A problem with the way mutt, a text editor for Linux, handles e-mail address headers could be used to execute arbitrary commands on the affected machine. Using specially crafted message headers, a malicious user could exploit a buffer overflow in the application to execute the code with the privileges of the logged-in user. For more, go to: ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-02:04.mutt.asc