Stack-based buffer overflow in the browse_get_namespace function in imap/browse.c of Mutt 1.4.2.1 and earlier allows remote attackers to cause a denial of service (crash) or execute arbitrary code via long namespaces received from the IMAP server.
Advisories
Source ID Title
Debian DSA Debian DSA DSA-1108-1 New mutt packages fix arbitrary code execution
EUVD EUVD EUVD-2006-3239 Stack-based buffer overflow in the browse_get_namespace function in imap/browse.c of Mutt 1.4.2.1 and earlier allows remote attackers to cause a denial of service (crash) or execute arbitrary code via long namespaces received from the IMAP server.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

References
Link Providers
ftp://patches.sgi.com/support/free/security/advisories/20060701-01-U cve-icon cve-icon
http://dev.mutt.org/cgi-bin/gitweb.cgi?p=mutt/.git%3Ba=commit%3Bh=dc0272b749f0e2b102973b7ac43dbd3908507540 cve-icon cve-icon
http://dev.mutt.org/cgi-bin/viewcvs.cgi/mutt/imap/browse.c?r1=1.34.2.2&r2=1.34.2.3 cve-icon cve-icon
http://secunia.com/advisories/20810 cve-icon cve-icon
http://secunia.com/advisories/20836 cve-icon cve-icon
http://secunia.com/advisories/20854 cve-icon cve-icon
http://secunia.com/advisories/20879 cve-icon cve-icon
http://secunia.com/advisories/20887 cve-icon cve-icon
http://secunia.com/advisories/20895 cve-icon cve-icon
http://secunia.com/advisories/20960 cve-icon cve-icon
http://secunia.com/advisories/21039 cve-icon cve-icon
http://secunia.com/advisories/21124 cve-icon cve-icon
http://secunia.com/advisories/21135 cve-icon cve-icon
http://secunia.com/advisories/21220 cve-icon cve-icon
http://securitytracker.com/id?1016482 cve-icon cve-icon
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472221 cve-icon cve-icon
http://www.debian.org/security/2006/dsa-1108 cve-icon cve-icon
http://www.gentoo.org/security/en/glsa/glsa-200606-27.xml cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDKSA-2006:115 cve-icon cve-icon
http://www.novell.com/linux/security/advisories/2006_16_sr.html cve-icon cve-icon
http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.013-mutt.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2006-0577.html cve-icon cve-icon
http://www.securityfocus.com/archive/1/438712/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/bid/18642 cve-icon cve-icon
http://www.trustix.org/errata/2006/0038 cve-icon cve-icon
http://www.vupen.com/english/advisories/2006/2522 cve-icon cve-icon
https://exchange.xforce.ibmcloud.com/vulnerabilities/27428 cve-icon cve-icon
https://issues.rpath.com/browse/RPL-471 cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2006-3242 cve-icon
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10826 cve-icon cve-icon
https://usn.ubuntu.com/307-1/ cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2006-3242 cve-icon
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-07T18:23:20.786Z

Reserved: 2006-06-26T00:00:00

Link: CVE-2006-3242

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2006-06-27T10:05:00.000

Modified: 2025-04-03T01:03:51.193

Link: CVE-2006-3242

cve-icon Redhat

Severity : Moderate

Publid Date: 2006-06-19T00:00:00Z

Links: CVE-2006-3242 - Bugzilla

cve-icon OpenCVE Enrichment

No data.