1.5.9i-9.1.20060mdk.src.rpm Debian Debian Linux 3.1 Source http://security.debian.org/pool/updates/main/m/mutt/mutt_1.5.9-2sarge2.dsc http://security.debian.org/pool/updates/main/m/mutt/mutt_1.5.9-2sarge2.diff.gz http://security.debian.org/pool/updates/main/m/mutt/mutt_1.5.9.orig.tar.gz Alpha http://security.debian.org/pool/updates/main/m/mutt/mutt_1.5.9-2sarge2_alpha.deb AMD64 http://security.debian.org/pool/updates/main/m/mutt/mutt_1.5.9-2sarge2_amd64.deb ARM http://security.debian.org/pool/updates/main/m/mutt/mutt_1.5.9-2sarge2_arm.deb Intel IA-32 http://security.debian.org/pool/updates/main/m/mutt/mutt_1.5.9-2sarge2_i386.deb Intel IA-64 http://security.debian.org/pool/updates/main/m/mutt/mutt_1.5.9-2sarge2_ia64.deb HP Precision http://security.debian.org/pool/updates/main/m/mutt/mutt_1.5.9-2sarge2_hppa.deb Motorola 680x0 http://security.debian.org/pool/updates/main/m/mutt/mutt_1.5.9-2sarge2_m68k.deb Big endian MIPS http://security.debian.org/pool/updates/main/m/mutt/mutt_1.5.9-2sarge2_mips.deb Little endian MIPS http://security.debian.org/pool/updates/main/m/mutt/mutt_1.5.9-2sarge2_mipsel.deb PowerPC http://security.debian.org/pool/updates/main/m/mutt/mutt_1.5.9-2sarge2_powerpc.deb IBM S/390 http://security.debian.org/pool/updates/main/m/mutt/mutt_1.5.9-2sarge2_s390.deb Sun Sparc http://security.debian.org/pool/updates/main/m/mutt/mutt_1.5.9-2sarge2_sparc.deb Red Hat Red Hat Desktop (v. 3) Red Hat Desktop (v. 4) Red Hat Enterprise Linux AS (v. 2.1) Red Hat Enterprise Linux AS (v. 3) Red Hat Enterprise Linux AS (v. 4) Red Hat Enterprise Linux ES (v. 2.1) Red Hat Enterprise Linux ES (v. 3) Red Hat Enterprise Linux ES (v. 4) Red Hat Enterprise Linux WS (v. 2.1) Red Hat Enterprise Linux WS (v. 3) Red Hat Enterprise Linux WS (v. 4) Red Hat Linux Advanced Workstation 2.1 Itanium https://rhn.redhat.com/ Suse Linux Las actualizaciones pueden descargarse mediante YAST o del servidor FTP oficial de Suse Linux SGI Advanced Linux Environment 3 / RPM / Patch 10317 ftp://oss.sgi.com/projects/sgi_propack/download/3/updates/RPMS Advanced Linux Environment 3 / SRPM / Patch 10317 ftp://oss.sgi.com/projects/sgi_propack/download/3/updates/SRPMS |
|
Identificadores estándar |
|
Propiedad | Valor |
CVE | CVE-2006-3242 |
BID | 18642 |
Recursos adicionales |
|
Mandriva Security Advisory (MDKSA-2006:115) http://www.mandriva.com/security/advisories?name=MDKSA-2006:115 Debian Security Advisory (DSA 1108-1) http://lists.debian.org/debian-security-announce/debian-security-announce-2006/msg00195.html Red Hat Security Advisory (RHSA-2006:0577-3) https://rhn.redhat.com/errata/RHSA-2006-0577.html SUSE Security Advisory (SUSE-SR:2006:016) http://www.novell.com/linux/security/advisories/2006_16_sr.html SGI Security Advisory (20060701-01-U) ftp://patches.sgi.com/support/free/security/advisories/20060701-01-U.asc |
Histórico de versiones |
||
Versión | Comentario | Fecha |
1.0 | Aviso emitido | 2006-06-29 |
1.1 | Aviso emitido por Debian (DSA 1108-1) | 2006-07-11 |
1.2 | Aviso emitido por Red Hat (RHSA-2006:0577-3) | 2006-07-13 |
1.3 | Aviso emitido por Suse (SUSE-SR:2006:016) | 2006-07-19 |
1.4 | Aviso emitido por SGI (20060701-01-U) | 2006-07-21 |