mutt-1.5.20-4.20091214hg736b6a.AXS4
エラータID: AXSA:2014-177:01
Release date:
Thursday, March 27, 2014 - 11:37
Subject:
mutt-1.5.20-4.20091214hg736b6a.AXS4
Affected Channels:
Asianux Server 4 for x86
Asianux Server 4 for x86_64
Severity:
High
Description:
Mutt is a small but very powerful text-based MIME mail client. Mutt is highly configurable, and is well suited to the mail power user with advanced features like key bindings, keyboard macros, mail threading, regular expression searches and a powerful pattern matching language for selecting groups of messages.
Security issues fixed with this release:
• CVE-2014-0467
Buffer overflow in copy.c in Mutt before 1.5.23 allows remote attackers to cause a denial of service (crash) via a crafted RFC2047 header line, related to address expansion.
Solution:
Update packages.
CVEs:
CVE-2014-0467
Buffer overflow in copy.c in Mutt before 1.5.23 allows remote attackers to cause a denial of service (crash) via a crafted RFC2047 header line, related to address expansion.
Buffer overflow in copy.c in Mutt before 1.5.23 allows remote attackers to cause a denial of service (crash) via a crafted RFC2047 header line, related to address expansion.
Additional Info:
N/A
Download:
SRPMS
- mutt-1.5.20-4.20091214hg736b6a.AXS4.src.rpm
MD5: a561696563679a07d6d431d7ccfd2b03
SHA-256: fa253ab5ab26f5e8ba509d0fe200dc5db4673d9532441cc74536dd0639d30616
Size: 1.48 MB
Asianux Server 4 for x86
- mutt-1.5.20-4.20091214hg736b6a.AXS4.i686.rpm
MD5: f99d3874c41f948590dd6031c861d337
SHA-256: a9457b7ade292dcb13dc4b7d7a542350bd6acd090b1b0003e088e99439ac8666
Size: 1.23 MB
Asianux Server 4 for x86_64
- mutt-1.5.20-4.20091214hg736b6a.AXS4.x86_64.rpm
MD5: 929a25c518cc06b3bfcb8bd34cef9f18
SHA-256: 12b7590c9b07cb20c1e4055b4639a47add429cb9974d94f3b2bd5644578d1321
Size: 1.24 MB