Vulnerability Description
Stack-based buffer overflow in the browse_get_namespace function in imap/browse.c of Mutt 1.4.2.1 and earlier allows remote attackers to cause a denial of service (crash) or execute arbitrary code via long namespaces received from the IMAP server.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mutt | Mutt | 1.4.2 |
References
- ftp://patches.sgi.com/support/free/security/advisories/20060701-01-U
- http://dev.mutt.org/cgi-bin/gitweb.cgi?p=mutt/.git%3Ba=commit%3Bh=dc0272b749f0e2
- http://dev.mutt.org/cgi-bin/viewcvs.cgi/mutt/imap/browse.c?r1=1.34.2.2&r2=1.34.2
- http://secunia.com/advisories/20810Vendor Advisory
- http://secunia.com/advisories/20836
- http://secunia.com/advisories/20854
- http://secunia.com/advisories/20879
- http://secunia.com/advisories/20887
- http://secunia.com/advisories/20895
- http://secunia.com/advisories/20960
- http://secunia.com/advisories/21039
- http://secunia.com/advisories/21124
- http://secunia.com/advisories/21135
- http://secunia.com/advisories/21220
- http://securitytracker.com/id?1016482
FAQ
What is CVE-2006-3242?
CVE-2006-3242 is a vulnerability with a CVSS score of 7.5 (HIGH). Stack-based buffer overflow in the browse_get_namespace function in imap/browse.c of Mutt 1.4.2.1 and earlier allows remote attackers to cause a denial of service (crash) or execute arbitrary code via...
How severe is CVE-2006-3242?
CVE-2006-3242 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-3242?
Check the references section above for vendor advisories and patch information. Affected products include: Mutt Mutt.