The mutt_adv_mktemp function in the Mutt mail client 1.5.12 and earlier does not properly verify that temporary files have been created with restricted permissions, which might allow local users to create files with weak permissions via a race condition between the mktemp and safe_fopen function calls.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2006-5283 | The mutt_adv_mktemp function in the Mutt mail client 1.5.12 and earlier does not properly verify that temporary files have been created with restricted permissions, which might allow local users to create files with weak permissions via a race condition between the mktemp and safe_fopen function calls. |
Ubuntu USN |
USN-373-1 | mutt vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T19:48:28.687Z
Reserved: 2006-10-16T00:00:00
Link: CVE-2006-5298
No data.
Status : Deferred
Published: 2006-10-16T19:07:00.000
Modified: 2025-04-09T00:30:58.490
Link: CVE-2006-5298
No data.
OpenCVE Enrichment
No data.
EUVD
Ubuntu USN