Debian: UPDATED: mutt buffer overflow vulnerability
Summary
Byrial Jensen discovered a couple of off-by-one buffer overflow in the
IMAP code of Mutt, a text-oriented mail reader supporting IMAP, MIME,
GPG, PGP and threading. This problem could potentially allow a remote
malicious IMAP server to cause a denial of service (crash) and
possibly execute arbitrary code via a specially crafted mail folder.
This advisory only covers the old stable distribution (potato) since
DSA 274-1 already fixed the stable distribution (woody). For the old
stable distribution (potato) this problem has been fixed in version
1.2.5-5.2.
We recommend that you upgrade your mutt package.
Upgrade Instructions
- --------------------
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
If you are using the apt-get package manager, use the line for
sources.list as given below:
apt-get update
will update the internal database
apt-get upgrade
will install corrected packages
You may use an automated update by adding the resources...