ID CVE-2006-3242
Summary Stack-based buffer overflow in the browse_get_namespace function in imap/browse.c of Mutt 1.4.2.1 and earlier allows remote attackers to cause a denial of service (crash) or execute arbitrary code via long namespaces received from the IMAP server.
References
Vulnerable Configurations
  • cpe:2.3:a:mutt:mutt:1.4.2
    cpe:2.3:a:mutt:mutt:1.4.2
  • cpe:2.3:a:mutt:mutt:1.4.2.1
    cpe:2.3:a:mutt:mutt:1.4.2.1
CVSS
Base: 7.5 (as of 27-06-2006 - 12:46)
Impact:
Exploitability:
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
nessus via4
  • NASL family SuSE Local Security Checks
    NASL id SUSE9_11094.NASL
    description Mutt has a buffer overflow in IMAP namespace parsing code which may open a possible remote vulnerability. (CVE-2006-3242)
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 41094
    published 2009-09-24
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=41094
    title SuSE9 Security Update : mutt (YOU Patch Number 11094)
  • NASL family Slackware Local Security Checks
    NASL id SLACKWARE_SSA_2006-207-01.NASL
    description New mutt packages are available for Slackware 8.1, 9.0, 9.1, 10.0, 10.1, 10.2, and -current to fix a possible security issue.
    last seen 2019-02-21
    modified 2018-08-09
    plugin id 22098
    published 2006-07-28
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=22098
    title Slackware 10.0 / 10.1 / 10.2 / 8.1 / 9.0 / 9.1 / current : mutt (SSA:2006-207-01)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2006-0577.NASL
    description Updated mutt packages that fix a security issue are now available. This update has been rated as having moderate security impact by the Red Hat Security Response Team. Mutt is a text-mode mail user agent. A buffer overflow flaw was found in the way Mutt processes an overly long namespace from a malicious imap server. In order to exploit this flaw a user would have to use Mutt to connect to a malicious IMAP server. (CVE-2006-3242) Users of Mutt are advised to upgrade to these erratum packages, which contain a backported patch to correct this issue.
    last seen 2019-02-21
    modified 2018-11-16
    plugin id 22045
    published 2006-07-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=22045
    title RHEL 2.1 / 3 / 4 : mutt (RHSA-2006:0577)
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DSA-1108.NASL
    description It was discovered that the mutt mail reader performs insufficient validation of values returned from an IMAP server, which might overflow a buffer and potentially lead to the injection of arbitrary code.
    last seen 2019-02-21
    modified 2018-08-09
    plugin id 22650
    published 2006-10-14
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=22650
    title Debian DSA-1108-1 : mutt - buffer overflow
  • NASL family Ubuntu Local Security Checks
    NASL id UBUNTU_USN-307-1.NASL
    description TAKAHASHI Tamotsu discovered that mutt's IMAP backend did not sufficiently check the validity of namespace strings. If an user connects to a malicious IMAP server, that server could exploit this to crash mutt or even execute arbitrary code with the privileges of the mutt user. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-12-01
    plugin id 27882
    published 2007-11-10
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=27882
    title Ubuntu 5.04 / 5.10 / 6.06 LTS : mutt vulnerability (USN-307-1)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_MUTT-1701.NASL
    description Mutt had a buffer overflow in IMAP namespace parsing code which may open a possible remote vulnerability (CVE-2006-3242).
    last seen 2019-02-21
    modified 2018-07-19
    plugin id 27353
    published 2007-10-17
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=27353
    title openSUSE 10 Security Update : mutt (mutt-1701)
  • NASL family FreeBSD Local Security Checks
    NASL id FREEBSD_PKG_D2A43243087B11DBBC360008743BF21A.NASL
    description SecurityFocus reports : Mutt is prone to a remote buffer-overflow vulnerability. This issue is due to the application's failure to properly bounds-check user-supplied input before copying it to an insufficiently sized memory buffer. This issue may allow remote attackers to execute arbitrary machine code in the context of the affected application. Failed exploit attempts will likely crash the application, denying further service to legitimate users.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 21790
    published 2006-07-03
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=21790
    title FreeBSD : mutt -- Remote Buffer Overflow Vulnerability (d2a43243-087b-11db-bc36-0008743bf21a)
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2006-0577.NASL
    description Updated mutt packages that fix a security issue are now available. This update has been rated as having moderate security impact by the Red Hat Security Response Team. Mutt is a text-mode mail user agent. A buffer overflow flaw was found in the way Mutt processes an overly long namespace from a malicious imap server. In order to exploit this flaw a user would have to use Mutt to connect to a malicious IMAP server. (CVE-2006-3242) Users of Mutt are advised to upgrade to these erratum packages, which contain a backported patch to correct this issue.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 22039
    published 2006-07-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=22039
    title CentOS 3 / 4 : mutt (CESA-2006:0577)
  • NASL family Mandriva Local Security Checks
    NASL id MANDRAKE_MDKSA-2006-115.NASL
    description A stack-based buffer overflow in the browse_get_namespace function in imap/browse.c of Mutt allows remote attackers to cause a denial of service (crash) or execute arbitrary code via long namespaces received from the IMAP server. Updated packages have been patched to address this issue.
    last seen 2019-02-21
    modified 2018-07-19
    plugin id 21777
    published 2006-06-29
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=21777
    title Mandrake Linux Security Advisory : mutt (MDKSA-2006:115)
  • NASL family Gentoo Local Security Checks
    NASL id GENTOO_GLSA-200606-27.NASL
    description The remote host is affected by the vulnerability described in GLSA-200606-27 (Mutt: Buffer overflow) TAKAHASHI Tamotsu has discovered that Mutt contains a boundary error in the 'browse_get_namespace()' function in browse.c, which can be triggered when receiving an overly long namespace from an IMAP server. Impact : A malicious IMAP server can send an overly long namespace to Mutt in order to crash the application, and possibly execute arbitrary code with the permissions of the user running Mutt. Workaround : There is no known workaround at this time.
    last seen 2019-02-21
    modified 2018-08-10
    plugin id 21773
    published 2006-06-29
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=21773
    title GLSA-200606-27 : Mutt: Buffer overflow
oval via4
accepted 2013-04-29T04:09:06.927-04:00
class vulnerability
contributors
  • name Aharon Chernin
    organization SCAP.com, LLC
  • name Dragos Prisaca
    organization G2, Inc.
definition_extensions
  • comment The operating system installed on the system is Red Hat Enterprise Linux 3
    oval oval:org.mitre.oval:def:11782
  • comment CentOS Linux 3.x
    oval oval:org.mitre.oval:def:16651
  • comment The operating system installed on the system is Red Hat Enterprise Linux 4
    oval oval:org.mitre.oval:def:11831
  • comment CentOS Linux 4.x
    oval oval:org.mitre.oval:def:16636
  • comment Oracle Linux 4.x
    oval oval:org.mitre.oval:def:15990
description Stack-based buffer overflow in the browse_get_namespace function in imap/browse.c of Mutt 1.4.2.1 and earlier allows remote attackers to cause a denial of service (crash) or execute arbitrary code via long namespaces received from the IMAP server.
family unix
id oval:org.mitre.oval:def:10826
status accepted
submitted 2010-07-09T03:56:16-04:00
title Stack-based buffer overflow in the browse_get_namespace function in imap/browse.c of Mutt 1.4.2.1 and earlier allows remote attackers to cause a denial of service (crash) or execute arbitrary code via long namespaces received from the IMAP server.
version 23
redhat via4
advisories
bugzilla
id 197151
title CVE-2006-3242 Mutt IMAP namespace buffer overflow
oval
OR
  • AND
    comment Red Hat Enterprise Linux 3 is installed
    oval oval:com.redhat.rhsa:tst:20060015001
  • AND
    comment Red Hat Enterprise Linux 4 is installed
    oval oval:com.redhat.rhsa:tst:20060016001
rhsa
id RHSA-2006:0577
released 2006-07-12
severity Moderate
title RHSA-2006:0577: mutt security update (Moderate)
refmap via4
bid 18642
bugtraq 20060629 rPSA-2006-0116-1 mutt
confirm
debian DSA-1108
gentoo GLSA-200606-27
mandriva MDKSA-2006:115
openpkg OpenPKG-SA-2006.013
sectrack 1016482
secunia
  • 20810
  • 20836
  • 20854
  • 20879
  • 20887
  • 20895
  • 20960
  • 21039
  • 21124
  • 21135
  • 21220
sgi 20060701-01-U
slackware SSA:2006-207-01
suse SUSE-SR:2006:016
trustix 2006-0038
ubuntu USN-307-1
vupen ADV-2006-2522
xf mutt-imap-namespace-bo(27428)
Last major update 07-03-2011 - 21:38
Published 27-06-2006 - 06:05
Last modified 18-10-2018 - 12:46
Back to Top