First published: Tue Jun 27 2006(Updated: )
Stack-based buffer overflow in the browse_get_namespace function in imap/browse.c of Mutt 1.4.2.1 and earlier allows remote attackers to cause a denial of service (crash) or execute arbitrary code via long namespaces received from the IMAP server.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mutt | =1.4.2 | |
Mutt | =1.4.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-3242 has a high severity rating due to its potential for remote code execution and denial of service.
To fix CVE-2006-3242, upgrade to Mutt version 1.4.2.2 or later.
CVE-2006-3242 affects Mutt versions 1.4.2 and 1.4.2.1.
CVE-2006-3242 is a stack-based buffer overflow vulnerability.
Yes, CVE-2006-3242 can be exploited remotely via malicious IMAP server responses.