Patch: FreeBSD mutt

A problem with the way mutt, a text editor for Linux, handles e-mail address headers could be used to execute arbitrary commands on the affected machine. Using specially crafted message headers, a malicious user could exploit a buffer overflow in the application to execute the code with the privileges of the logged-in user. For more, go to: ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-02:04.mutt.asc

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

More about CERT Australia

Show Comments
[]