Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 4 Jan 2002 18:40:00 -0800
From:      "Philip J. Koenig" <pjklist@ekahuna.com>
To:        security@FreeBSD.ORG
Subject:   Security advisory SA-02:04 typo?
Message-ID:  <3C35F700.20238.29BF6BB@localhost>

next in thread | raw e-mail | index | archive | help

I got this today:


>=== FreeBSD-SA-02:04          Security Advisory                   FreeBSD, Inc.
> 
> Topic:          mutt ports contain remotely exploitable buffer overflow
> 
> Category:       ports
> Module:         mutt
> Announced:      2002-01-04
> Credits:        Joost Pol <joost@contempt.nl>
> Affects:        Ports collection prior to the correction date
> Corrected:      2002-01-02 13:52:03 UTC (ports/mail/mutt: 1.2.x)
>                 2002-01-02 03:39:01 UTC (ports/mail/mutt-devel: 1.3.x)
> FreeBSD only:   NO
> 
> I.   Background
> 
> Mutt is a small but very powerful text-based mail client for Unix
> operating systems.
> 
> II.  Problem Description
> 
> The mutt ports, versions prior to mutt-1.2.25_1 and
> mutt-devel-1.3.24_2, contain a buffer overflow in the handling of
> email addresses in headers.


Shall I assume the "1.2.25_1" string above is a typo?  Is it really 
the versions prior to 1.2.5_1?  Because I would think 1.2.2x seems to 
be pretty old at this point.


Phil



--
Philip J. Koenig                                       pjklist@ekahuna.com
Electric Kahuna Systems -- Computers & Communications for the New Millenium


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?3C35F700.20238.29BF6BB>