Home / mailingsPDF  

[USN-1221-1] Mutt vulnerability

Posted on 30 September 2011
Ubuntu Security

--===============0220215011020827673==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature"; boundary="1SQmhf2mF2YjsYvc"
Content-Disposition: inline


--1SQmhf2mF2YjsYvc
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline

==========================================================================
Ubuntu Security Notice USN-1221-1
September 29, 2011

mutt vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 11.04
- Ubuntu 10.10
- Ubuntu 10.04 LTS

Summary:

An attacker could trick mutt into trusting a rogue server.

Software Description:
- mutt: text-based mailreader supporting MIME, GPG, PGP and threading

Details:

It was discovered that mutt incorrectly verified the hostname in an SSL
certificate. An attacker could trick mutt into trusting a rogue SMTPS,
IMAPS, or POP3S server's certificate, which was signed by a trusted certificate
authority, to perform a man-in-the-middle attack.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 11.04:
mutt 1.5.21-2ubuntu3.1
mutt-patched 1.5.21-2ubuntu3.1

Ubuntu 10.10:
mutt 1.5.20-9ubuntu2.1
mutt-patched 1.5.20-9ubuntu2.1

Ubuntu 10.04 LTS:
mutt 1.5.20-7ubuntu1.1
mutt-patched 1.5.20-7ubuntu1.1

After a standard system update you need to restart mutt to make
all the necessary changes. Users are encouraged to verify their
~/.mutt_certificates file to ensure only trusted certificates are listed.

References:
http://www.ubuntu.com/usn/usn-1221-1
CVE-2011-1429

Package Information:
https://launchpad.net/ubuntu/+source/mutt/1.5.21-2ubuntu3.1
https://launchpad.net/ubuntu/+source/mutt/1.5.20-9ubuntu2.1
https://launchpad.net/ubuntu/+source/mutt/1.5.20-7ubuntu1.1

 

TOP