[29390] in bugtraq
mutt-1.4.1 fixes a buffer overflow.
daemon@ATHENA.MIT.EDU (Thomas Roessler)
Wed Mar 19 22:04:11 2003
Date: Thu, 20 Mar 2003 00:15:46 +0100
From: Thomas Roessler <roessler@does-not-exist.org>
To: BUGTRAQ@securityfocus.com
Message-ID: <20030319231546.GA454@coruscant.does-not-exist.org>
Mail-Followup-To: BUGTRAQ@securityfocus.com
Mime-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha1;
protocol="application/pgp-signature"; boundary="mP3DRpeJDSE+ciuQ"
Content-Disposition: inline
--mP3DRpeJDSE+ciuQ
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable
Mutt versions 1.4.1 and 1.5.4 have just been released and will soon
be available from ftp://ftp.mutt.org/mutt/.
Both versions fix a buffer overflow in mutt's IMAP client code which
was identified by Core Security Technologies, and fixed by Edmund
Grimley Evans. A more detailed advisory will be published by Core
Security.
Version 1.4.1 is a release on mutt's stable branch. The only
differences against 1.4 are a number of bug fixes. If you are
currently using mutt 1.4, it's probably a very good idea to update.
Version 1.5.4 is a snapshot of mutt's unstable branch, and may be
interesting to those brave souls who would like to play with the
latest features. (Or want to help us to identify some bugs in that
code.)
--=20
Thomas Roessler <roessler@does-not-exist.org>
--mP3DRpeJDSE+ciuQ
Content-Type: application/pgp-signature
Content-Disposition: inline
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)
iQEVAwUBPnj6ItImKUTOasbBAQJDnQgAvqFMClSrFBMuuBKAW51UIa0w64pDYLEp
ewyozzXZF+0UayIV+zelvsfVqRp1537y74iDq97aJifTvsjh9EcZ1rbgWzQwNTQU
FQXCQGgwuKDm4yX3w4qVBO3ebo0m5jnTQjTyuMJyKNjpaLtXlf3h9dv1F0S9fNDw
6mO4j+HDpDE6sEK+qwfluiW14TZ4+agTx6bZ8PZuCfozqW7e9t0Yw/IIvHbE+c2q
EzorZ5Vcooq3krnCeYgjZfA57NzsTG1jrl6fsDYggJitYx7FuUia8VpXZ7xMi4Aq
l/KTCCNCPPW0+BXZRX4xmx0dDqmUQUnnV/eoMmN3pAFPMwzxVV76uA==
=Ev2i
-----END PGP SIGNATURE-----
--mP3DRpeJDSE+ciuQ--