Bug 168805 - CAN-2005-2642 Mutt Handler.c Buffer Overflow
Summary: CAN-2005-2642 Mutt Handler.c Buffer Overflow
Alias: None
Product: Fedora Legacy
Classification: Retired
Component: mutt   
(Show other bugs)
Version: rhl7.3
Hardware: i386
OS: Linux
Target Milestone: ---
Assignee: Fedora Legacy Bugs
QA Contact:
URL: http://www.securityfocus.com/bid/14596
Depends On:
TreeView+ depends on / blocked
Reported: 2005-09-20 13:57 UTC by John Dalbec
Modified: 2007-04-18 17:31 UTC (History)
0 users

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2006-07-14 14:08:48 UTC
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)

Description John Dalbec 2005-09-20 13:57:13 UTC
From Bugzilla Helper:
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7.5) Gecko/20050729 Netscape/

Description of problem:
05.34.12 CVE: CAN-2005-2642
Platform: Unix
Title: Mutt Handler.c Buffer Overflow
Description: Mutt is a file browser which is used to send and receive
email and it is prone to a buffer overflow vulnerability. The problem
lies in Mutt's "handler.c" source code, specifically the
"mutt_decode_xbit()" subroutine and the allocation size of the "bufi"
buffer. Mutt version 1.5.10 is vulnerable.
Ref: http://www.securityfocus.com/bid/14596 

Version-Release number of selected component (if applicable):

How reproducible:
Didn't try

Additional info:

Note You need to log in before you can comment on or make changes to this bug.