Vulnerability Name: | CVE-2006-3242 (CCN-27428) | ||||||||||||||||||||
Assigned: | 2006-06-19 | ||||||||||||||||||||
Published: | 2006-06-19 | ||||||||||||||||||||
Updated: | 2018-10-18 | ||||||||||||||||||||
Summary: | Stack-based buffer overflow in the browse_get_namespace function in imap/browse.c of Mutt 1.4.2.1 and earlier allows remote attackers to cause a denial of service (crash) or execute arbitrary code via long namespaces received from the IMAP server. | ||||||||||||||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||||||||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||||||||||||||
Vulnerability Type: | CWE-Other | ||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||
References: | Source: SGI Type: UNKNOWN 20060701-01-U Source: MITRE Type: CNA CVE-2006-3242 Source: CONFIRM Type: UNKNOWN http://dev.mutt.org/cgi-bin/gitweb.cgi?p=mutt/.git;a=commit;h=dc0272b749f0e2b102973b7ac43dbd3908507540 Source: CCN Type: Mutt CVS Repository FAUmachine Repository - log - FAUmachine: mutt/imap/browse.c Source: CONFIRM Type: UNKNOWN http://dev.mutt.org/cgi-bin/viewcvs.cgi/mutt/imap/browse.c?r1=1.34.2.2&r2=1.34.2.3 Source: CCN Type: Mutt FAUmachine Repository FAUmachine Repository - markup - FAUmachine: mutt/imap/browse.c Source: CCN Type: RHSA-2006-0577 mutt security update Source: CCN Type: SA20810 Mutt IMAP Namespace Buffer Overflow Vulnerability Source: SECUNIA Type: Vendor Advisory 20810 Source: SECUNIA Type: UNKNOWN 20836 Source: SECUNIA Type: UNKNOWN 20854 Source: SECUNIA Type: UNKNOWN 20879 Source: SECUNIA Type: UNKNOWN 20887 Source: SECUNIA Type: UNKNOWN 20895 Source: SECUNIA Type: UNKNOWN 20960 Source: SECUNIA Type: UNKNOWN 21039 Source: SECUNIA Type: UNKNOWN 21124 Source: SECUNIA Type: UNKNOWN 21135 Source: SECUNIA Type: UNKNOWN 21220 Source: CCN Type: SECTRACK ID: 1016482 Mutt Buffer Overflow in browse_get_namespace() Lets Remote Servers Execute Arbitrary Code Source: SECTRACK Type: UNKNOWN 1016482 Source: SLACKWARE Type: UNKNOWN SSA:2006-207-01 Source: CCN Type: ASA-2006-142 mutt security update (RHSA-2006-0577) Source: DEBIAN Type: UNKNOWN DSA-1108 Source: DEBIAN Type: DSA-1108 mutt -- buffer overflow Source: CCN Type: GLSA-200606-27 Mutt: Buffer overflow Source: GENTOO Type: UNKNOWN GLSA-200606-27 Source: MANDRIVA Type: UNKNOWN MDKSA-2006:115 Source: CCN Type: Mutt Web site The Mutt E-Mail Client Source: SUSE Type: UNKNOWN SUSE-SR:2006:016 Source: CCN Type: OpenPKG-SA-2006.013 Mutt Source: OPENPKG Type: UNKNOWN OpenPKG-SA-2006.013 Source: REDHAT Type: UNKNOWN RHSA-2006:0577 Source: BUGTRAQ Type: UNKNOWN 20060629 rPSA-2006-0116-1 mutt Source: BID Type: UNKNOWN 18642 Source: CCN Type: BID-18642 Mutt BROWSE_GET_NAMESPACE IMAP Namespace Processing Remote Buffer Overflow Vulnerability Source: TRUSTIX Type: UNKNOWN 2006-0038 Source: CCN Type: USN-307-1 mutt vulnerability Source: VUPEN Type: UNKNOWN ADV-2006-2522 Source: XF Type: UNKNOWN mutt-imap-namespace-bo(27428) Source: XF Type: UNKNOWN mutt-imap-namespace-bo(27428) Source: CONFIRM Type: UNKNOWN https://issues.rpath.com/browse/RPL-471 Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:10826 Source: UBUNTU Type: UNKNOWN USN-307-1 Source: SUSE Type: SUSE-SR:2006:016 SUSE Security Summary Report | ||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration RedHat 1: Configuration RedHat 2: Configuration RedHat 3: Configuration RedHat 4: Configuration RedHat 5: ![]() | ||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||
| |||||||||||||||||||||
BACK |