Vulnerabilities > CVE-2007-2683 - Local Buffer Overflow vulnerability in Mutt 1.4.2

047910
CVSS 3.5 - LOW
Attack vector
LOCAL
Attack complexity
HIGH
Privileges required
SINGLE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
local
high complexity
mutt
nessus
exploit available

Summary

Buffer overflow in Mutt 1.4.2 might allow local users to execute arbitrary code via "&" characters in the GECOS field, which triggers the overflow during alias expansion.

Vulnerable Configurations

Part Description Count
Application
Mutt
1

Exploit-Db

descriptionMutt. CVE-2007-2683. Local exploit for linux platform
idEDB-ID:30093
last seen2016-02-03
modified2007-05-28
published2007-05-28
reporterraylai
sourcehttps://www.exploit-db.com/download/30093/
titleMutt 1.4.2 Mutt_Gecos_Name Function Local Buffer Overflow Vulnerability

Nessus

  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20070604_MUTT_ON_SL5_X.NASL
    descriptionA flaw was found in the way Mutt used temporary files on NFS file systems. Due to an implementation issue in the NFS protocol, Mutt was not able to exclusively open a new file. A local attacker could conduct a time-dependent attack and possibly gain access to e-mail attachments opened by a victim. (CVE-2006-5297) A flaw was found in the way Mutt processed certain APOP authentication requests. By sending certain responses when mutt attempted to authenticate against an APOP server, a remote attacker could potentially acquire certain portions of a user
    last seen2020-06-01
    modified2020-06-02
    plugin id60195
    published2012-08-01
    reporterThis script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/60195
    titleScientific Linux Security Update : mutt on SL5.x, SL4.x, SL3.x i386/x86_64
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text is (C) Scientific Linux.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(60195);
      script_version("1.4");
      script_cvs_date("Date: 2019/10/25 13:36:17");
    
      script_cve_id("CVE-2006-5297", "CVE-2007-1558", "CVE-2007-2683");
    
      script_name(english:"Scientific Linux Security Update : mutt on SL5.x, SL4.x, SL3.x i386/x86_64");
      script_summary(english:"Checks rpm output for the updated package");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Scientific Linux host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "A flaw was found in the way Mutt used temporary files on NFS file
    systems. Due to an implementation issue in the NFS protocol, Mutt was
    not able to exclusively open a new file. A local attacker could
    conduct a time-dependent attack and possibly gain access to e-mail
    attachments opened by a victim. (CVE-2006-5297)
    
    A flaw was found in the way Mutt processed certain APOP authentication
    requests. By sending certain responses when mutt attempted to
    authenticate against an APOP server, a remote attacker could
    potentially acquire certain portions of a user's authentication
    credentials. (CVE-2007-1558)
    
    A flaw was found in the way Mutt handled certain characters in gecos
    fields which could lead to a buffer overflow. The gecos field is an
    entry in the password database typically used to record general
    information about the user. A local attacker could give themselves a
    carefully crafted 'Real Name' which could execute arbitrary code if a
    victim uses Mutt and expands the attackers alias. (CVE-2007-2683)"
      );
      # https://listserv.fnal.gov/scripts/wa.exe?A2=ind0706&L=scientific-linux-errata&T=0&P=840
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?57a3a75e"
      );
      script_set_attribute(attribute:"solution", value:"Update the affected mutt package.");
      script_set_cvss_base_vector("CVSS2#AV:L/AC:H/Au:S/C:P/I:P/A:P");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"x-cpe:/o:fermilab:scientific_linux");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2007/06/04");
      script_set_attribute(attribute:"plugin_publication_date", value:"2012/08/01");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Scientific Linux Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/RedHat/release", "Host/RedHat/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Scientific Linux " >!< release) audit(AUDIT_HOST_NOT, "running Scientific Linux");
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if (cpu >!< "x86_64" && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Scientific Linux", cpu);
    
    
    flag = 0;
    if (rpm_check(release:"SL3", reference:"mutt-1.4.1-5.el3")) flag++;
    
    if (rpm_check(release:"SL4", reference:"mutt-1.4.1-12.0.3.el4")) flag++;
    
    if (rpm_check(release:"SL5", reference:"mutt-1.4.2.2-3.0.2.el5")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_note(port:0, extra:rpm_report_get());
      else security_note(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2007-0386.NASL
    descriptionAn updated mutt package that fixes several security bugs is now available for Red Hat Enterprise Linux 3, 4 and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. Mutt is a text-mode mail user agent. A flaw was found in the way Mutt used temporary files on NFS file systems. Due to an implementation issue in the NFS protocol, Mutt was not able to exclusively open a new file. A local attacker could conduct a time-dependent attack and possibly gain access to e-mail attachments opened by a victim. (CVE-2006-5297) A flaw was found in the way Mutt processed certain APOP authentication requests. By sending certain responses when mutt attempted to authenticate against an APOP server, a remote attacker could potentially acquire certain portions of a user
    last seen2020-06-01
    modified2020-06-02
    plugin id25403
    published2007-06-04
    reporterThis script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/25403
    titleCentOS 3 / 4 / 5 : mutt (CESA-2007:0386)
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2007-0386.NASL
    descriptionFrom Red Hat Security Advisory 2007:0386 : An updated mutt package that fixes several security bugs is now available for Red Hat Enterprise Linux 3, 4 and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. Mutt is a text-mode mail user agent. A flaw was found in the way Mutt used temporary files on NFS file systems. Due to an implementation issue in the NFS protocol, Mutt was not able to exclusively open a new file. A local attacker could conduct a time-dependent attack and possibly gain access to e-mail attachments opened by a victim. (CVE-2006-5297) A flaw was found in the way Mutt processed certain APOP authentication requests. By sending certain responses when mutt attempted to authenticate against an APOP server, a remote attacker could potentially acquire certain portions of a user
    last seen2020-06-01
    modified2020-06-02
    plugin id67505
    published2013-07-12
    reporterThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/67505
    titleOracle Linux 3 / 4 / 5 : mutt (ELSA-2007-0386)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2007-540.NASL
    descriptionThis update fixes two security issues : The APOP protocol allows remote attackers to guess the first 3 characters of a password via man-in-the-middle (MITM) attacks that use crafted message IDs and MD5 collisions. (CVE-2007-1558) Buffer overflow in Mutt 1.4.2 might allow local users to execute arbitrary code via
    last seen2020-06-01
    modified2020-06-02
    plugin id25358
    published2007-06-01
    reporterThis script is Copyright (C) 2007-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/25358
    titleFedora Core 5 : mutt-1.4.2.1-8.fc5 (2007-540)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2007-0002.NASL
    descriptionThis update fixes two security issues : The APOP protocol allows remote attackers to guess the first 3 characters of a password via man-in-the-middle (MITM) attacks that use crafted message IDs and MD5 collisions. (CVE-2007-1558) Buffer overflow in Mutt 1.4.2 might allow local users to execute arbitrary code via
    last seen2020-06-01
    modified2020-06-02
    plugin id62264
    published2012-09-24
    reporterThis script is Copyright (C) 2012-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/62264
    titleFedora 7 : mutt-1.5.14-4.fc7 (2007-0002)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2007-539.NASL
    descriptionThis update fixes two security issues : The APOP protocol allows remote attackers to guess the first 3 characters of a password via man-in-the-middle (MITM) attacks that use crafted message IDs and MD5 collisions. (CVE-2007-1558) Buffer overflow in Mutt 1.4.2 might allow local users to execute arbitrary code via
    last seen2020-06-01
    modified2020-06-02
    plugin id25357
    published2007-06-01
    reporterThis script is Copyright (C) 2007-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/25357
    titleFedora Core 6 : mutt-1.4.2.3-1.fc6 (2007-539)
  • NASL familyFreeBSD Local Security Checks
    NASL idFREEBSD_PKG_863F95D33DF111DCB3D30016179B2DD5.NASL
    descriptionSecurityfocus reports : Mutt is prone to a local buffer-overflow vulnerability because it fails to properly bounds-check user-supplied input before using it in a memory copy operation. An attacker can exploit this issue to execute arbitrary code with the with the privileges of the victim. Failed exploit attempts will result in a denial of service.
    last seen2020-06-01
    modified2020-06-02
    plugin id25804
    published2007-07-30
    reporterThis script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/25804
    titleFreeBSD : mutt -- buffer overflow vulnerability (863f95d3-3df1-11dc-b3d3-0016179b2dd5)
  • NASL familyMandriva Local Security Checks
    NASL idMANDRAKE_MDKSA-2007-113.NASL
    descriptionA flaw in the way mutt processed certain APOP authentication requests was discovered. By sending certain responses when mutt attempted to authenticate again an APOP server, a remote attacker could possibly obtain certain portions of the user
    last seen2020-06-01
    modified2020-06-02
    plugin id25431
    published2007-06-05
    reporterThis script is Copyright (C) 2007-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/25431
    titleMandrake Linux Security Advisory : mutt (MDKSA-2007:113)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2007-0386.NASL
    descriptionAn updated mutt package that fixes several security bugs is now available for Red Hat Enterprise Linux 3, 4 and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. Mutt is a text-mode mail user agent. A flaw was found in the way Mutt used temporary files on NFS file systems. Due to an implementation issue in the NFS protocol, Mutt was not able to exclusively open a new file. A local attacker could conduct a time-dependent attack and possibly gain access to e-mail attachments opened by a victim. (CVE-2006-5297) A flaw was found in the way Mutt processed certain APOP authentication requests. By sending certain responses when mutt attempted to authenticate against an APOP server, a remote attacker could potentially acquire certain portions of a user
    last seen2020-06-01
    modified2020-06-02
    plugin id25404
    published2007-06-04
    reporterThis script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/25404
    titleRHEL 3 / 4 / 5 : mutt (RHSA-2007:0386)

Oval

accepted2013-04-29T04:06:34.083-04:00
classvulnerability
contributors
  • nameAharon Chernin
    organizationSCAP.com, LLC
  • nameDragos Prisaca
    organizationG2, Inc.
definition_extensions
  • commentThe operating system installed on the system is Red Hat Enterprise Linux 3
    ovaloval:org.mitre.oval:def:11782
  • commentCentOS Linux 3.x
    ovaloval:org.mitre.oval:def:16651
  • commentThe operating system installed on the system is Red Hat Enterprise Linux 4
    ovaloval:org.mitre.oval:def:11831
  • commentCentOS Linux 4.x
    ovaloval:org.mitre.oval:def:16636
  • commentOracle Linux 4.x
    ovaloval:org.mitre.oval:def:15990
  • commentThe operating system installed on the system is Red Hat Enterprise Linux 5
    ovaloval:org.mitre.oval:def:11414
  • commentThe operating system installed on the system is CentOS Linux 5.x
    ovaloval:org.mitre.oval:def:15802
  • commentOracle Linux 5.x
    ovaloval:org.mitre.oval:def:15459
description" characters in the GECOS field, which triggers the overflow during alias expansion.
familyunix
idoval:org.mitre.oval:def:10543
statusaccepted
submitted2010-07-09T03:56:16-04:00
titleBuffer overflow in Mutt 1.4.2 might allow local users to execute arbitrary code via "" characters in the GECOS field, which triggers the overflow during alias expansion.
version27

Redhat

advisories
bugzilla
id241191
titleCVE-2007-1558 fetchmail/mutt/evolution/...: APOP password disclosure vulnerability
oval
OR
  • commentRed Hat Enterprise Linux must be installed
    ovaloval:com.redhat.rhba:tst:20070304026
  • AND
    • commentRed Hat Enterprise Linux 4 is installed
      ovaloval:com.redhat.rhba:tst:20070304025
    • commentmutt is earlier than 5:1.4.1-12.0.3.el4
      ovaloval:com.redhat.rhsa:tst:20070386001
    • commentmutt is signed with Red Hat master key
      ovaloval:com.redhat.rhsa:tst:20060577002
  • AND
    • commentRed Hat Enterprise Linux 5 is installed
      ovaloval:com.redhat.rhba:tst:20070331005
    • commentmutt is earlier than 5:1.4.2.2-3.0.2.el5
      ovaloval:com.redhat.rhsa:tst:20070386004
    • commentmutt is signed with Red Hat redhatrelease key
      ovaloval:com.redhat.rhsa:tst:20070386005
rhsa
idRHSA-2007:0386
released2008-01-07
severityModerate
titleRHSA-2007:0386: mutt security update (Moderate)
rpms
  • mutt-5:1.4.1-12.0.3.el4
  • mutt-5:1.4.1-5.el3
  • mutt-5:1.4.2.2-3.0.2.el5
  • mutt-debuginfo-5:1.4.1-12.0.3.el4
  • mutt-debuginfo-5:1.4.1-5.el3
  • mutt-debuginfo-5:1.4.2.2-3.0.2.el5

Statements

contributorJoshua Bressers
lastmodified2007-06-04
organizationRed Hat
statementUpdates for Red Hat Enterprise Linux are available from http://rhn.redhat.com/errata/RHSA-2007-0386.html