Vulnerabilities > CVE-2004-0078 - Remote Buffer Overflow vulnerability in Mutt Menu Drawing
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL Summary
Buffer overflow in the index menu code (menu_pad_string of menu.c) for Mutt 1.4.1 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via certain mail messages.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | Mutt
| 18 |
Nessus
NASL family Red Hat Local Security Checks NASL id REDHAT-RHSA-2004-050.NASL description New mutt packages that fix a remotely-triggerable crash in the menu drawing code are now available. Mutt is a text-mode mail user agent. A bug was found in the index menu code in versions of mutt. A remote attacker could send a carefully crafted mail message that can cause mutt to segfault and possibly execute arbitrary code as the victim. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2004-0078 to this issue. It is recommended that all mutt users upgrade to these updated packages, which contain a backported security patch and are not vulnerable to this issue. Red Hat would like to thank Niels Heinen for reporting this issue. Note: mutt-1.2.5.1 in Red Hat Enterprise Linux 2.1 is not vulnerable to this issue. last seen 2020-06-01 modified 2020-06-02 plugin id 12461 published 2004-07-06 reporter This script is Copyright (C) 2004-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/12461 title RHEL 3 : mutt (RHSA-2004:050) NASL family FreeBSD Local Security Checks NASL id FREEBSD_PKG_67C052835D6211D880E30020ED76EF5A.NASL description Mutt 1.4 contains a buffer overflow that could be exploited with a specially formed message, causing Mutt to crash or possibly execute arbitrary code. last seen 2020-06-01 modified 2020-06-02 plugin id 37471 published 2009-04-23 reporter This script is Copyright (C) 2009-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/37471 title FreeBSD : Buffer overflow in Mutt 1.4 (67c05283-5d62-11d8-80e3-0020ed76ef5a) NASL family Fedora Local Security Checks NASL id FEDORA_2004-061.NASL description This package fixes CVE-2004-0078, where a specifc message could cause mutt to crash. This is the vulnerability fixed in the recently released mutt-1.4.2. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 13674 published 2004-07-23 reporter This script is Copyright (C) 2004-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/13674 title Fedora Core 1 : mutt-1.4.1-5 (2004-061) NASL family Slackware Local Security Checks NASL id SLACKWARE_SSA_2004-043-01.NASL description Mutt is a text-based program for reading electronic mail. New mutt packages are available for Slackware 8.1, 9.0, 9.1, and -current. These have been upgraded to version 1.4.2i to fix a buffer overflow that could lead to a machine compromise. All sites using mutt should upgrade to the new mutt package. last seen 2020-06-01 modified 2020-06-02 plugin id 18772 published 2005-07-13 reporter This script is Copyright (C) 2005-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/18772 title Slackware 8.1 / 9.0 / 9.1 / current : mutt security update (SSA:2004-043-01) NASL family FreeBSD Local Security Checks NASL id FREEBSD_MUTT_142.NASL description The following package needs to be updated: ja-mutt last seen 2016-09-26 modified 2004-07-06 plugin id 12582 published 2004-07-06 reporter Tenable source https://www.tenable.com/plugins/index.php?view=single&id=12582 title FreeBSD : Buffer overflow in Mutt 1.4 (122) NASL family Mandriva Local Security Checks NASL id MANDRAKE_MDKSA-2004-010.NASL description A bug in mutt was reported by Neils Heinen that could allow a remote attacker to send a carefully crafted mail message that can cause mutt to segfault and possibly execute arbitrary code as the user running mutt. The updated packages have been patched to correct the problem. last seen 2020-06-01 modified 2020-06-02 plugin id 14110 published 2004-07-31 reporter This script is Copyright (C) 2004-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/14110 title Mandrake Linux Security Advisory : mutt (MDKSA-2004:010)
Oval
accepted 2007-04-25T19:52:54.867-04:00 class vulnerability contributors name Jay Beale organization Bastille Linux name Thomas R. Jones organization Maitreya Security
description Buffer overflow in the index menu code (menu_pad_string of menu.c) for Mutt 1.4.1 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via certain mail messages. family unix id oval:org.mitre.oval:def:811 status accepted submitted 2004-03-20T12:00:00.000-04:00 title Red Hat Mutt BO in Index Menu version 37 accepted 2007-04-25T19:52:59.230-04:00 class vulnerability contributors name Jay Beale organization Bastille Linux name Matt Busby organization The MITRE Corporation name Thomas R. Jones organization Maitreya Security
description Buffer overflow in the index menu code (menu_pad_string of menu.c) for Mutt 1.4.1 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via certain mail messages. family unix id oval:org.mitre.oval:def:838 status accepted submitted 2004-03-20T12:00:00.000-04:00 title Red Hat Enterprise 3 Mutt BO in Index Menu version 39
Redhat
advisories |
| ||||||||
rpms |
|
References
- ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2004-013.0.txt
- http://bugs.debian.org/126336
- http://marc.info/?l=bugtraq&m=107651677817933&w=2
- http://marc.info/?l=bugtraq&m=107696262905039&w=2
- http://marc.info/?l=bugtraq&m=107884956930903&w=2
- http://www.mandrakesoft.com/security/advisories?name=MDKSA-2004:010
- http://www.osvdb.org/3918
- http://www.redhat.com/support/errata/RHSA-2004-050.html
- http://www.redhat.com/support/errata/RHSA-2004-051.html
- http://www.securityfocus.com/bid/9641
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2004&m=slackware-security.405053
- https://exchange.xforce.ibmcloud.com/vulnerabilities/15134
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A811
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A838