Slackware current : mutt remote exploit patched

high Nessus Plugin ID 54850

Synopsis

The remote Slackware host is missing a security update.

Description

An exploitable overflow has been found in the address handling code of the mutt mail client version 1.2.5i supplied with Slackware 8.0. A new mutt-1.2.5.1 has been released which addresses this problem, and packages are now available for Slackware 8.0 and -current. We urge all Slackware users to upgrade to this new version of mutt as soon as possible.

Solution

Update the affected mutt package.

See Also

http://www.nessus.org/u?bc826abb

Plugin Details

Severity: High

ID: 54850

File Name: Slackware_3daceab82a1391a620c43d0172ec339c.nasl

Version: Revision: 1.5

Type: local

Published: 5/28/2011

Updated: 6/1/2013

Supported Sensors: Nessus

Vulnerability Information

CPE: p-cpe:/a:slackware:slackware_linux:mutt, cpe:/o:slackware:slackware_linux

Required KB Items: Host/local_checks_enabled, Host/Slackware/release, Host/Slackware/packages

Patch Publication Date: 1/7/2002