Action not permitted
Modal body text goes here.
cve-2006-5297
Vulnerability from cvelistv5
Published
2006-10-16 19:00
Modified
2024-08-07 19:48
Severity ?
EPSS score ?
Summary
Race condition in the safe_open function in the Mutt mail client 1.5.12 and earlier, when creating temporary files in an NFS filesystem, allows local users to overwrite arbitrary files due to limitations of the use of the O_EXCL flag on NFS filesystems.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T19:48:29.473Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "25529", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25529" }, { "name": "[mutt-dev] 20061004 security problem with temp files [was Re: mutt_adv_mktemp() ?]", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://marc.info/?l=mutt-dev\u0026m=115999486426292\u0026w=2" }, { "name": "20733", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/20733" }, { "name": "oval:org.mitre.oval:def:10601", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10601" }, { "name": "2006-0061", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX", "x_transferred" ], "url": "http://www.trustix.org/errata/2006/0061/" }, { "name": "22640", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22640" }, { "name": "22613", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22613" }, { "name": "22685", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22685" }, { "name": "22686", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22686" }, { "name": "USN-373-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-373-1" }, { "name": "RHSA-2007:0386", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0386.html" }, { "name": "ADV-2006-4176", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/4176" }, { "name": "MDKSA-2006:190", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:190" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-10-04T00:00:00", "descriptions": [ { "lang": "en", "value": "Race condition in the safe_open function in the Mutt mail client 1.5.12 and earlier, when creating temporary files in an NFS filesystem, allows local users to overwrite arbitrary files due to limitations of the use of the O_EXCL flag on NFS filesystems." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T00:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "25529", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25529" }, { "name": "[mutt-dev] 20061004 security problem with temp files [was Re: mutt_adv_mktemp() ?]", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://marc.info/?l=mutt-dev\u0026m=115999486426292\u0026w=2" }, { "name": "20733", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/20733" }, { "name": "oval:org.mitre.oval:def:10601", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10601" }, { "name": "2006-0061", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX" ], "url": "http://www.trustix.org/errata/2006/0061/" }, { "name": "22640", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22640" }, { "name": "22613", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22613" }, { "name": "22685", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22685" }, { "name": "22686", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22686" }, { "name": "USN-373-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-373-1" }, { "name": "RHSA-2007:0386", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0386.html" }, { "name": "ADV-2006-4176", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/4176" }, { "name": "MDKSA-2006:190", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:190" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-5297", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Race condition in the safe_open function in the Mutt mail client 1.5.12 and earlier, when creating temporary files in an NFS filesystem, allows local users to overwrite arbitrary files due to limitations of the use of the O_EXCL flag on NFS filesystems." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "25529", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/25529" }, { "name": "[mutt-dev] 20061004 security problem with temp files [was Re: mutt_adv_mktemp() ?]", "refsource": "MLIST", "url": "http://marc.info/?l=mutt-dev\u0026m=115999486426292\u0026w=2" }, { "name": "20733", "refsource": "BID", "url": "http://www.securityfocus.com/bid/20733" }, { "name": "oval:org.mitre.oval:def:10601", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10601" }, { "name": "2006-0061", "refsource": "TRUSTIX", "url": "http://www.trustix.org/errata/2006/0061/" }, { "name": "22640", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/22640" }, { "name": "22613", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/22613" }, { "name": "22685", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/22685" }, { "name": "22686", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/22686" }, { "name": "USN-373-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/usn-373-1" }, { "name": "RHSA-2007:0386", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2007-0386.html" }, { "name": "ADV-2006-4176", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/4176" }, { "name": "MDKSA-2006:190", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:190" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-5297", "datePublished": "2006-10-16T19:00:00", "dateReserved": "2006-10-16T00:00:00", "dateUpdated": "2024-08-07T19:48:29.473Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2006-5297\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2006-10-16T19:07:00.000\",\"lastModified\":\"2017-10-11T01:31:19.017\",\"vulnStatus\":\"Modified\",\"evaluatorSolution\":\"Race Condition occurs when creating temporary files in an NFS filesystem.\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"Race condition in the safe_open function in the Mutt mail client 1.5.12 and earlier, when creating temporary files in an NFS filesystem, allows local users to overwrite arbitrary files due to limitations of the use of the O_EXCL flag on NFS filesystems.\"},{\"lang\":\"es\",\"value\":\"Condici\u00f3n de carrera en la funci\u00f3n safe_open en el cliente de correo Mutt 1.5.12 y anteriores, cuando se crean archivos temporales en un sistema de ficheros NFS, permite a usuarios locales sobreescribir archivos de su elecci\u00f3n debido a limitaciones del uso de la bandera O_EXCL en sistemas de ficheros NFS.\"}],\"vendorComments\":[{\"organization\":\"Red Hat\",\"comment\":\"Red Hat is aware of this issue and is tracking it via the following bug:\\nhttps://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=211085\\n\\nThe Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:\\nhttp://www.redhat.com/security/updates/classification/\\n\\nRed Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.\\n\\nThe risks associated with fixing this bug are greater than the low severity security risk. We therefore currently have no plans to fix this flaw in Red Hat Enterprise Linux 2.1 which is in maintenance mode.\",\"lastModified\":\"2007-09-07T00:00:00\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:H/Au:N/C:N/I:P/A:N\",\"accessVector\":\"LOCAL\",\"accessComplexity\":\"HIGH\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\",\"baseScore\":1.2},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":1.9,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mutt:mutt:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.5.12\",\"matchCriteriaId\":\"BE31E06E-7259-4EC3-9F72-802988FE655C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mutt:mutt:0.95.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D43FB4B-1E1A-4F07-9587-09E335565654\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mutt:mutt:1.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"780FC5AD-A7D9-436B-BF73-FDCDDDA9E744\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mutt:mutt:1.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"996BC5D6-427B-43D6-B4C3-4AD814C20445\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mutt:mutt:1.2.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5A1DB8F-6BD5-4E1F-993A-FF5D0F807D43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mutt:mutt:1.2.5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B975F74-4B61-416B-B6B5-A36EF8123C94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mutt:mutt:1.2.5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C891640E-91CC-495D-A7FF-454DCBF7F120\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mutt:mutt:1.2.5.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4247B37-30C6-4F19-A709-9A1D073B7AA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mutt:mutt:1.2.5.12_ol:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5D5465E-6782-4AC0-9ECD-AB01EB448991\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mutt:mutt:1.3.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5FF9A116-D09D-4ADE-AA32-CAF51CE1625A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mutt:mutt:1.3.12.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DDB7D3BF-06F6-4A0A-9AE4-0EEF5D8E6AE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mutt:mutt:1.3.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC8CB6D9-30F9-4C56-9CFD-F8E526E84526\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mutt:mutt:1.3.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1C760A5-D243-45C9-AE60-01F2703DDC01\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mutt:mutt:1.3.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"198C2017-6101-482D-9AEF-DB052411C5D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mutt:mutt:1.3.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0610C44-6CD3-4448-87AF-6CDFAA1909DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mutt:mutt:1.3.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04186A67-E4A1-4A2A-B84F-585F9DD0E409\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mutt:mutt:1.3.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"305135F0-E414-430B-AC1A-02A311E66899\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mutt:mutt:1.3.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A416609-0BE7-4528-85B0-17F53DFE0D0B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mutt:mutt:1.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C86071C-E508-4EFB-A98E-62CA2BEBB50A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mutt:mutt:1.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65DB0D49-CD49-4EF6-9013-1B03E0D644D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mutt:mutt:1.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A0CD218-AA09-49B0-A87B-7FC04FF54500\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mutt:mutt:1.4.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15729D82-7BCF-4C50-85A0-7B56008226FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mutt:mutt:1.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AA1A4E0-9405-408C-B15B-D9FDB797081A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mutt:mutt:1.5.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E9C0F76-89D9-483A-8EF6-638C4B2FE1DB\"}]}]}],\"references\":[{\"url\":\"http://marc.info/?l=mutt-dev\u0026m=115999486426292\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/22613\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/22640\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/22685\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/22686\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/25529\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2006:190\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-0386.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/20733\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.trustix.org/errata/2006/0061/\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ubuntu.com/usn/usn-373-1\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/4176\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10601\",\"source\":\"cve@mitre.org\"}]}}" } }
rhsa-2007_0386
Vulnerability from csaf_redhat
Published
2007-06-04 08:03
Modified
2024-11-22 01:10
Summary
Red Hat Security Advisory: mutt security update
Notes
Topic
An updated mutt package that fixes several security bugs is now available for
Red Hat Enterprise Linux 3, 4 and 5.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
Details
Mutt is a text-mode mail user agent.
A flaw was found in the way Mutt used temporary files on NFS file systems.
Due to an implementation issue in the NFS protocol, Mutt was not able to
exclusively open a new file. A local attacker could conduct a
time-dependent attack and possibly gain access to e-mail attachments opened
by a victim. (CVE-2006-5297)
A flaw was found in the way Mutt processed certain APOP authentication
requests. By sending certain responses when mutt attempted to authenticate
against an APOP server, a remote attacker could potentially acquire certain
portions of a user's authentication credentials. (CVE-2007-1558)
A flaw was found in the way Mutt handled certain characters in gecos fields
which could lead to a buffer overflow. The gecos field is an entry in the
password database typically used to record general information about the
user. A local attacker could give themselves a carefully crafted "Real
Name" which could execute arbitrary code if a victim uses Mutt and expands
the attackers alias. (CVE-2007-2683)
All users of mutt should upgrade to this updated package, which
contains a backported patches to correct these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An updated mutt package that fixes several security bugs is now available for\nRed Hat Enterprise Linux 3, 4 and 5.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "Mutt is a text-mode mail user agent.\n\nA flaw was found in the way Mutt used temporary files on NFS file systems.\nDue to an implementation issue in the NFS protocol, Mutt was not able to\nexclusively open a new file. A local attacker could conduct a\ntime-dependent attack and possibly gain access to e-mail attachments opened\nby a victim. (CVE-2006-5297)\n\nA flaw was found in the way Mutt processed certain APOP authentication\nrequests. By sending certain responses when mutt attempted to authenticate\nagainst an APOP server, a remote attacker could potentially acquire certain\nportions of a user\u0027s authentication credentials. (CVE-2007-1558)\n\nA flaw was found in the way Mutt handled certain characters in gecos fields\nwhich could lead to a buffer overflow. The gecos field is an entry in the\npassword database typically used to record general information about the\nuser. A local attacker could give themselves a carefully crafted \"Real\nName\" which could execute arbitrary code if a victim uses Mutt and expands\nthe attackers alias. (CVE-2007-2683)\n\nAll users of mutt should upgrade to this updated package, which\ncontains a backported patches to correct these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2007:0386", "url": "https://access.redhat.com/errata/RHSA-2007:0386" }, { "category": "external", "summary": "http://www.redhat.com/security/updates/classification/#moderate", "url": "http://www.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "211085", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=211085" }, { "category": "external", "summary": "239890", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=239890" }, { "category": "external", "summary": "241191", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=241191" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2007/rhsa-2007_0386.json" } ], "title": "Red Hat Security Advisory: mutt security update", "tracking": { "current_release_date": "2024-11-22T01:10:09+00:00", "generator": { "date": "2024-11-22T01:10:09+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2007:0386", "initial_release_date": "2007-06-04T08:03:00+00:00", "revision_history": [ { "date": "2007-06-04T08:03:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2008-01-07T17:02:34+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T01:10:09+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 3", "product": { "name": "Red Hat Enterprise Linux AS version 3", "product_id": "3AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::as" } } }, { "category": "product_name", "name": "Red Hat Desktop version 3", "product": { "name": "Red Hat Desktop version 3", "product_id": "3Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 3", "product": { "name": "Red Hat Enterprise Linux ES version 3", "product_id": "3ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 3", "product": { "name": "Red Hat Enterprise Linux WS version 3", "product_id": "3WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "mutt-5:1.4.1-12.0.3.el4.ia64", "product": { "name": "mutt-5:1.4.1-12.0.3.el4.ia64", "product_id": "mutt-5:1.4.1-12.0.3.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mutt@1.4.1-12.0.3.el4?arch=ia64\u0026epoch=5" } } }, { "category": "product_version", "name": "mutt-debuginfo-5:1.4.1-12.0.3.el4.ia64", "product": { "name": "mutt-debuginfo-5:1.4.1-12.0.3.el4.ia64", "product_id": "mutt-debuginfo-5:1.4.1-12.0.3.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mutt-debuginfo@1.4.1-12.0.3.el4?arch=ia64\u0026epoch=5" } } }, { "category": "product_version", "name": "mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ia64", "product": { "name": "mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ia64", "product_id": "mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mutt-debuginfo@1.4.2.2-3.0.2.el5?arch=ia64\u0026epoch=5" } } }, { "category": "product_version", "name": "mutt-5:1.4.2.2-3.0.2.el5.ia64", "product": { "name": "mutt-5:1.4.2.2-3.0.2.el5.ia64", "product_id": "mutt-5:1.4.2.2-3.0.2.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mutt@1.4.2.2-3.0.2.el5?arch=ia64\u0026epoch=5" } } }, { "category": "product_version", "name": "mutt-5:1.4.1-5.el3.ia64", "product": { "name": "mutt-5:1.4.1-5.el3.ia64", "product_id": "mutt-5:1.4.1-5.el3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mutt@1.4.1-5.el3?arch=ia64\u0026epoch=5" } } }, { "category": "product_version", "name": "mutt-debuginfo-5:1.4.1-5.el3.ia64", "product": { "name": "mutt-debuginfo-5:1.4.1-5.el3.ia64", "product_id": "mutt-debuginfo-5:1.4.1-5.el3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mutt-debuginfo@1.4.1-5.el3?arch=ia64\u0026epoch=5" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "mutt-5:1.4.1-12.0.3.el4.src", "product": { "name": "mutt-5:1.4.1-12.0.3.el4.src", "product_id": "mutt-5:1.4.1-12.0.3.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mutt@1.4.1-12.0.3.el4?arch=src\u0026epoch=5" } } }, { "category": "product_version", "name": "mutt-5:1.4.2.2-3.0.2.el5.src", "product": { "name": "mutt-5:1.4.2.2-3.0.2.el5.src", "product_id": "mutt-5:1.4.2.2-3.0.2.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mutt@1.4.2.2-3.0.2.el5?arch=src\u0026epoch=5" } } }, { "category": "product_version", "name": "mutt-5:1.4.1-5.el3.src", "product": { "name": "mutt-5:1.4.1-5.el3.src", "product_id": "mutt-5:1.4.1-5.el3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mutt@1.4.1-5.el3?arch=src\u0026epoch=5" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "mutt-5:1.4.1-12.0.3.el4.x86_64", "product": { "name": "mutt-5:1.4.1-12.0.3.el4.x86_64", "product_id": "mutt-5:1.4.1-12.0.3.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mutt@1.4.1-12.0.3.el4?arch=x86_64\u0026epoch=5" } } }, { "category": "product_version", "name": "mutt-debuginfo-5:1.4.1-12.0.3.el4.x86_64", "product": { "name": "mutt-debuginfo-5:1.4.1-12.0.3.el4.x86_64", "product_id": "mutt-debuginfo-5:1.4.1-12.0.3.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mutt-debuginfo@1.4.1-12.0.3.el4?arch=x86_64\u0026epoch=5" } } }, { "category": "product_version", "name": "mutt-debuginfo-5:1.4.2.2-3.0.2.el5.x86_64", "product": { "name": "mutt-debuginfo-5:1.4.2.2-3.0.2.el5.x86_64", "product_id": "mutt-debuginfo-5:1.4.2.2-3.0.2.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mutt-debuginfo@1.4.2.2-3.0.2.el5?arch=x86_64\u0026epoch=5" } } }, { "category": "product_version", "name": "mutt-5:1.4.2.2-3.0.2.el5.x86_64", "product": { "name": "mutt-5:1.4.2.2-3.0.2.el5.x86_64", "product_id": "mutt-5:1.4.2.2-3.0.2.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mutt@1.4.2.2-3.0.2.el5?arch=x86_64\u0026epoch=5" } } }, { "category": "product_version", "name": "mutt-5:1.4.1-5.el3.x86_64", "product": { "name": "mutt-5:1.4.1-5.el3.x86_64", "product_id": "mutt-5:1.4.1-5.el3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mutt@1.4.1-5.el3?arch=x86_64\u0026epoch=5" } } }, { "category": "product_version", "name": "mutt-debuginfo-5:1.4.1-5.el3.x86_64", "product": { "name": "mutt-debuginfo-5:1.4.1-5.el3.x86_64", "product_id": "mutt-debuginfo-5:1.4.1-5.el3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mutt-debuginfo@1.4.1-5.el3?arch=x86_64\u0026epoch=5" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "mutt-5:1.4.1-12.0.3.el4.i386", "product": { "name": "mutt-5:1.4.1-12.0.3.el4.i386", "product_id": "mutt-5:1.4.1-12.0.3.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mutt@1.4.1-12.0.3.el4?arch=i386\u0026epoch=5" } } }, { "category": "product_version", "name": "mutt-debuginfo-5:1.4.1-12.0.3.el4.i386", "product": { "name": "mutt-debuginfo-5:1.4.1-12.0.3.el4.i386", "product_id": "mutt-debuginfo-5:1.4.1-12.0.3.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mutt-debuginfo@1.4.1-12.0.3.el4?arch=i386\u0026epoch=5" } } }, { "category": "product_version", "name": "mutt-debuginfo-5:1.4.2.2-3.0.2.el5.i386", "product": { "name": "mutt-debuginfo-5:1.4.2.2-3.0.2.el5.i386", "product_id": "mutt-debuginfo-5:1.4.2.2-3.0.2.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mutt-debuginfo@1.4.2.2-3.0.2.el5?arch=i386\u0026epoch=5" } } }, { "category": "product_version", "name": "mutt-5:1.4.2.2-3.0.2.el5.i386", "product": { "name": "mutt-5:1.4.2.2-3.0.2.el5.i386", "product_id": "mutt-5:1.4.2.2-3.0.2.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mutt@1.4.2.2-3.0.2.el5?arch=i386\u0026epoch=5" } } }, { "category": "product_version", "name": "mutt-5:1.4.1-5.el3.i386", "product": { "name": "mutt-5:1.4.1-5.el3.i386", "product_id": "mutt-5:1.4.1-5.el3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mutt@1.4.1-5.el3?arch=i386\u0026epoch=5" } } }, { "category": "product_version", "name": "mutt-debuginfo-5:1.4.1-5.el3.i386", "product": { "name": "mutt-debuginfo-5:1.4.1-5.el3.i386", "product_id": "mutt-debuginfo-5:1.4.1-5.el3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mutt-debuginfo@1.4.1-5.el3?arch=i386\u0026epoch=5" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "mutt-5:1.4.1-12.0.3.el4.ppc", "product": { "name": "mutt-5:1.4.1-12.0.3.el4.ppc", "product_id": "mutt-5:1.4.1-12.0.3.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/mutt@1.4.1-12.0.3.el4?arch=ppc\u0026epoch=5" } } }, { "category": "product_version", "name": "mutt-debuginfo-5:1.4.1-12.0.3.el4.ppc", "product": { "name": "mutt-debuginfo-5:1.4.1-12.0.3.el4.ppc", "product_id": "mutt-debuginfo-5:1.4.1-12.0.3.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/mutt-debuginfo@1.4.1-12.0.3.el4?arch=ppc\u0026epoch=5" } } }, { "category": "product_version", "name": "mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ppc", "product": { "name": "mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ppc", "product_id": "mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/mutt-debuginfo@1.4.2.2-3.0.2.el5?arch=ppc\u0026epoch=5" } } }, { "category": "product_version", "name": "mutt-5:1.4.2.2-3.0.2.el5.ppc", "product": { "name": "mutt-5:1.4.2.2-3.0.2.el5.ppc", "product_id": "mutt-5:1.4.2.2-3.0.2.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/mutt@1.4.2.2-3.0.2.el5?arch=ppc\u0026epoch=5" } } }, { "category": "product_version", "name": "mutt-5:1.4.1-5.el3.ppc", "product": { "name": "mutt-5:1.4.1-5.el3.ppc", "product_id": "mutt-5:1.4.1-5.el3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/mutt@1.4.1-5.el3?arch=ppc\u0026epoch=5" } } }, { "category": "product_version", "name": "mutt-debuginfo-5:1.4.1-5.el3.ppc", "product": { "name": "mutt-debuginfo-5:1.4.1-5.el3.ppc", "product_id": "mutt-debuginfo-5:1.4.1-5.el3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/mutt-debuginfo@1.4.1-5.el3?arch=ppc\u0026epoch=5" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "mutt-5:1.4.1-12.0.3.el4.s390", "product": { "name": "mutt-5:1.4.1-12.0.3.el4.s390", "product_id": "mutt-5:1.4.1-12.0.3.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/mutt@1.4.1-12.0.3.el4?arch=s390\u0026epoch=5" } } }, { "category": "product_version", "name": "mutt-debuginfo-5:1.4.1-12.0.3.el4.s390", "product": { "name": "mutt-debuginfo-5:1.4.1-12.0.3.el4.s390", "product_id": "mutt-debuginfo-5:1.4.1-12.0.3.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/mutt-debuginfo@1.4.1-12.0.3.el4?arch=s390\u0026epoch=5" } } }, { "category": "product_version", "name": "mutt-5:1.4.1-5.el3.s390", "product": { "name": "mutt-5:1.4.1-5.el3.s390", "product_id": "mutt-5:1.4.1-5.el3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/mutt@1.4.1-5.el3?arch=s390\u0026epoch=5" } } }, { "category": "product_version", "name": "mutt-debuginfo-5:1.4.1-5.el3.s390", "product": { "name": "mutt-debuginfo-5:1.4.1-5.el3.s390", "product_id": "mutt-debuginfo-5:1.4.1-5.el3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/mutt-debuginfo@1.4.1-5.el3?arch=s390\u0026epoch=5" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "mutt-5:1.4.1-12.0.3.el4.s390x", "product": { "name": "mutt-5:1.4.1-12.0.3.el4.s390x", "product_id": "mutt-5:1.4.1-12.0.3.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mutt@1.4.1-12.0.3.el4?arch=s390x\u0026epoch=5" } } }, { "category": "product_version", "name": "mutt-debuginfo-5:1.4.1-12.0.3.el4.s390x", "product": { "name": "mutt-debuginfo-5:1.4.1-12.0.3.el4.s390x", "product_id": "mutt-debuginfo-5:1.4.1-12.0.3.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mutt-debuginfo@1.4.1-12.0.3.el4?arch=s390x\u0026epoch=5" } } }, { "category": "product_version", "name": "mutt-debuginfo-5:1.4.2.2-3.0.2.el5.s390x", "product": { "name": "mutt-debuginfo-5:1.4.2.2-3.0.2.el5.s390x", "product_id": "mutt-debuginfo-5:1.4.2.2-3.0.2.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mutt-debuginfo@1.4.2.2-3.0.2.el5?arch=s390x\u0026epoch=5" } } }, { "category": "product_version", "name": "mutt-5:1.4.2.2-3.0.2.el5.s390x", "product": { "name": "mutt-5:1.4.2.2-3.0.2.el5.s390x", "product_id": "mutt-5:1.4.2.2-3.0.2.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mutt@1.4.2.2-3.0.2.el5?arch=s390x\u0026epoch=5" } } }, { "category": "product_version", "name": "mutt-5:1.4.1-5.el3.s390x", "product": { "name": "mutt-5:1.4.1-5.el3.s390x", "product_id": "mutt-5:1.4.1-5.el3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mutt@1.4.1-5.el3?arch=s390x\u0026epoch=5" } } }, { "category": "product_version", "name": "mutt-debuginfo-5:1.4.1-5.el3.s390x", "product": { "name": "mutt-debuginfo-5:1.4.1-5.el3.s390x", "product_id": "mutt-debuginfo-5:1.4.1-5.el3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mutt-debuginfo@1.4.1-5.el3?arch=s390x\u0026epoch=5" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "mutt-5:1.4.1-5.el3.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:mutt-5:1.4.1-5.el3.i386" }, "product_reference": "mutt-5:1.4.1-5.el3.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-5:1.4.1-5.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:mutt-5:1.4.1-5.el3.ia64" }, "product_reference": "mutt-5:1.4.1-5.el3.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-5:1.4.1-5.el3.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:mutt-5:1.4.1-5.el3.ppc" }, "product_reference": "mutt-5:1.4.1-5.el3.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-5:1.4.1-5.el3.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:mutt-5:1.4.1-5.el3.s390" }, "product_reference": "mutt-5:1.4.1-5.el3.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-5:1.4.1-5.el3.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:mutt-5:1.4.1-5.el3.s390x" }, "product_reference": "mutt-5:1.4.1-5.el3.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-5:1.4.1-5.el3.src as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:mutt-5:1.4.1-5.el3.src" }, "product_reference": "mutt-5:1.4.1-5.el3.src", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-5:1.4.1-5.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:mutt-5:1.4.1-5.el3.x86_64" }, "product_reference": "mutt-5:1.4.1-5.el3.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-debuginfo-5:1.4.1-5.el3.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:mutt-debuginfo-5:1.4.1-5.el3.i386" }, "product_reference": "mutt-debuginfo-5:1.4.1-5.el3.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-debuginfo-5:1.4.1-5.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:mutt-debuginfo-5:1.4.1-5.el3.ia64" }, "product_reference": "mutt-debuginfo-5:1.4.1-5.el3.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-debuginfo-5:1.4.1-5.el3.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:mutt-debuginfo-5:1.4.1-5.el3.ppc" }, "product_reference": "mutt-debuginfo-5:1.4.1-5.el3.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-debuginfo-5:1.4.1-5.el3.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:mutt-debuginfo-5:1.4.1-5.el3.s390" }, "product_reference": "mutt-debuginfo-5:1.4.1-5.el3.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-debuginfo-5:1.4.1-5.el3.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:mutt-debuginfo-5:1.4.1-5.el3.s390x" }, "product_reference": "mutt-debuginfo-5:1.4.1-5.el3.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-debuginfo-5:1.4.1-5.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:mutt-debuginfo-5:1.4.1-5.el3.x86_64" }, "product_reference": "mutt-debuginfo-5:1.4.1-5.el3.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-5:1.4.1-5.el3.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:mutt-5:1.4.1-5.el3.i386" }, "product_reference": "mutt-5:1.4.1-5.el3.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-5:1.4.1-5.el3.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:mutt-5:1.4.1-5.el3.ia64" }, "product_reference": "mutt-5:1.4.1-5.el3.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-5:1.4.1-5.el3.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:mutt-5:1.4.1-5.el3.ppc" }, "product_reference": "mutt-5:1.4.1-5.el3.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-5:1.4.1-5.el3.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:mutt-5:1.4.1-5.el3.s390" }, "product_reference": "mutt-5:1.4.1-5.el3.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-5:1.4.1-5.el3.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:mutt-5:1.4.1-5.el3.s390x" }, "product_reference": "mutt-5:1.4.1-5.el3.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-5:1.4.1-5.el3.src as a component of Red Hat Desktop version 3", "product_id": "3Desktop:mutt-5:1.4.1-5.el3.src" }, "product_reference": "mutt-5:1.4.1-5.el3.src", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-5:1.4.1-5.el3.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:mutt-5:1.4.1-5.el3.x86_64" }, "product_reference": "mutt-5:1.4.1-5.el3.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-debuginfo-5:1.4.1-5.el3.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:mutt-debuginfo-5:1.4.1-5.el3.i386" }, "product_reference": "mutt-debuginfo-5:1.4.1-5.el3.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-debuginfo-5:1.4.1-5.el3.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:mutt-debuginfo-5:1.4.1-5.el3.ia64" }, "product_reference": "mutt-debuginfo-5:1.4.1-5.el3.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-debuginfo-5:1.4.1-5.el3.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:mutt-debuginfo-5:1.4.1-5.el3.ppc" }, "product_reference": "mutt-debuginfo-5:1.4.1-5.el3.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-debuginfo-5:1.4.1-5.el3.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:mutt-debuginfo-5:1.4.1-5.el3.s390" }, "product_reference": "mutt-debuginfo-5:1.4.1-5.el3.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-debuginfo-5:1.4.1-5.el3.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:mutt-debuginfo-5:1.4.1-5.el3.s390x" }, "product_reference": "mutt-debuginfo-5:1.4.1-5.el3.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-debuginfo-5:1.4.1-5.el3.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:mutt-debuginfo-5:1.4.1-5.el3.x86_64" }, "product_reference": "mutt-debuginfo-5:1.4.1-5.el3.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-5:1.4.1-5.el3.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:mutt-5:1.4.1-5.el3.i386" }, "product_reference": "mutt-5:1.4.1-5.el3.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-5:1.4.1-5.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:mutt-5:1.4.1-5.el3.ia64" }, "product_reference": "mutt-5:1.4.1-5.el3.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-5:1.4.1-5.el3.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:mutt-5:1.4.1-5.el3.ppc" }, "product_reference": "mutt-5:1.4.1-5.el3.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-5:1.4.1-5.el3.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:mutt-5:1.4.1-5.el3.s390" }, "product_reference": "mutt-5:1.4.1-5.el3.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-5:1.4.1-5.el3.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:mutt-5:1.4.1-5.el3.s390x" }, "product_reference": "mutt-5:1.4.1-5.el3.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-5:1.4.1-5.el3.src as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:mutt-5:1.4.1-5.el3.src" }, "product_reference": "mutt-5:1.4.1-5.el3.src", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-5:1.4.1-5.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:mutt-5:1.4.1-5.el3.x86_64" }, "product_reference": "mutt-5:1.4.1-5.el3.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-debuginfo-5:1.4.1-5.el3.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:mutt-debuginfo-5:1.4.1-5.el3.i386" }, "product_reference": "mutt-debuginfo-5:1.4.1-5.el3.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-debuginfo-5:1.4.1-5.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:mutt-debuginfo-5:1.4.1-5.el3.ia64" }, "product_reference": "mutt-debuginfo-5:1.4.1-5.el3.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-debuginfo-5:1.4.1-5.el3.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:mutt-debuginfo-5:1.4.1-5.el3.ppc" }, "product_reference": "mutt-debuginfo-5:1.4.1-5.el3.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-debuginfo-5:1.4.1-5.el3.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:mutt-debuginfo-5:1.4.1-5.el3.s390" }, "product_reference": "mutt-debuginfo-5:1.4.1-5.el3.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-debuginfo-5:1.4.1-5.el3.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:mutt-debuginfo-5:1.4.1-5.el3.s390x" }, "product_reference": "mutt-debuginfo-5:1.4.1-5.el3.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-debuginfo-5:1.4.1-5.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:mutt-debuginfo-5:1.4.1-5.el3.x86_64" }, "product_reference": "mutt-debuginfo-5:1.4.1-5.el3.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-5:1.4.1-5.el3.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:mutt-5:1.4.1-5.el3.i386" }, "product_reference": "mutt-5:1.4.1-5.el3.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-5:1.4.1-5.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:mutt-5:1.4.1-5.el3.ia64" }, "product_reference": "mutt-5:1.4.1-5.el3.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-5:1.4.1-5.el3.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:mutt-5:1.4.1-5.el3.ppc" }, "product_reference": "mutt-5:1.4.1-5.el3.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-5:1.4.1-5.el3.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:mutt-5:1.4.1-5.el3.s390" }, "product_reference": "mutt-5:1.4.1-5.el3.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-5:1.4.1-5.el3.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:mutt-5:1.4.1-5.el3.s390x" }, "product_reference": "mutt-5:1.4.1-5.el3.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-5:1.4.1-5.el3.src as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:mutt-5:1.4.1-5.el3.src" }, "product_reference": "mutt-5:1.4.1-5.el3.src", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-5:1.4.1-5.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:mutt-5:1.4.1-5.el3.x86_64" }, "product_reference": "mutt-5:1.4.1-5.el3.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-debuginfo-5:1.4.1-5.el3.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:mutt-debuginfo-5:1.4.1-5.el3.i386" }, "product_reference": "mutt-debuginfo-5:1.4.1-5.el3.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-debuginfo-5:1.4.1-5.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:mutt-debuginfo-5:1.4.1-5.el3.ia64" }, "product_reference": "mutt-debuginfo-5:1.4.1-5.el3.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-debuginfo-5:1.4.1-5.el3.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:mutt-debuginfo-5:1.4.1-5.el3.ppc" }, "product_reference": "mutt-debuginfo-5:1.4.1-5.el3.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-debuginfo-5:1.4.1-5.el3.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:mutt-debuginfo-5:1.4.1-5.el3.s390" }, "product_reference": "mutt-debuginfo-5:1.4.1-5.el3.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-debuginfo-5:1.4.1-5.el3.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:mutt-debuginfo-5:1.4.1-5.el3.s390x" }, "product_reference": "mutt-debuginfo-5:1.4.1-5.el3.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-debuginfo-5:1.4.1-5.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:mutt-debuginfo-5:1.4.1-5.el3.x86_64" }, "product_reference": "mutt-debuginfo-5:1.4.1-5.el3.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-5:1.4.1-12.0.3.el4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:mutt-5:1.4.1-12.0.3.el4.i386" }, "product_reference": "mutt-5:1.4.1-12.0.3.el4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-5:1.4.1-12.0.3.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:mutt-5:1.4.1-12.0.3.el4.ia64" }, "product_reference": "mutt-5:1.4.1-12.0.3.el4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-5:1.4.1-12.0.3.el4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:mutt-5:1.4.1-12.0.3.el4.ppc" }, "product_reference": "mutt-5:1.4.1-12.0.3.el4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-5:1.4.1-12.0.3.el4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:mutt-5:1.4.1-12.0.3.el4.s390" }, "product_reference": "mutt-5:1.4.1-12.0.3.el4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-5:1.4.1-12.0.3.el4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:mutt-5:1.4.1-12.0.3.el4.s390x" }, "product_reference": "mutt-5:1.4.1-12.0.3.el4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-5:1.4.1-12.0.3.el4.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:mutt-5:1.4.1-12.0.3.el4.src" }, "product_reference": "mutt-5:1.4.1-12.0.3.el4.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-5:1.4.1-12.0.3.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:mutt-5:1.4.1-12.0.3.el4.x86_64" }, "product_reference": "mutt-5:1.4.1-12.0.3.el4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-debuginfo-5:1.4.1-12.0.3.el4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.i386" }, "product_reference": "mutt-debuginfo-5:1.4.1-12.0.3.el4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-debuginfo-5:1.4.1-12.0.3.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.ia64" }, "product_reference": "mutt-debuginfo-5:1.4.1-12.0.3.el4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-debuginfo-5:1.4.1-12.0.3.el4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.ppc" }, "product_reference": "mutt-debuginfo-5:1.4.1-12.0.3.el4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-debuginfo-5:1.4.1-12.0.3.el4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390" }, "product_reference": "mutt-debuginfo-5:1.4.1-12.0.3.el4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-debuginfo-5:1.4.1-12.0.3.el4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390x" }, "product_reference": "mutt-debuginfo-5:1.4.1-12.0.3.el4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-debuginfo-5:1.4.1-12.0.3.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.x86_64" }, "product_reference": "mutt-debuginfo-5:1.4.1-12.0.3.el4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-5:1.4.1-12.0.3.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:mutt-5:1.4.1-12.0.3.el4.i386" }, "product_reference": "mutt-5:1.4.1-12.0.3.el4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-5:1.4.1-12.0.3.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:mutt-5:1.4.1-12.0.3.el4.ia64" }, "product_reference": "mutt-5:1.4.1-12.0.3.el4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-5:1.4.1-12.0.3.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:mutt-5:1.4.1-12.0.3.el4.ppc" }, "product_reference": "mutt-5:1.4.1-12.0.3.el4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-5:1.4.1-12.0.3.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:mutt-5:1.4.1-12.0.3.el4.s390" }, "product_reference": "mutt-5:1.4.1-12.0.3.el4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-5:1.4.1-12.0.3.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:mutt-5:1.4.1-12.0.3.el4.s390x" }, "product_reference": "mutt-5:1.4.1-12.0.3.el4.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-5:1.4.1-12.0.3.el4.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:mutt-5:1.4.1-12.0.3.el4.src" }, "product_reference": "mutt-5:1.4.1-12.0.3.el4.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-5:1.4.1-12.0.3.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:mutt-5:1.4.1-12.0.3.el4.x86_64" }, "product_reference": "mutt-5:1.4.1-12.0.3.el4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-debuginfo-5:1.4.1-12.0.3.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.i386" }, "product_reference": "mutt-debuginfo-5:1.4.1-12.0.3.el4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-debuginfo-5:1.4.1-12.0.3.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.ia64" }, "product_reference": "mutt-debuginfo-5:1.4.1-12.0.3.el4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-debuginfo-5:1.4.1-12.0.3.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.ppc" }, "product_reference": "mutt-debuginfo-5:1.4.1-12.0.3.el4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-debuginfo-5:1.4.1-12.0.3.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390" }, "product_reference": "mutt-debuginfo-5:1.4.1-12.0.3.el4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-debuginfo-5:1.4.1-12.0.3.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390x" }, "product_reference": "mutt-debuginfo-5:1.4.1-12.0.3.el4.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-debuginfo-5:1.4.1-12.0.3.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.x86_64" }, "product_reference": "mutt-debuginfo-5:1.4.1-12.0.3.el4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-5:1.4.1-12.0.3.el4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:mutt-5:1.4.1-12.0.3.el4.i386" }, "product_reference": "mutt-5:1.4.1-12.0.3.el4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-5:1.4.1-12.0.3.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:mutt-5:1.4.1-12.0.3.el4.ia64" }, "product_reference": "mutt-5:1.4.1-12.0.3.el4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-5:1.4.1-12.0.3.el4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:mutt-5:1.4.1-12.0.3.el4.ppc" }, "product_reference": "mutt-5:1.4.1-12.0.3.el4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-5:1.4.1-12.0.3.el4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:mutt-5:1.4.1-12.0.3.el4.s390" }, "product_reference": "mutt-5:1.4.1-12.0.3.el4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-5:1.4.1-12.0.3.el4.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:mutt-5:1.4.1-12.0.3.el4.s390x" }, "product_reference": "mutt-5:1.4.1-12.0.3.el4.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-5:1.4.1-12.0.3.el4.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:mutt-5:1.4.1-12.0.3.el4.src" }, "product_reference": "mutt-5:1.4.1-12.0.3.el4.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-5:1.4.1-12.0.3.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:mutt-5:1.4.1-12.0.3.el4.x86_64" }, "product_reference": "mutt-5:1.4.1-12.0.3.el4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-debuginfo-5:1.4.1-12.0.3.el4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.i386" }, "product_reference": "mutt-debuginfo-5:1.4.1-12.0.3.el4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-debuginfo-5:1.4.1-12.0.3.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.ia64" }, "product_reference": "mutt-debuginfo-5:1.4.1-12.0.3.el4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-debuginfo-5:1.4.1-12.0.3.el4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.ppc" }, "product_reference": "mutt-debuginfo-5:1.4.1-12.0.3.el4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-debuginfo-5:1.4.1-12.0.3.el4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390" }, "product_reference": "mutt-debuginfo-5:1.4.1-12.0.3.el4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-debuginfo-5:1.4.1-12.0.3.el4.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390x" }, "product_reference": "mutt-debuginfo-5:1.4.1-12.0.3.el4.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-debuginfo-5:1.4.1-12.0.3.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.x86_64" }, "product_reference": "mutt-debuginfo-5:1.4.1-12.0.3.el4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-5:1.4.1-12.0.3.el4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:mutt-5:1.4.1-12.0.3.el4.i386" }, "product_reference": "mutt-5:1.4.1-12.0.3.el4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-5:1.4.1-12.0.3.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:mutt-5:1.4.1-12.0.3.el4.ia64" }, "product_reference": "mutt-5:1.4.1-12.0.3.el4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-5:1.4.1-12.0.3.el4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:mutt-5:1.4.1-12.0.3.el4.ppc" }, "product_reference": "mutt-5:1.4.1-12.0.3.el4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-5:1.4.1-12.0.3.el4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:mutt-5:1.4.1-12.0.3.el4.s390" }, "product_reference": "mutt-5:1.4.1-12.0.3.el4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-5:1.4.1-12.0.3.el4.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:mutt-5:1.4.1-12.0.3.el4.s390x" }, "product_reference": "mutt-5:1.4.1-12.0.3.el4.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-5:1.4.1-12.0.3.el4.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:mutt-5:1.4.1-12.0.3.el4.src" }, "product_reference": "mutt-5:1.4.1-12.0.3.el4.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-5:1.4.1-12.0.3.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:mutt-5:1.4.1-12.0.3.el4.x86_64" }, "product_reference": "mutt-5:1.4.1-12.0.3.el4.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-debuginfo-5:1.4.1-12.0.3.el4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.i386" }, "product_reference": "mutt-debuginfo-5:1.4.1-12.0.3.el4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-debuginfo-5:1.4.1-12.0.3.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.ia64" }, "product_reference": "mutt-debuginfo-5:1.4.1-12.0.3.el4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-debuginfo-5:1.4.1-12.0.3.el4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.ppc" }, "product_reference": "mutt-debuginfo-5:1.4.1-12.0.3.el4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-debuginfo-5:1.4.1-12.0.3.el4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390" }, "product_reference": "mutt-debuginfo-5:1.4.1-12.0.3.el4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-debuginfo-5:1.4.1-12.0.3.el4.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390x" }, "product_reference": "mutt-debuginfo-5:1.4.1-12.0.3.el4.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-debuginfo-5:1.4.1-12.0.3.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.x86_64" }, "product_reference": "mutt-debuginfo-5:1.4.1-12.0.3.el4.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-5:1.4.2.2-3.0.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:mutt-5:1.4.2.2-3.0.2.el5.i386" }, "product_reference": "mutt-5:1.4.2.2-3.0.2.el5.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-5:1.4.2.2-3.0.2.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:mutt-5:1.4.2.2-3.0.2.el5.ia64" }, "product_reference": "mutt-5:1.4.2.2-3.0.2.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-5:1.4.2.2-3.0.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:mutt-5:1.4.2.2-3.0.2.el5.ppc" }, "product_reference": "mutt-5:1.4.2.2-3.0.2.el5.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-5:1.4.2.2-3.0.2.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:mutt-5:1.4.2.2-3.0.2.el5.s390x" }, "product_reference": "mutt-5:1.4.2.2-3.0.2.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-5:1.4.2.2-3.0.2.el5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:mutt-5:1.4.2.2-3.0.2.el5.src" }, "product_reference": "mutt-5:1.4.2.2-3.0.2.el5.src", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-5:1.4.2.2-3.0.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:mutt-5:1.4.2.2-3.0.2.el5.x86_64" }, "product_reference": "mutt-5:1.4.2.2-3.0.2.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-debuginfo-5:1.4.2.2-3.0.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.i386" }, "product_reference": "mutt-debuginfo-5:1.4.2.2-3.0.2.el5.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ia64" }, "product_reference": "mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ppc" }, "product_reference": "mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-debuginfo-5:1.4.2.2-3.0.2.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.s390x" }, "product_reference": "mutt-debuginfo-5:1.4.2.2-3.0.2.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-debuginfo-5:1.4.2.2-3.0.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.x86_64" }, "product_reference": "mutt-debuginfo-5:1.4.2.2-3.0.2.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-5:1.4.2.2-3.0.2.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:mutt-5:1.4.2.2-3.0.2.el5.i386" }, "product_reference": "mutt-5:1.4.2.2-3.0.2.el5.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-5:1.4.2.2-3.0.2.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:mutt-5:1.4.2.2-3.0.2.el5.ia64" }, "product_reference": "mutt-5:1.4.2.2-3.0.2.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-5:1.4.2.2-3.0.2.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:mutt-5:1.4.2.2-3.0.2.el5.ppc" }, "product_reference": "mutt-5:1.4.2.2-3.0.2.el5.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-5:1.4.2.2-3.0.2.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:mutt-5:1.4.2.2-3.0.2.el5.s390x" }, "product_reference": "mutt-5:1.4.2.2-3.0.2.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-5:1.4.2.2-3.0.2.el5.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:mutt-5:1.4.2.2-3.0.2.el5.src" }, "product_reference": "mutt-5:1.4.2.2-3.0.2.el5.src", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-5:1.4.2.2-3.0.2.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:mutt-5:1.4.2.2-3.0.2.el5.x86_64" }, "product_reference": "mutt-5:1.4.2.2-3.0.2.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-debuginfo-5:1.4.2.2-3.0.2.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.i386" }, "product_reference": "mutt-debuginfo-5:1.4.2.2-3.0.2.el5.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ia64" }, "product_reference": "mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ppc" }, "product_reference": "mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-debuginfo-5:1.4.2.2-3.0.2.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.s390x" }, "product_reference": "mutt-debuginfo-5:1.4.2.2-3.0.2.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "mutt-debuginfo-5:1.4.2.2-3.0.2.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.x86_64" }, "product_reference": "mutt-debuginfo-5:1.4.2.2-3.0.2.el5.x86_64", "relates_to_product_reference": "5Server" } ] }, "vulnerabilities": [ { "cve": "CVE-2006-5297", "discovery_date": "2006-10-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "211085" } ], "notes": [ { "category": "description", "text": "Race condition in the safe_open function in the Mutt mail client 1.5.12 and earlier, when creating temporary files in an NFS filesystem, allows local users to overwrite arbitrary files due to limitations of the use of the O_EXCL flag on NFS filesystems.", "title": "Vulnerability description" }, { "category": "summary", "text": "Multiple mutt tempfile race conditions", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.\n\nThe risks associated with fixing this bug are greater than the low severity security risk. We therefore currently have no plans to fix this flaw in Red Hat Enterprise Linux 2.1 which is in maintenance mode.", "title": "Statement" } ], "product_status": { "fixed": [ "3AS:mutt-5:1.4.1-5.el3.i386", "3AS:mutt-5:1.4.1-5.el3.ia64", "3AS:mutt-5:1.4.1-5.el3.ppc", "3AS:mutt-5:1.4.1-5.el3.s390", "3AS:mutt-5:1.4.1-5.el3.s390x", "3AS:mutt-5:1.4.1-5.el3.src", "3AS:mutt-5:1.4.1-5.el3.x86_64", "3AS:mutt-debuginfo-5:1.4.1-5.el3.i386", "3AS:mutt-debuginfo-5:1.4.1-5.el3.ia64", "3AS:mutt-debuginfo-5:1.4.1-5.el3.ppc", "3AS:mutt-debuginfo-5:1.4.1-5.el3.s390", "3AS:mutt-debuginfo-5:1.4.1-5.el3.s390x", "3AS:mutt-debuginfo-5:1.4.1-5.el3.x86_64", "3Desktop:mutt-5:1.4.1-5.el3.i386", "3Desktop:mutt-5:1.4.1-5.el3.ia64", "3Desktop:mutt-5:1.4.1-5.el3.ppc", "3Desktop:mutt-5:1.4.1-5.el3.s390", "3Desktop:mutt-5:1.4.1-5.el3.s390x", "3Desktop:mutt-5:1.4.1-5.el3.src", "3Desktop:mutt-5:1.4.1-5.el3.x86_64", "3Desktop:mutt-debuginfo-5:1.4.1-5.el3.i386", "3Desktop:mutt-debuginfo-5:1.4.1-5.el3.ia64", "3Desktop:mutt-debuginfo-5:1.4.1-5.el3.ppc", "3Desktop:mutt-debuginfo-5:1.4.1-5.el3.s390", "3Desktop:mutt-debuginfo-5:1.4.1-5.el3.s390x", "3Desktop:mutt-debuginfo-5:1.4.1-5.el3.x86_64", "3ES:mutt-5:1.4.1-5.el3.i386", "3ES:mutt-5:1.4.1-5.el3.ia64", "3ES:mutt-5:1.4.1-5.el3.ppc", "3ES:mutt-5:1.4.1-5.el3.s390", "3ES:mutt-5:1.4.1-5.el3.s390x", "3ES:mutt-5:1.4.1-5.el3.src", "3ES:mutt-5:1.4.1-5.el3.x86_64", "3ES:mutt-debuginfo-5:1.4.1-5.el3.i386", "3ES:mutt-debuginfo-5:1.4.1-5.el3.ia64", "3ES:mutt-debuginfo-5:1.4.1-5.el3.ppc", "3ES:mutt-debuginfo-5:1.4.1-5.el3.s390", "3ES:mutt-debuginfo-5:1.4.1-5.el3.s390x", "3ES:mutt-debuginfo-5:1.4.1-5.el3.x86_64", "3WS:mutt-5:1.4.1-5.el3.i386", "3WS:mutt-5:1.4.1-5.el3.ia64", "3WS:mutt-5:1.4.1-5.el3.ppc", "3WS:mutt-5:1.4.1-5.el3.s390", "3WS:mutt-5:1.4.1-5.el3.s390x", "3WS:mutt-5:1.4.1-5.el3.src", "3WS:mutt-5:1.4.1-5.el3.x86_64", "3WS:mutt-debuginfo-5:1.4.1-5.el3.i386", "3WS:mutt-debuginfo-5:1.4.1-5.el3.ia64", "3WS:mutt-debuginfo-5:1.4.1-5.el3.ppc", "3WS:mutt-debuginfo-5:1.4.1-5.el3.s390", "3WS:mutt-debuginfo-5:1.4.1-5.el3.s390x", "3WS:mutt-debuginfo-5:1.4.1-5.el3.x86_64", "4AS:mutt-5:1.4.1-12.0.3.el4.i386", "4AS:mutt-5:1.4.1-12.0.3.el4.ia64", "4AS:mutt-5:1.4.1-12.0.3.el4.ppc", "4AS:mutt-5:1.4.1-12.0.3.el4.s390", "4AS:mutt-5:1.4.1-12.0.3.el4.s390x", "4AS:mutt-5:1.4.1-12.0.3.el4.src", "4AS:mutt-5:1.4.1-12.0.3.el4.x86_64", "4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.i386", "4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.ia64", "4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.ppc", "4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390", "4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390x", "4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.x86_64", "4Desktop:mutt-5:1.4.1-12.0.3.el4.i386", "4Desktop:mutt-5:1.4.1-12.0.3.el4.ia64", "4Desktop:mutt-5:1.4.1-12.0.3.el4.ppc", "4Desktop:mutt-5:1.4.1-12.0.3.el4.s390", "4Desktop:mutt-5:1.4.1-12.0.3.el4.s390x", "4Desktop:mutt-5:1.4.1-12.0.3.el4.src", "4Desktop:mutt-5:1.4.1-12.0.3.el4.x86_64", "4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.i386", "4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.ia64", "4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.ppc", "4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390", "4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390x", "4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.x86_64", "4ES:mutt-5:1.4.1-12.0.3.el4.i386", "4ES:mutt-5:1.4.1-12.0.3.el4.ia64", "4ES:mutt-5:1.4.1-12.0.3.el4.ppc", "4ES:mutt-5:1.4.1-12.0.3.el4.s390", "4ES:mutt-5:1.4.1-12.0.3.el4.s390x", "4ES:mutt-5:1.4.1-12.0.3.el4.src", "4ES:mutt-5:1.4.1-12.0.3.el4.x86_64", "4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.i386", "4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.ia64", "4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.ppc", "4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390", "4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390x", "4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.x86_64", "4WS:mutt-5:1.4.1-12.0.3.el4.i386", "4WS:mutt-5:1.4.1-12.0.3.el4.ia64", "4WS:mutt-5:1.4.1-12.0.3.el4.ppc", "4WS:mutt-5:1.4.1-12.0.3.el4.s390", "4WS:mutt-5:1.4.1-12.0.3.el4.s390x", "4WS:mutt-5:1.4.1-12.0.3.el4.src", "4WS:mutt-5:1.4.1-12.0.3.el4.x86_64", "4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.i386", "4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.ia64", "4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.ppc", "4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390", "4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390x", "4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.x86_64", "5Client:mutt-5:1.4.2.2-3.0.2.el5.i386", "5Client:mutt-5:1.4.2.2-3.0.2.el5.ia64", "5Client:mutt-5:1.4.2.2-3.0.2.el5.ppc", "5Client:mutt-5:1.4.2.2-3.0.2.el5.s390x", "5Client:mutt-5:1.4.2.2-3.0.2.el5.src", "5Client:mutt-5:1.4.2.2-3.0.2.el5.x86_64", "5Client:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.i386", "5Client:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ia64", "5Client:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ppc", "5Client:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.s390x", "5Client:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.x86_64", "5Server:mutt-5:1.4.2.2-3.0.2.el5.i386", "5Server:mutt-5:1.4.2.2-3.0.2.el5.ia64", "5Server:mutt-5:1.4.2.2-3.0.2.el5.ppc", "5Server:mutt-5:1.4.2.2-3.0.2.el5.s390x", "5Server:mutt-5:1.4.2.2-3.0.2.el5.src", "5Server:mutt-5:1.4.2.2-3.0.2.el5.x86_64", "5Server:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.i386", "5Server:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ia64", "5Server:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ppc", "5Server:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.s390x", "5Server:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-5297" }, { "category": "external", "summary": "RHBZ#211085", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=211085" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-5297", "url": "https://www.cve.org/CVERecord?id=CVE-2006-5297" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-5297", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-5297" } ], "release_date": "2006-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-06-04T08:03:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "3AS:mutt-5:1.4.1-5.el3.i386", "3AS:mutt-5:1.4.1-5.el3.ia64", "3AS:mutt-5:1.4.1-5.el3.ppc", "3AS:mutt-5:1.4.1-5.el3.s390", "3AS:mutt-5:1.4.1-5.el3.s390x", "3AS:mutt-5:1.4.1-5.el3.src", "3AS:mutt-5:1.4.1-5.el3.x86_64", "3AS:mutt-debuginfo-5:1.4.1-5.el3.i386", "3AS:mutt-debuginfo-5:1.4.1-5.el3.ia64", "3AS:mutt-debuginfo-5:1.4.1-5.el3.ppc", "3AS:mutt-debuginfo-5:1.4.1-5.el3.s390", "3AS:mutt-debuginfo-5:1.4.1-5.el3.s390x", "3AS:mutt-debuginfo-5:1.4.1-5.el3.x86_64", "3Desktop:mutt-5:1.4.1-5.el3.i386", "3Desktop:mutt-5:1.4.1-5.el3.ia64", "3Desktop:mutt-5:1.4.1-5.el3.ppc", "3Desktop:mutt-5:1.4.1-5.el3.s390", "3Desktop:mutt-5:1.4.1-5.el3.s390x", "3Desktop:mutt-5:1.4.1-5.el3.src", "3Desktop:mutt-5:1.4.1-5.el3.x86_64", "3Desktop:mutt-debuginfo-5:1.4.1-5.el3.i386", "3Desktop:mutt-debuginfo-5:1.4.1-5.el3.ia64", "3Desktop:mutt-debuginfo-5:1.4.1-5.el3.ppc", "3Desktop:mutt-debuginfo-5:1.4.1-5.el3.s390", "3Desktop:mutt-debuginfo-5:1.4.1-5.el3.s390x", "3Desktop:mutt-debuginfo-5:1.4.1-5.el3.x86_64", "3ES:mutt-5:1.4.1-5.el3.i386", "3ES:mutt-5:1.4.1-5.el3.ia64", "3ES:mutt-5:1.4.1-5.el3.ppc", "3ES:mutt-5:1.4.1-5.el3.s390", "3ES:mutt-5:1.4.1-5.el3.s390x", "3ES:mutt-5:1.4.1-5.el3.src", "3ES:mutt-5:1.4.1-5.el3.x86_64", "3ES:mutt-debuginfo-5:1.4.1-5.el3.i386", "3ES:mutt-debuginfo-5:1.4.1-5.el3.ia64", "3ES:mutt-debuginfo-5:1.4.1-5.el3.ppc", "3ES:mutt-debuginfo-5:1.4.1-5.el3.s390", "3ES:mutt-debuginfo-5:1.4.1-5.el3.s390x", "3ES:mutt-debuginfo-5:1.4.1-5.el3.x86_64", "3WS:mutt-5:1.4.1-5.el3.i386", "3WS:mutt-5:1.4.1-5.el3.ia64", "3WS:mutt-5:1.4.1-5.el3.ppc", "3WS:mutt-5:1.4.1-5.el3.s390", "3WS:mutt-5:1.4.1-5.el3.s390x", "3WS:mutt-5:1.4.1-5.el3.src", "3WS:mutt-5:1.4.1-5.el3.x86_64", "3WS:mutt-debuginfo-5:1.4.1-5.el3.i386", "3WS:mutt-debuginfo-5:1.4.1-5.el3.ia64", "3WS:mutt-debuginfo-5:1.4.1-5.el3.ppc", "3WS:mutt-debuginfo-5:1.4.1-5.el3.s390", "3WS:mutt-debuginfo-5:1.4.1-5.el3.s390x", "3WS:mutt-debuginfo-5:1.4.1-5.el3.x86_64", "4AS:mutt-5:1.4.1-12.0.3.el4.i386", "4AS:mutt-5:1.4.1-12.0.3.el4.ia64", "4AS:mutt-5:1.4.1-12.0.3.el4.ppc", "4AS:mutt-5:1.4.1-12.0.3.el4.s390", "4AS:mutt-5:1.4.1-12.0.3.el4.s390x", "4AS:mutt-5:1.4.1-12.0.3.el4.src", "4AS:mutt-5:1.4.1-12.0.3.el4.x86_64", "4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.i386", "4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.ia64", "4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.ppc", "4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390", "4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390x", "4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.x86_64", "4Desktop:mutt-5:1.4.1-12.0.3.el4.i386", "4Desktop:mutt-5:1.4.1-12.0.3.el4.ia64", "4Desktop:mutt-5:1.4.1-12.0.3.el4.ppc", "4Desktop:mutt-5:1.4.1-12.0.3.el4.s390", "4Desktop:mutt-5:1.4.1-12.0.3.el4.s390x", "4Desktop:mutt-5:1.4.1-12.0.3.el4.src", "4Desktop:mutt-5:1.4.1-12.0.3.el4.x86_64", "4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.i386", "4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.ia64", "4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.ppc", "4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390", "4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390x", "4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.x86_64", "4ES:mutt-5:1.4.1-12.0.3.el4.i386", "4ES:mutt-5:1.4.1-12.0.3.el4.ia64", "4ES:mutt-5:1.4.1-12.0.3.el4.ppc", "4ES:mutt-5:1.4.1-12.0.3.el4.s390", "4ES:mutt-5:1.4.1-12.0.3.el4.s390x", "4ES:mutt-5:1.4.1-12.0.3.el4.src", "4ES:mutt-5:1.4.1-12.0.3.el4.x86_64", "4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.i386", "4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.ia64", "4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.ppc", "4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390", "4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390x", "4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.x86_64", "4WS:mutt-5:1.4.1-12.0.3.el4.i386", "4WS:mutt-5:1.4.1-12.0.3.el4.ia64", "4WS:mutt-5:1.4.1-12.0.3.el4.ppc", "4WS:mutt-5:1.4.1-12.0.3.el4.s390", "4WS:mutt-5:1.4.1-12.0.3.el4.s390x", "4WS:mutt-5:1.4.1-12.0.3.el4.src", "4WS:mutt-5:1.4.1-12.0.3.el4.x86_64", "4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.i386", "4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.ia64", "4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.ppc", "4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390", "4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390x", "4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.x86_64", "5Client:mutt-5:1.4.2.2-3.0.2.el5.i386", "5Client:mutt-5:1.4.2.2-3.0.2.el5.ia64", "5Client:mutt-5:1.4.2.2-3.0.2.el5.ppc", "5Client:mutt-5:1.4.2.2-3.0.2.el5.s390x", "5Client:mutt-5:1.4.2.2-3.0.2.el5.src", "5Client:mutt-5:1.4.2.2-3.0.2.el5.x86_64", "5Client:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.i386", "5Client:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ia64", "5Client:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ppc", "5Client:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.s390x", "5Client:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.x86_64", "5Server:mutt-5:1.4.2.2-3.0.2.el5.i386", "5Server:mutt-5:1.4.2.2-3.0.2.el5.ia64", "5Server:mutt-5:1.4.2.2-3.0.2.el5.ppc", "5Server:mutt-5:1.4.2.2-3.0.2.el5.s390x", "5Server:mutt-5:1.4.2.2-3.0.2.el5.src", "5Server:mutt-5:1.4.2.2-3.0.2.el5.x86_64", "5Server:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.i386", "5Server:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ia64", "5Server:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ppc", "5Server:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.s390x", "5Server:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:0386" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "Multiple mutt tempfile race conditions" }, { "cve": "CVE-2007-1558", "discovery_date": "2007-03-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "241191" } ], "notes": [ { "category": "description", "text": "The APOP protocol allows remote attackers to guess the first 3 characters of a password via man-in-the-middle (MITM) attacks that use crafted message IDs and MD5 collisions. NOTE: this design-level issue potentially affects all products that use APOP, including (1) Thunderbird 1.x before 1.5.0.12 and 2.x before 2.0.0.4, (2) Evolution, (3) mutt, (4) fetchmail before 6.3.8, (5) SeaMonkey 1.0.x before 1.0.9 and 1.1.x before 1.1.2, (6) Balsa 2.3.16 and earlier, (7) Mailfilter before 0.8.2, and possibly other products.", "title": "Vulnerability description" }, { "category": "summary", "text": "fetchmail/mutt/evolution/...: APOP password disclosure vulnerability", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "3AS:mutt-5:1.4.1-5.el3.i386", "3AS:mutt-5:1.4.1-5.el3.ia64", "3AS:mutt-5:1.4.1-5.el3.ppc", "3AS:mutt-5:1.4.1-5.el3.s390", "3AS:mutt-5:1.4.1-5.el3.s390x", "3AS:mutt-5:1.4.1-5.el3.src", "3AS:mutt-5:1.4.1-5.el3.x86_64", "3AS:mutt-debuginfo-5:1.4.1-5.el3.i386", "3AS:mutt-debuginfo-5:1.4.1-5.el3.ia64", "3AS:mutt-debuginfo-5:1.4.1-5.el3.ppc", "3AS:mutt-debuginfo-5:1.4.1-5.el3.s390", "3AS:mutt-debuginfo-5:1.4.1-5.el3.s390x", "3AS:mutt-debuginfo-5:1.4.1-5.el3.x86_64", "3Desktop:mutt-5:1.4.1-5.el3.i386", "3Desktop:mutt-5:1.4.1-5.el3.ia64", "3Desktop:mutt-5:1.4.1-5.el3.ppc", "3Desktop:mutt-5:1.4.1-5.el3.s390", "3Desktop:mutt-5:1.4.1-5.el3.s390x", "3Desktop:mutt-5:1.4.1-5.el3.src", "3Desktop:mutt-5:1.4.1-5.el3.x86_64", "3Desktop:mutt-debuginfo-5:1.4.1-5.el3.i386", "3Desktop:mutt-debuginfo-5:1.4.1-5.el3.ia64", "3Desktop:mutt-debuginfo-5:1.4.1-5.el3.ppc", "3Desktop:mutt-debuginfo-5:1.4.1-5.el3.s390", "3Desktop:mutt-debuginfo-5:1.4.1-5.el3.s390x", "3Desktop:mutt-debuginfo-5:1.4.1-5.el3.x86_64", "3ES:mutt-5:1.4.1-5.el3.i386", "3ES:mutt-5:1.4.1-5.el3.ia64", "3ES:mutt-5:1.4.1-5.el3.ppc", "3ES:mutt-5:1.4.1-5.el3.s390", "3ES:mutt-5:1.4.1-5.el3.s390x", "3ES:mutt-5:1.4.1-5.el3.src", "3ES:mutt-5:1.4.1-5.el3.x86_64", "3ES:mutt-debuginfo-5:1.4.1-5.el3.i386", "3ES:mutt-debuginfo-5:1.4.1-5.el3.ia64", "3ES:mutt-debuginfo-5:1.4.1-5.el3.ppc", "3ES:mutt-debuginfo-5:1.4.1-5.el3.s390", "3ES:mutt-debuginfo-5:1.4.1-5.el3.s390x", "3ES:mutt-debuginfo-5:1.4.1-5.el3.x86_64", "3WS:mutt-5:1.4.1-5.el3.i386", "3WS:mutt-5:1.4.1-5.el3.ia64", "3WS:mutt-5:1.4.1-5.el3.ppc", "3WS:mutt-5:1.4.1-5.el3.s390", "3WS:mutt-5:1.4.1-5.el3.s390x", "3WS:mutt-5:1.4.1-5.el3.src", "3WS:mutt-5:1.4.1-5.el3.x86_64", "3WS:mutt-debuginfo-5:1.4.1-5.el3.i386", "3WS:mutt-debuginfo-5:1.4.1-5.el3.ia64", "3WS:mutt-debuginfo-5:1.4.1-5.el3.ppc", "3WS:mutt-debuginfo-5:1.4.1-5.el3.s390", "3WS:mutt-debuginfo-5:1.4.1-5.el3.s390x", "3WS:mutt-debuginfo-5:1.4.1-5.el3.x86_64", "4AS:mutt-5:1.4.1-12.0.3.el4.i386", "4AS:mutt-5:1.4.1-12.0.3.el4.ia64", "4AS:mutt-5:1.4.1-12.0.3.el4.ppc", "4AS:mutt-5:1.4.1-12.0.3.el4.s390", "4AS:mutt-5:1.4.1-12.0.3.el4.s390x", "4AS:mutt-5:1.4.1-12.0.3.el4.src", "4AS:mutt-5:1.4.1-12.0.3.el4.x86_64", "4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.i386", "4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.ia64", "4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.ppc", "4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390", "4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390x", "4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.x86_64", "4Desktop:mutt-5:1.4.1-12.0.3.el4.i386", "4Desktop:mutt-5:1.4.1-12.0.3.el4.ia64", "4Desktop:mutt-5:1.4.1-12.0.3.el4.ppc", "4Desktop:mutt-5:1.4.1-12.0.3.el4.s390", "4Desktop:mutt-5:1.4.1-12.0.3.el4.s390x", "4Desktop:mutt-5:1.4.1-12.0.3.el4.src", "4Desktop:mutt-5:1.4.1-12.0.3.el4.x86_64", "4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.i386", "4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.ia64", "4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.ppc", "4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390", "4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390x", "4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.x86_64", "4ES:mutt-5:1.4.1-12.0.3.el4.i386", "4ES:mutt-5:1.4.1-12.0.3.el4.ia64", "4ES:mutt-5:1.4.1-12.0.3.el4.ppc", "4ES:mutt-5:1.4.1-12.0.3.el4.s390", "4ES:mutt-5:1.4.1-12.0.3.el4.s390x", "4ES:mutt-5:1.4.1-12.0.3.el4.src", "4ES:mutt-5:1.4.1-12.0.3.el4.x86_64", "4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.i386", "4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.ia64", "4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.ppc", "4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390", "4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390x", "4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.x86_64", "4WS:mutt-5:1.4.1-12.0.3.el4.i386", "4WS:mutt-5:1.4.1-12.0.3.el4.ia64", "4WS:mutt-5:1.4.1-12.0.3.el4.ppc", "4WS:mutt-5:1.4.1-12.0.3.el4.s390", "4WS:mutt-5:1.4.1-12.0.3.el4.s390x", "4WS:mutt-5:1.4.1-12.0.3.el4.src", "4WS:mutt-5:1.4.1-12.0.3.el4.x86_64", "4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.i386", "4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.ia64", "4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.ppc", "4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390", "4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390x", "4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.x86_64", "5Client:mutt-5:1.4.2.2-3.0.2.el5.i386", "5Client:mutt-5:1.4.2.2-3.0.2.el5.ia64", "5Client:mutt-5:1.4.2.2-3.0.2.el5.ppc", "5Client:mutt-5:1.4.2.2-3.0.2.el5.s390x", "5Client:mutt-5:1.4.2.2-3.0.2.el5.src", "5Client:mutt-5:1.4.2.2-3.0.2.el5.x86_64", "5Client:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.i386", "5Client:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ia64", "5Client:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ppc", "5Client:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.s390x", "5Client:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.x86_64", "5Server:mutt-5:1.4.2.2-3.0.2.el5.i386", "5Server:mutt-5:1.4.2.2-3.0.2.el5.ia64", "5Server:mutt-5:1.4.2.2-3.0.2.el5.ppc", "5Server:mutt-5:1.4.2.2-3.0.2.el5.s390x", "5Server:mutt-5:1.4.2.2-3.0.2.el5.src", "5Server:mutt-5:1.4.2.2-3.0.2.el5.x86_64", "5Server:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.i386", "5Server:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ia64", "5Server:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ppc", "5Server:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.s390x", "5Server:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-1558" }, { "category": "external", "summary": "RHBZ#241191", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=241191" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-1558", "url": "https://www.cve.org/CVERecord?id=CVE-2007-1558" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-1558", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-1558" } ], "release_date": "2007-04-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-06-04T08:03:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "3AS:mutt-5:1.4.1-5.el3.i386", "3AS:mutt-5:1.4.1-5.el3.ia64", "3AS:mutt-5:1.4.1-5.el3.ppc", "3AS:mutt-5:1.4.1-5.el3.s390", "3AS:mutt-5:1.4.1-5.el3.s390x", "3AS:mutt-5:1.4.1-5.el3.src", "3AS:mutt-5:1.4.1-5.el3.x86_64", "3AS:mutt-debuginfo-5:1.4.1-5.el3.i386", "3AS:mutt-debuginfo-5:1.4.1-5.el3.ia64", "3AS:mutt-debuginfo-5:1.4.1-5.el3.ppc", "3AS:mutt-debuginfo-5:1.4.1-5.el3.s390", "3AS:mutt-debuginfo-5:1.4.1-5.el3.s390x", "3AS:mutt-debuginfo-5:1.4.1-5.el3.x86_64", "3Desktop:mutt-5:1.4.1-5.el3.i386", "3Desktop:mutt-5:1.4.1-5.el3.ia64", "3Desktop:mutt-5:1.4.1-5.el3.ppc", "3Desktop:mutt-5:1.4.1-5.el3.s390", "3Desktop:mutt-5:1.4.1-5.el3.s390x", "3Desktop:mutt-5:1.4.1-5.el3.src", "3Desktop:mutt-5:1.4.1-5.el3.x86_64", "3Desktop:mutt-debuginfo-5:1.4.1-5.el3.i386", "3Desktop:mutt-debuginfo-5:1.4.1-5.el3.ia64", "3Desktop:mutt-debuginfo-5:1.4.1-5.el3.ppc", "3Desktop:mutt-debuginfo-5:1.4.1-5.el3.s390", "3Desktop:mutt-debuginfo-5:1.4.1-5.el3.s390x", "3Desktop:mutt-debuginfo-5:1.4.1-5.el3.x86_64", "3ES:mutt-5:1.4.1-5.el3.i386", "3ES:mutt-5:1.4.1-5.el3.ia64", "3ES:mutt-5:1.4.1-5.el3.ppc", "3ES:mutt-5:1.4.1-5.el3.s390", "3ES:mutt-5:1.4.1-5.el3.s390x", "3ES:mutt-5:1.4.1-5.el3.src", "3ES:mutt-5:1.4.1-5.el3.x86_64", "3ES:mutt-debuginfo-5:1.4.1-5.el3.i386", "3ES:mutt-debuginfo-5:1.4.1-5.el3.ia64", "3ES:mutt-debuginfo-5:1.4.1-5.el3.ppc", "3ES:mutt-debuginfo-5:1.4.1-5.el3.s390", "3ES:mutt-debuginfo-5:1.4.1-5.el3.s390x", "3ES:mutt-debuginfo-5:1.4.1-5.el3.x86_64", "3WS:mutt-5:1.4.1-5.el3.i386", "3WS:mutt-5:1.4.1-5.el3.ia64", "3WS:mutt-5:1.4.1-5.el3.ppc", "3WS:mutt-5:1.4.1-5.el3.s390", "3WS:mutt-5:1.4.1-5.el3.s390x", "3WS:mutt-5:1.4.1-5.el3.src", "3WS:mutt-5:1.4.1-5.el3.x86_64", "3WS:mutt-debuginfo-5:1.4.1-5.el3.i386", "3WS:mutt-debuginfo-5:1.4.1-5.el3.ia64", "3WS:mutt-debuginfo-5:1.4.1-5.el3.ppc", "3WS:mutt-debuginfo-5:1.4.1-5.el3.s390", "3WS:mutt-debuginfo-5:1.4.1-5.el3.s390x", "3WS:mutt-debuginfo-5:1.4.1-5.el3.x86_64", "4AS:mutt-5:1.4.1-12.0.3.el4.i386", "4AS:mutt-5:1.4.1-12.0.3.el4.ia64", "4AS:mutt-5:1.4.1-12.0.3.el4.ppc", "4AS:mutt-5:1.4.1-12.0.3.el4.s390", "4AS:mutt-5:1.4.1-12.0.3.el4.s390x", "4AS:mutt-5:1.4.1-12.0.3.el4.src", "4AS:mutt-5:1.4.1-12.0.3.el4.x86_64", "4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.i386", "4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.ia64", "4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.ppc", "4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390", "4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390x", "4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.x86_64", "4Desktop:mutt-5:1.4.1-12.0.3.el4.i386", "4Desktop:mutt-5:1.4.1-12.0.3.el4.ia64", "4Desktop:mutt-5:1.4.1-12.0.3.el4.ppc", "4Desktop:mutt-5:1.4.1-12.0.3.el4.s390", "4Desktop:mutt-5:1.4.1-12.0.3.el4.s390x", "4Desktop:mutt-5:1.4.1-12.0.3.el4.src", "4Desktop:mutt-5:1.4.1-12.0.3.el4.x86_64", "4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.i386", "4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.ia64", "4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.ppc", "4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390", "4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390x", "4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.x86_64", "4ES:mutt-5:1.4.1-12.0.3.el4.i386", "4ES:mutt-5:1.4.1-12.0.3.el4.ia64", "4ES:mutt-5:1.4.1-12.0.3.el4.ppc", "4ES:mutt-5:1.4.1-12.0.3.el4.s390", "4ES:mutt-5:1.4.1-12.0.3.el4.s390x", "4ES:mutt-5:1.4.1-12.0.3.el4.src", "4ES:mutt-5:1.4.1-12.0.3.el4.x86_64", "4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.i386", "4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.ia64", "4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.ppc", "4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390", "4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390x", "4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.x86_64", "4WS:mutt-5:1.4.1-12.0.3.el4.i386", "4WS:mutt-5:1.4.1-12.0.3.el4.ia64", "4WS:mutt-5:1.4.1-12.0.3.el4.ppc", "4WS:mutt-5:1.4.1-12.0.3.el4.s390", "4WS:mutt-5:1.4.1-12.0.3.el4.s390x", "4WS:mutt-5:1.4.1-12.0.3.el4.src", "4WS:mutt-5:1.4.1-12.0.3.el4.x86_64", "4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.i386", "4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.ia64", "4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.ppc", "4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390", "4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390x", "4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.x86_64", "5Client:mutt-5:1.4.2.2-3.0.2.el5.i386", "5Client:mutt-5:1.4.2.2-3.0.2.el5.ia64", "5Client:mutt-5:1.4.2.2-3.0.2.el5.ppc", "5Client:mutt-5:1.4.2.2-3.0.2.el5.s390x", "5Client:mutt-5:1.4.2.2-3.0.2.el5.src", "5Client:mutt-5:1.4.2.2-3.0.2.el5.x86_64", "5Client:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.i386", "5Client:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ia64", "5Client:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ppc", "5Client:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.s390x", "5Client:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.x86_64", "5Server:mutt-5:1.4.2.2-3.0.2.el5.i386", "5Server:mutt-5:1.4.2.2-3.0.2.el5.ia64", "5Server:mutt-5:1.4.2.2-3.0.2.el5.ppc", "5Server:mutt-5:1.4.2.2-3.0.2.el5.s390x", "5Server:mutt-5:1.4.2.2-3.0.2.el5.src", "5Server:mutt-5:1.4.2.2-3.0.2.el5.x86_64", "5Server:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.i386", "5Server:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ia64", "5Server:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ppc", "5Server:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.s390x", "5Server:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:0386" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "3AS:mutt-5:1.4.1-5.el3.i386", "3AS:mutt-5:1.4.1-5.el3.ia64", "3AS:mutt-5:1.4.1-5.el3.ppc", "3AS:mutt-5:1.4.1-5.el3.s390", "3AS:mutt-5:1.4.1-5.el3.s390x", "3AS:mutt-5:1.4.1-5.el3.src", "3AS:mutt-5:1.4.1-5.el3.x86_64", "3AS:mutt-debuginfo-5:1.4.1-5.el3.i386", "3AS:mutt-debuginfo-5:1.4.1-5.el3.ia64", "3AS:mutt-debuginfo-5:1.4.1-5.el3.ppc", "3AS:mutt-debuginfo-5:1.4.1-5.el3.s390", "3AS:mutt-debuginfo-5:1.4.1-5.el3.s390x", "3AS:mutt-debuginfo-5:1.4.1-5.el3.x86_64", "3Desktop:mutt-5:1.4.1-5.el3.i386", "3Desktop:mutt-5:1.4.1-5.el3.ia64", "3Desktop:mutt-5:1.4.1-5.el3.ppc", "3Desktop:mutt-5:1.4.1-5.el3.s390", "3Desktop:mutt-5:1.4.1-5.el3.s390x", "3Desktop:mutt-5:1.4.1-5.el3.src", "3Desktop:mutt-5:1.4.1-5.el3.x86_64", "3Desktop:mutt-debuginfo-5:1.4.1-5.el3.i386", "3Desktop:mutt-debuginfo-5:1.4.1-5.el3.ia64", "3Desktop:mutt-debuginfo-5:1.4.1-5.el3.ppc", "3Desktop:mutt-debuginfo-5:1.4.1-5.el3.s390", "3Desktop:mutt-debuginfo-5:1.4.1-5.el3.s390x", "3Desktop:mutt-debuginfo-5:1.4.1-5.el3.x86_64", "3ES:mutt-5:1.4.1-5.el3.i386", "3ES:mutt-5:1.4.1-5.el3.ia64", "3ES:mutt-5:1.4.1-5.el3.ppc", "3ES:mutt-5:1.4.1-5.el3.s390", "3ES:mutt-5:1.4.1-5.el3.s390x", "3ES:mutt-5:1.4.1-5.el3.src", "3ES:mutt-5:1.4.1-5.el3.x86_64", "3ES:mutt-debuginfo-5:1.4.1-5.el3.i386", "3ES:mutt-debuginfo-5:1.4.1-5.el3.ia64", "3ES:mutt-debuginfo-5:1.4.1-5.el3.ppc", "3ES:mutt-debuginfo-5:1.4.1-5.el3.s390", "3ES:mutt-debuginfo-5:1.4.1-5.el3.s390x", "3ES:mutt-debuginfo-5:1.4.1-5.el3.x86_64", "3WS:mutt-5:1.4.1-5.el3.i386", "3WS:mutt-5:1.4.1-5.el3.ia64", "3WS:mutt-5:1.4.1-5.el3.ppc", "3WS:mutt-5:1.4.1-5.el3.s390", "3WS:mutt-5:1.4.1-5.el3.s390x", "3WS:mutt-5:1.4.1-5.el3.src", "3WS:mutt-5:1.4.1-5.el3.x86_64", "3WS:mutt-debuginfo-5:1.4.1-5.el3.i386", "3WS:mutt-debuginfo-5:1.4.1-5.el3.ia64", "3WS:mutt-debuginfo-5:1.4.1-5.el3.ppc", "3WS:mutt-debuginfo-5:1.4.1-5.el3.s390", "3WS:mutt-debuginfo-5:1.4.1-5.el3.s390x", "3WS:mutt-debuginfo-5:1.4.1-5.el3.x86_64", "4AS:mutt-5:1.4.1-12.0.3.el4.i386", "4AS:mutt-5:1.4.1-12.0.3.el4.ia64", "4AS:mutt-5:1.4.1-12.0.3.el4.ppc", "4AS:mutt-5:1.4.1-12.0.3.el4.s390", "4AS:mutt-5:1.4.1-12.0.3.el4.s390x", "4AS:mutt-5:1.4.1-12.0.3.el4.src", "4AS:mutt-5:1.4.1-12.0.3.el4.x86_64", "4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.i386", "4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.ia64", "4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.ppc", "4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390", "4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390x", "4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.x86_64", "4Desktop:mutt-5:1.4.1-12.0.3.el4.i386", "4Desktop:mutt-5:1.4.1-12.0.3.el4.ia64", "4Desktop:mutt-5:1.4.1-12.0.3.el4.ppc", "4Desktop:mutt-5:1.4.1-12.0.3.el4.s390", "4Desktop:mutt-5:1.4.1-12.0.3.el4.s390x", "4Desktop:mutt-5:1.4.1-12.0.3.el4.src", "4Desktop:mutt-5:1.4.1-12.0.3.el4.x86_64", "4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.i386", "4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.ia64", "4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.ppc", "4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390", "4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390x", "4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.x86_64", "4ES:mutt-5:1.4.1-12.0.3.el4.i386", "4ES:mutt-5:1.4.1-12.0.3.el4.ia64", "4ES:mutt-5:1.4.1-12.0.3.el4.ppc", "4ES:mutt-5:1.4.1-12.0.3.el4.s390", "4ES:mutt-5:1.4.1-12.0.3.el4.s390x", "4ES:mutt-5:1.4.1-12.0.3.el4.src", "4ES:mutt-5:1.4.1-12.0.3.el4.x86_64", "4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.i386", "4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.ia64", "4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.ppc", "4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390", "4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390x", "4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.x86_64", "4WS:mutt-5:1.4.1-12.0.3.el4.i386", "4WS:mutt-5:1.4.1-12.0.3.el4.ia64", "4WS:mutt-5:1.4.1-12.0.3.el4.ppc", "4WS:mutt-5:1.4.1-12.0.3.el4.s390", "4WS:mutt-5:1.4.1-12.0.3.el4.s390x", "4WS:mutt-5:1.4.1-12.0.3.el4.src", "4WS:mutt-5:1.4.1-12.0.3.el4.x86_64", "4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.i386", "4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.ia64", "4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.ppc", "4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390", "4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390x", "4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.x86_64", "5Client:mutt-5:1.4.2.2-3.0.2.el5.i386", "5Client:mutt-5:1.4.2.2-3.0.2.el5.ia64", "5Client:mutt-5:1.4.2.2-3.0.2.el5.ppc", "5Client:mutt-5:1.4.2.2-3.0.2.el5.s390x", "5Client:mutt-5:1.4.2.2-3.0.2.el5.src", "5Client:mutt-5:1.4.2.2-3.0.2.el5.x86_64", "5Client:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.i386", "5Client:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ia64", "5Client:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ppc", "5Client:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.s390x", "5Client:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.x86_64", "5Server:mutt-5:1.4.2.2-3.0.2.el5.i386", "5Server:mutt-5:1.4.2.2-3.0.2.el5.ia64", "5Server:mutt-5:1.4.2.2-3.0.2.el5.ppc", "5Server:mutt-5:1.4.2.2-3.0.2.el5.s390x", "5Server:mutt-5:1.4.2.2-3.0.2.el5.src", "5Server:mutt-5:1.4.2.2-3.0.2.el5.x86_64", "5Server:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.i386", "5Server:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ia64", "5Server:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ppc", "5Server:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.s390x", "5Server:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "fetchmail/mutt/evolution/...: APOP password disclosure vulnerability" }, { "cve": "CVE-2007-2683", "discovery_date": "2007-05-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "239890" } ], "notes": [ { "category": "description", "text": "Buffer overflow in Mutt 1.4.2 might allow local users to execute arbitrary code via \"\u0026\" characters in the GECOS field, which triggers the overflow during alias expansion.", "title": "Vulnerability description" }, { "category": "summary", "text": "Buffer overflow in mutt\u0027s gecos structure handling", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:mutt-5:1.4.1-5.el3.i386", "3AS:mutt-5:1.4.1-5.el3.ia64", "3AS:mutt-5:1.4.1-5.el3.ppc", "3AS:mutt-5:1.4.1-5.el3.s390", "3AS:mutt-5:1.4.1-5.el3.s390x", "3AS:mutt-5:1.4.1-5.el3.src", "3AS:mutt-5:1.4.1-5.el3.x86_64", "3AS:mutt-debuginfo-5:1.4.1-5.el3.i386", "3AS:mutt-debuginfo-5:1.4.1-5.el3.ia64", "3AS:mutt-debuginfo-5:1.4.1-5.el3.ppc", "3AS:mutt-debuginfo-5:1.4.1-5.el3.s390", "3AS:mutt-debuginfo-5:1.4.1-5.el3.s390x", "3AS:mutt-debuginfo-5:1.4.1-5.el3.x86_64", "3Desktop:mutt-5:1.4.1-5.el3.i386", "3Desktop:mutt-5:1.4.1-5.el3.ia64", "3Desktop:mutt-5:1.4.1-5.el3.ppc", "3Desktop:mutt-5:1.4.1-5.el3.s390", "3Desktop:mutt-5:1.4.1-5.el3.s390x", "3Desktop:mutt-5:1.4.1-5.el3.src", "3Desktop:mutt-5:1.4.1-5.el3.x86_64", "3Desktop:mutt-debuginfo-5:1.4.1-5.el3.i386", "3Desktop:mutt-debuginfo-5:1.4.1-5.el3.ia64", "3Desktop:mutt-debuginfo-5:1.4.1-5.el3.ppc", "3Desktop:mutt-debuginfo-5:1.4.1-5.el3.s390", "3Desktop:mutt-debuginfo-5:1.4.1-5.el3.s390x", "3Desktop:mutt-debuginfo-5:1.4.1-5.el3.x86_64", "3ES:mutt-5:1.4.1-5.el3.i386", "3ES:mutt-5:1.4.1-5.el3.ia64", "3ES:mutt-5:1.4.1-5.el3.ppc", "3ES:mutt-5:1.4.1-5.el3.s390", "3ES:mutt-5:1.4.1-5.el3.s390x", "3ES:mutt-5:1.4.1-5.el3.src", "3ES:mutt-5:1.4.1-5.el3.x86_64", "3ES:mutt-debuginfo-5:1.4.1-5.el3.i386", "3ES:mutt-debuginfo-5:1.4.1-5.el3.ia64", "3ES:mutt-debuginfo-5:1.4.1-5.el3.ppc", "3ES:mutt-debuginfo-5:1.4.1-5.el3.s390", "3ES:mutt-debuginfo-5:1.4.1-5.el3.s390x", "3ES:mutt-debuginfo-5:1.4.1-5.el3.x86_64", "3WS:mutt-5:1.4.1-5.el3.i386", "3WS:mutt-5:1.4.1-5.el3.ia64", "3WS:mutt-5:1.4.1-5.el3.ppc", "3WS:mutt-5:1.4.1-5.el3.s390", "3WS:mutt-5:1.4.1-5.el3.s390x", "3WS:mutt-5:1.4.1-5.el3.src", "3WS:mutt-5:1.4.1-5.el3.x86_64", "3WS:mutt-debuginfo-5:1.4.1-5.el3.i386", "3WS:mutt-debuginfo-5:1.4.1-5.el3.ia64", "3WS:mutt-debuginfo-5:1.4.1-5.el3.ppc", "3WS:mutt-debuginfo-5:1.4.1-5.el3.s390", "3WS:mutt-debuginfo-5:1.4.1-5.el3.s390x", "3WS:mutt-debuginfo-5:1.4.1-5.el3.x86_64", "4AS:mutt-5:1.4.1-12.0.3.el4.i386", "4AS:mutt-5:1.4.1-12.0.3.el4.ia64", "4AS:mutt-5:1.4.1-12.0.3.el4.ppc", "4AS:mutt-5:1.4.1-12.0.3.el4.s390", "4AS:mutt-5:1.4.1-12.0.3.el4.s390x", "4AS:mutt-5:1.4.1-12.0.3.el4.src", "4AS:mutt-5:1.4.1-12.0.3.el4.x86_64", "4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.i386", "4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.ia64", "4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.ppc", "4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390", "4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390x", "4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.x86_64", "4Desktop:mutt-5:1.4.1-12.0.3.el4.i386", "4Desktop:mutt-5:1.4.1-12.0.3.el4.ia64", "4Desktop:mutt-5:1.4.1-12.0.3.el4.ppc", "4Desktop:mutt-5:1.4.1-12.0.3.el4.s390", "4Desktop:mutt-5:1.4.1-12.0.3.el4.s390x", "4Desktop:mutt-5:1.4.1-12.0.3.el4.src", "4Desktop:mutt-5:1.4.1-12.0.3.el4.x86_64", "4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.i386", "4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.ia64", "4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.ppc", "4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390", "4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390x", "4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.x86_64", "4ES:mutt-5:1.4.1-12.0.3.el4.i386", "4ES:mutt-5:1.4.1-12.0.3.el4.ia64", "4ES:mutt-5:1.4.1-12.0.3.el4.ppc", "4ES:mutt-5:1.4.1-12.0.3.el4.s390", "4ES:mutt-5:1.4.1-12.0.3.el4.s390x", "4ES:mutt-5:1.4.1-12.0.3.el4.src", "4ES:mutt-5:1.4.1-12.0.3.el4.x86_64", "4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.i386", "4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.ia64", "4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.ppc", "4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390", "4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390x", "4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.x86_64", "4WS:mutt-5:1.4.1-12.0.3.el4.i386", "4WS:mutt-5:1.4.1-12.0.3.el4.ia64", "4WS:mutt-5:1.4.1-12.0.3.el4.ppc", "4WS:mutt-5:1.4.1-12.0.3.el4.s390", "4WS:mutt-5:1.4.1-12.0.3.el4.s390x", "4WS:mutt-5:1.4.1-12.0.3.el4.src", "4WS:mutt-5:1.4.1-12.0.3.el4.x86_64", "4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.i386", "4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.ia64", "4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.ppc", "4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390", "4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390x", "4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.x86_64", "5Client:mutt-5:1.4.2.2-3.0.2.el5.i386", "5Client:mutt-5:1.4.2.2-3.0.2.el5.ia64", "5Client:mutt-5:1.4.2.2-3.0.2.el5.ppc", "5Client:mutt-5:1.4.2.2-3.0.2.el5.s390x", "5Client:mutt-5:1.4.2.2-3.0.2.el5.src", "5Client:mutt-5:1.4.2.2-3.0.2.el5.x86_64", "5Client:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.i386", "5Client:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ia64", "5Client:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ppc", "5Client:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.s390x", "5Client:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.x86_64", "5Server:mutt-5:1.4.2.2-3.0.2.el5.i386", "5Server:mutt-5:1.4.2.2-3.0.2.el5.ia64", "5Server:mutt-5:1.4.2.2-3.0.2.el5.ppc", "5Server:mutt-5:1.4.2.2-3.0.2.el5.s390x", "5Server:mutt-5:1.4.2.2-3.0.2.el5.src", "5Server:mutt-5:1.4.2.2-3.0.2.el5.x86_64", "5Server:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.i386", "5Server:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ia64", "5Server:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ppc", "5Server:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.s390x", "5Server:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-2683" }, { "category": "external", "summary": "RHBZ#239890", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=239890" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-2683", "url": "https://www.cve.org/CVERecord?id=CVE-2007-2683" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-2683", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-2683" } ], "release_date": "2007-05-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-06-04T08:03:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "3AS:mutt-5:1.4.1-5.el3.i386", "3AS:mutt-5:1.4.1-5.el3.ia64", "3AS:mutt-5:1.4.1-5.el3.ppc", "3AS:mutt-5:1.4.1-5.el3.s390", "3AS:mutt-5:1.4.1-5.el3.s390x", "3AS:mutt-5:1.4.1-5.el3.src", "3AS:mutt-5:1.4.1-5.el3.x86_64", "3AS:mutt-debuginfo-5:1.4.1-5.el3.i386", "3AS:mutt-debuginfo-5:1.4.1-5.el3.ia64", "3AS:mutt-debuginfo-5:1.4.1-5.el3.ppc", "3AS:mutt-debuginfo-5:1.4.1-5.el3.s390", "3AS:mutt-debuginfo-5:1.4.1-5.el3.s390x", "3AS:mutt-debuginfo-5:1.4.1-5.el3.x86_64", "3Desktop:mutt-5:1.4.1-5.el3.i386", "3Desktop:mutt-5:1.4.1-5.el3.ia64", "3Desktop:mutt-5:1.4.1-5.el3.ppc", "3Desktop:mutt-5:1.4.1-5.el3.s390", "3Desktop:mutt-5:1.4.1-5.el3.s390x", "3Desktop:mutt-5:1.4.1-5.el3.src", "3Desktop:mutt-5:1.4.1-5.el3.x86_64", "3Desktop:mutt-debuginfo-5:1.4.1-5.el3.i386", "3Desktop:mutt-debuginfo-5:1.4.1-5.el3.ia64", "3Desktop:mutt-debuginfo-5:1.4.1-5.el3.ppc", "3Desktop:mutt-debuginfo-5:1.4.1-5.el3.s390", "3Desktop:mutt-debuginfo-5:1.4.1-5.el3.s390x", "3Desktop:mutt-debuginfo-5:1.4.1-5.el3.x86_64", "3ES:mutt-5:1.4.1-5.el3.i386", "3ES:mutt-5:1.4.1-5.el3.ia64", "3ES:mutt-5:1.4.1-5.el3.ppc", "3ES:mutt-5:1.4.1-5.el3.s390", "3ES:mutt-5:1.4.1-5.el3.s390x", "3ES:mutt-5:1.4.1-5.el3.src", "3ES:mutt-5:1.4.1-5.el3.x86_64", "3ES:mutt-debuginfo-5:1.4.1-5.el3.i386", "3ES:mutt-debuginfo-5:1.4.1-5.el3.ia64", "3ES:mutt-debuginfo-5:1.4.1-5.el3.ppc", "3ES:mutt-debuginfo-5:1.4.1-5.el3.s390", "3ES:mutt-debuginfo-5:1.4.1-5.el3.s390x", "3ES:mutt-debuginfo-5:1.4.1-5.el3.x86_64", "3WS:mutt-5:1.4.1-5.el3.i386", "3WS:mutt-5:1.4.1-5.el3.ia64", "3WS:mutt-5:1.4.1-5.el3.ppc", "3WS:mutt-5:1.4.1-5.el3.s390", "3WS:mutt-5:1.4.1-5.el3.s390x", "3WS:mutt-5:1.4.1-5.el3.src", "3WS:mutt-5:1.4.1-5.el3.x86_64", "3WS:mutt-debuginfo-5:1.4.1-5.el3.i386", "3WS:mutt-debuginfo-5:1.4.1-5.el3.ia64", "3WS:mutt-debuginfo-5:1.4.1-5.el3.ppc", "3WS:mutt-debuginfo-5:1.4.1-5.el3.s390", "3WS:mutt-debuginfo-5:1.4.1-5.el3.s390x", "3WS:mutt-debuginfo-5:1.4.1-5.el3.x86_64", "4AS:mutt-5:1.4.1-12.0.3.el4.i386", "4AS:mutt-5:1.4.1-12.0.3.el4.ia64", "4AS:mutt-5:1.4.1-12.0.3.el4.ppc", "4AS:mutt-5:1.4.1-12.0.3.el4.s390", "4AS:mutt-5:1.4.1-12.0.3.el4.s390x", "4AS:mutt-5:1.4.1-12.0.3.el4.src", "4AS:mutt-5:1.4.1-12.0.3.el4.x86_64", "4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.i386", "4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.ia64", "4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.ppc", "4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390", "4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390x", "4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.x86_64", "4Desktop:mutt-5:1.4.1-12.0.3.el4.i386", "4Desktop:mutt-5:1.4.1-12.0.3.el4.ia64", "4Desktop:mutt-5:1.4.1-12.0.3.el4.ppc", "4Desktop:mutt-5:1.4.1-12.0.3.el4.s390", "4Desktop:mutt-5:1.4.1-12.0.3.el4.s390x", "4Desktop:mutt-5:1.4.1-12.0.3.el4.src", "4Desktop:mutt-5:1.4.1-12.0.3.el4.x86_64", "4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.i386", "4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.ia64", "4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.ppc", "4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390", "4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390x", "4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.x86_64", "4ES:mutt-5:1.4.1-12.0.3.el4.i386", "4ES:mutt-5:1.4.1-12.0.3.el4.ia64", "4ES:mutt-5:1.4.1-12.0.3.el4.ppc", "4ES:mutt-5:1.4.1-12.0.3.el4.s390", "4ES:mutt-5:1.4.1-12.0.3.el4.s390x", "4ES:mutt-5:1.4.1-12.0.3.el4.src", "4ES:mutt-5:1.4.1-12.0.3.el4.x86_64", "4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.i386", "4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.ia64", "4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.ppc", "4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390", "4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390x", "4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.x86_64", "4WS:mutt-5:1.4.1-12.0.3.el4.i386", "4WS:mutt-5:1.4.1-12.0.3.el4.ia64", "4WS:mutt-5:1.4.1-12.0.3.el4.ppc", "4WS:mutt-5:1.4.1-12.0.3.el4.s390", "4WS:mutt-5:1.4.1-12.0.3.el4.s390x", "4WS:mutt-5:1.4.1-12.0.3.el4.src", "4WS:mutt-5:1.4.1-12.0.3.el4.x86_64", "4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.i386", "4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.ia64", "4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.ppc", "4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390", "4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390x", "4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.x86_64", "5Client:mutt-5:1.4.2.2-3.0.2.el5.i386", "5Client:mutt-5:1.4.2.2-3.0.2.el5.ia64", "5Client:mutt-5:1.4.2.2-3.0.2.el5.ppc", "5Client:mutt-5:1.4.2.2-3.0.2.el5.s390x", "5Client:mutt-5:1.4.2.2-3.0.2.el5.src", "5Client:mutt-5:1.4.2.2-3.0.2.el5.x86_64", "5Client:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.i386", "5Client:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ia64", "5Client:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ppc", "5Client:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.s390x", "5Client:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.x86_64", "5Server:mutt-5:1.4.2.2-3.0.2.el5.i386", "5Server:mutt-5:1.4.2.2-3.0.2.el5.ia64", "5Server:mutt-5:1.4.2.2-3.0.2.el5.ppc", "5Server:mutt-5:1.4.2.2-3.0.2.el5.s390x", "5Server:mutt-5:1.4.2.2-3.0.2.el5.src", "5Server:mutt-5:1.4.2.2-3.0.2.el5.x86_64", "5Server:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.i386", "5Server:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ia64", "5Server:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ppc", "5Server:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.s390x", "5Server:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:0386" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "Buffer overflow in mutt\u0027s gecos structure handling" } ] }
gsd-2006-5297
Vulnerability from gsd
Modified
2023-12-13 01:19
Details
Race condition in the safe_open function in the Mutt mail client 1.5.12 and earlier, when creating temporary files in an NFS filesystem, allows local users to overwrite arbitrary files due to limitations of the use of the O_EXCL flag on NFS filesystems.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2006-5297", "description": "Race condition in the safe_open function in the Mutt mail client 1.5.12 and earlier, when creating temporary files in an NFS filesystem, allows local users to overwrite arbitrary files due to limitations of the use of the O_EXCL flag on NFS filesystems.", "id": "GSD-2006-5297", "references": [ "https://access.redhat.com/errata/RHSA-2007:0386", "https://linux.oracle.com/cve/CVE-2006-5297.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2006-5297" ], "details": "Race condition in the safe_open function in the Mutt mail client 1.5.12 and earlier, when creating temporary files in an NFS filesystem, allows local users to overwrite arbitrary files due to limitations of the use of the O_EXCL flag on NFS filesystems.", "id": "GSD-2006-5297", "modified": "2023-12-13T01:19:55.846675Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-5297", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Race condition in the safe_open function in the Mutt mail client 1.5.12 and earlier, when creating temporary files in an NFS filesystem, allows local users to overwrite arbitrary files due to limitations of the use of the O_EXCL flag on NFS filesystems." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "25529", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/25529" }, { "name": "[mutt-dev] 20061004 security problem with temp files [was Re: mutt_adv_mktemp() ?]", "refsource": "MLIST", "url": "http://marc.info/?l=mutt-dev\u0026m=115999486426292\u0026w=2" }, { "name": "20733", "refsource": "BID", "url": "http://www.securityfocus.com/bid/20733" }, { "name": "oval:org.mitre.oval:def:10601", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10601" }, { "name": "2006-0061", "refsource": "TRUSTIX", "url": "http://www.trustix.org/errata/2006/0061/" }, { "name": "22640", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/22640" }, { "name": "22613", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/22613" }, { "name": "22685", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/22685" }, { "name": "22686", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/22686" }, { "name": "USN-373-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/usn-373-1" }, { "name": "RHSA-2007:0386", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2007-0386.html" }, { "name": "ADV-2006-4176", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/4176" }, { "name": "MDKSA-2006:190", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:190" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:mutt:mutt:1.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mutt:mutt:1.2.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mutt:mutt:1.3.12.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mutt:mutt:1.3.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mutt:mutt:1.4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mutt:mutt:1.4.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mutt:mutt:0.95.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mutt:mutt:1.2.5.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mutt:mutt:1.3.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mutt:mutt:1.3.27:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mutt:mutt:1.3.28:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mutt:mutt:1.2.5.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mutt:mutt:1.2.5.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mutt:mutt:1.3.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mutt:mutt:1.3.22:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mutt:mutt:1.4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mutt:mutt:1.4.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mutt:mutt:1.2.5.12_ol:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mutt:mutt:1.2.5.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mutt:mutt:1.3.24:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mutt:mutt:1.3.25:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mutt:mutt:1.5.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mutt:mutt:1.5.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mutt:mutt:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.5.12", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-5297" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Race condition in the safe_open function in the Mutt mail client 1.5.12 and earlier, when creating temporary files in an NFS filesystem, allows local users to overwrite arbitrary files due to limitations of the use of the O_EXCL flag on NFS filesystems." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ] }, "references": { "reference_data": [ { "name": "20733", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/20733" }, { "name": "22613", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/22613" }, { "name": "22640", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/22640" }, { "name": "USN-373-1", "refsource": "UBUNTU", "tags": [], "url": "http://www.ubuntu.com/usn/usn-373-1" }, { "name": "22686", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/22686" }, { "name": "2006-0061", "refsource": "TRUSTIX", "tags": [], "url": "http://www.trustix.org/errata/2006/0061/" }, { "name": "22685", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/22685" }, { "name": "MDKSA-2006:190", "refsource": "MANDRIVA", "tags": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:190" }, { "name": "RHSA-2007:0386", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2007-0386.html" }, { "name": "25529", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/25529" }, { "name": "ADV-2006-4176", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2006/4176" }, { "name": "[mutt-dev] 20061004 security problem with temp files [was Re: mutt_adv_mktemp() ?]", "refsource": "MLIST", "tags": [], "url": "http://marc.info/?l=mutt-dev\u0026m=115999486426292\u0026w=2" }, { "name": "oval:org.mitre.oval:def:10601", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10601" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.2, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 1.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": false } }, "lastModifiedDate": "2017-10-11T01:31Z", "publishedDate": "2006-10-16T19:07Z" } } }
ghsa-p7qx-2j9h-c63p
Vulnerability from github
Published
2022-05-01 07:27
Modified
2022-05-01 07:27
Details
Race condition in the safe_open function in the Mutt mail client 1.5.12 and earlier, when creating temporary files in an NFS filesystem, allows local users to overwrite arbitrary files due to limitations of the use of the O_EXCL flag on NFS filesystems.
{ "affected": [], "aliases": [ "CVE-2006-5297" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2006-10-16T19:07:00Z", "severity": "LOW" }, "details": "Race condition in the safe_open function in the Mutt mail client 1.5.12 and earlier, when creating temporary files in an NFS filesystem, allows local users to overwrite arbitrary files due to limitations of the use of the O_EXCL flag on NFS filesystems.", "id": "GHSA-p7qx-2j9h-c63p", "modified": "2022-05-01T07:27:02Z", "published": "2022-05-01T07:27:02Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-5297" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10601" }, { "type": "WEB", "url": "http://marc.info/?l=mutt-dev\u0026m=115999486426292\u0026w=2" }, { "type": "WEB", "url": "http://secunia.com/advisories/22613" }, { "type": "WEB", "url": "http://secunia.com/advisories/22640" }, { "type": "WEB", "url": "http://secunia.com/advisories/22685" }, { "type": "WEB", "url": "http://secunia.com/advisories/22686" }, { "type": "WEB", "url": "http://secunia.com/advisories/25529" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:190" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2007-0386.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/20733" }, { "type": "WEB", "url": "http://www.trustix.org/errata/2006/0061" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/usn-373-1" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2006/4176" } ], "schema_version": "1.4.0", "severity": [] }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.