Gentoo: mutt arbitrary command execution vulnerability
Summary
- - --------------------------------------------------------------------- GENTOO LINUX SECURITY ANNOUNCEMENT 200303-19 - - ---------------------------------------------------------------------
- - ---------------------------------------------------------------------
- From advisory:
"By controlling a malicious IMAP server and providing a specially crafted folder, an attacker can crash the mail reader and possibly force execution of arbitrary commands on the vulnerable system with the privileges of the user running Mutt."
Read the full advisory at:
SOLUTION
It is recommended that all Gentoo Linux users who are running net-mail/mutt upgrade to mutt-1.4.1 as follows:
emerge sync emerge mutt emerge clean
- - --------------------------------------------------------------------- aliz@gentoo.org - GnuPG key is available at - - ---------------------------------------------------------------------
1.4.1
Resolution
References
Availability
Concerns
Background