[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[cobalt-users] Mutt Info and my 3rd Try!!! (to many e-mail accounts!!!)



Hi All;

Well it appears that Mutt has a DOS issue
So far every major version of Linux has it
Here is the RedHat version (9) info

Well looking into Mutt, it is an e-mail client but
I do not know if being a client will effect the average Cobalt user.
nor do I know if even being installed is a problem.
When I tried it on my Raq 4 and it wanted to set itself up
so I skip that part.... and I wondered if Cobalt stuck that
in just to be nice!!!
If someone is brave... just type "mutt" from the command line in SSH
you will see what I mean!!

Mutt Info  http://www.mutt.org/

Franklin S. Werren  www.bagpipes.net   www.chautauqualake.net
www.franksradio.net http://stvef.chautauqualake.net
http://rtcw.chautauqualake.net




----- Original Message ----- 
From: "Secunia Security Advisories" <sec-adv@xxxxxxxxxxx>
To: <admin@xxxxxxxxxxxx>
Sent: Thursday, February 12, 2004 4:12 AM
Subject: [SA10853] Red Hat update for mutt


> 
> TITLE:
> Red Hat update for mutt
> 
> SECUNIA ADVISORY ID:
> SA10853
> 
> VERIFY ADVISORY:
> http://www.secunia.com/advisories/10853/
> 
> CRITICAL:
> Highly critical
> 
> IMPACT:
> System access, DoS
> 
> WHERE:
> >From remote
> 
> OPERATING SYSTEM:
> RedHat Linux 9
> 
> DESCRIPTION:
> Red Hat has issued updated packages for mutt. These fix a
> vulnerability which can be exploited to crash the mail client or
> potentially compromise a vulnerable system.
> 
> For more information:
> SA10846
> 
> SOLUTION:
> Updated packages:
> 
> Red Hat Linux 9
> 
> SRPMS:
> ftp://updates.redhat.com/9/en/os/SRPMS/mutt-1.4.1-3.3.src.rpm
> 
> i386:
> ftp://updates.redhat.com/9/en/os/i386/mutt-1.4.1-3.3.i386.rpm
> 
> ORIGINAL ADVISORY:
> https://rhn.redhat.com/errata/RHSA-2004-051.html
> 
> OTHER REFERENCES:
> SA10846:
> http://www.secunia.com/advisories/10846/
> 
> ----------------------------------------------------------------------
> 
> About:
> This Advisory was delivered by Secunia as a free service to help
> everybody keeping their systems up to date against the latest
> vulnerabilities.
> 
> Subscribe:
> http://www.secunia.com/secunia_security_advisories/
> 
> Definitions: (Criticality, Where etc.)
> http://www.secunia.com/about_secunia_advisories/
> 
> 
> Please Note:
> Secunia recommends that you verify all advisories you receive by
> clicking the link.
> Secunia NEVER sends attached files with advisories.
> Secunia does not advise people to install third party patches, only
> use those supplied by the vendor.
> 
> ----------------------------------------------------------------------
> 
> Unsubscribe: Secunia Security Advisories
> http://www.secunia.com/sec_adv_unsubscribe/?email=admin@xxxxxxxxxxxx
> 
> ----------------------------------------------------------------------
> 
>