SuSE: 'mutt' Remote buffer overflow vulnerability
Summary
______________________________________________________________________________
SuSE Security Announcement
Package: mutt
Announcement-ID: SuSE-SA:2002:001
Date: Monday, Jan 7th 2001 20:30 MET
Affected SuSE versions: 6.4, 7.0, 7.1, 7.2, 7.3
Vulnerability Type: local privilege escalation
Severity (1-10): 6
SuSE default package: yes
Other affected systems: systems with the mutt mailer installed
Content of this advisory:
1) security vulnerability resolved: mutt
problem description, discussion, solution and upgrade information
2) pending vulnerabilities, solutions, workarounds
3) standard appendix (further information)
______________________________________________________________________________
1) problem description, brief discussion, solution, upgrade information
mutt, a popular mail client for Linux-like systems, is vulnerable to a
buffer overflow that is remotely exploitable. We have added patches to
the versions of mutt as shipped with the affected distributions to fix
the problem. We recommend to install the update package for your product
and to restart all running instances of mutt.
We thank Joost Pol for reporting the problem to the makers of mutt.
Please download the update package for your distribution and verify its
integrity by the methods listed in section 3) of this announcement.
Then, install the package using the command "rpm -Fhv file.rpm" to apply
the update.
NOTE:
The SuSE Linux 7.0 distribution was shipped with two packages that contain
the mutt mail program: "mutt" and "muttssl". For legal reasons, the
muttssl package is available from the German ftp server ftp.suse.de.
You can find out which version of the mutt package you are using with
the following command:
rpm -qf /usr/bin/mutt
You only need to download and install the update package for the package
that is installed on your system.
i386 Intel Platform:
SuSE-7.3
65dd9854d16c9e3178aaff935486ab8a
source rpm:
6efacb822144a49de85bb417f677dba6
SuSE-7.2
012e18c5cd2122218b396ae3600fa875
source rpm:
5755b3e620a49bcb93893c524ecceb1b
SuSE-7.1
40df9d8f98dcebc7057849a246f16e21
source rpm:
c689f09724acc63065a66e291dedc85b
SuSE-7.0
1e7d85e9f499ebf4b3fe749d8669de9e
a61d53a1e65299b558c799654e57203f
source rpm:
543834be481fc61d8390a72cd42feeb0
source rpm:
e67f148dee40a385136bc31240d51be6
SuSE-6.4
53bae9b840be86683d670b784ec28c8c
source rpm:
c9ebd840ac72c5a3cfe9f45444f9a5e9
Sparc Platform:
SuSE-7.3
946ba6c36bd8c46d1ab494f54b288dc6
source rpm:
9009e2d4e4f32d437422b8e8ed12ef55
SuSE-7.1
50f4f657a6a8bba819a34b2a05a9ea17
source rpm:
e7d3565e2063d76909c1a44e347f71de
SuSE-7.0
fe06ca8880f38ea3064764614515f283
3bdec5870cdddb5be68a8da3ff093de8
source rpm:
e3492d0390a7271def3955030a5451a0
source rpm:
3946004fc966f4135f47ff419bc2d1d6
AXP Alpha Platform:
SuSE-7.1
0cf2bd45bf05aded0468cad34774cac6
source rpm:
7b04b3b10bb07c1d05ecd2322fd92be9
The AXP Alpha mutt packages for older distributions than 7.1 are currently
being built and will appear at the usual location shortly.
PPC Power PC Platform:
SuSE-7.3
023ad9fde88518a3c07e183712305fd7
source rpm:
ed935acf49c36bcb290f4db37c7ae800
The PPC packages for SuSE Linux 7.1 are currently being built and will
appear at the usual location shortly.
SuSE-7.0
476ed5e796692adda068a49ed2baf95e
f4cb8011468d3e476fd7e24f733aec70
source rpm:
550d058119f86c54a04d7506dbc1e878
source rpm:
caa60a063952cb54582bf7a0885d5d81
SuSE-6.4
2ae9d12e448f9f519441c74aeeb64d4d
source rpm:
e2ae04f334216cbcd82f906a3a2bb83f
______________________________________________________________________________
2) Pending vulnerabilities in SuSE Distributions and Workarounds:
- SuSE Security receive reports about successful exploitation of the
problems in the secure shell package (ssh-1.2.27) on SuSE systems.
Please read the secure shell security announcement from February
2001, available at
SUSE – Open-Source-Lösungen für Enterprise Server und Cloud | SUSE .
More additional information can be found in the openssh announcement at
SUSE – Open-Source-Lösungen für Enterprise Server und Cloud | SUSE .
______________________________________________________________________________
3) standard appendix: authenticity verification, additional information
- Package authenticity verification:
SuSE update packages are available on many mirror ftp servers all over
the world. While this service is being considered valuable and important
to the free and open source software community, many users wish to be
sure about the origin of the package and its content before installing
the package. There are two verification methods that can be used
independently from each other to prove the authenticity of a downloaded
file or rpm package:
1) md5sums as provided in the (cryptographically signed) announcement.
2) using the internal gpg signatures of the rpm package.
1) execute the command
md5sum
References