FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The last vuln.xml file processed by FreshPorts is:

Revision:  371321
Date:      2014-10-21
Time:      13:58:33Z
Committer: madpilot

List all Vulnerabilities, by package

List all Vulnerabilities, by date

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
67c05283-5d62-11d8-80e3-0020ed76ef5aBuffer overflow in Mutt 1.4

Mutt 1.4 contains a buffer overflow that could be exploited with a specially formed message, causing Mutt to crash or possibly execute arbitrary code.


Discovery 2004-02-11
Entry 2004-02-12
mutt
ja-mutt
ge 1.4 lt 1.4.2

CVE-2004-0078
http://www.mutt.org/news.html
863f95d3-3df1-11dc-b3d3-0016179b2dd5mutt -- buffer overflow vulnerability

Securityfocus reports:

Mutt is prone to a local buffer-overflow vulnerability because it fails to properly bounds-check user-supplied input before using it in a memory copy operation. An attacker can exploit this issue to execute arbitrary code with the with the privileges of the victim. Failed exploit attempts will result in a denial of service.


Discovery 2007-05-28
Entry 2007-07-29
mutt
mutt-lite
ja-mutt
zh-mutt
lt 1.4.2.3

24192
CVE-2007-2683
http://www.redhat.com/support/errata/RHSA-2007-0386.html
d2a43243-087b-11db-bc36-0008743bf21amutt -- Remote Buffer Overflow Vulnerability

SecurityFocus reports:

Mutt is prone to a remote buffer-overflow vulnerability. This issue is due to the application's failure to properly bounds-check user-supplied input before copying it to an insufficiently sized memory buffer.

This issue may allow remote attackers to execute arbitrary machine code in the context of the affected application. Failed exploit attempts will likely crash the application, denying further service to legitimate users.


Discovery 2006-06-26
Entry 2006-06-30
mutt
mutt-lite
le 1.4.2.1_2

mutt-devel
mutt-devel-lite
le 1.5.11_2

ja-mutt
le 1.4.2.1.j1

zh-mutt-devel
le 1.5.11_20040617

ja-mutt-devel
le 1.5.6.j1_2

mutt-ng
le 20060501

18642
http://dev.mutt.org/cgi-bin/gitweb.cgi?p=mutt/.git;a=commit;h=dc0272b749f0e2b102973b7ac43dbd3908507540
863f95d3-3df1-11dc-b3d3-0016179b2dd5mutt -- buffer overflow vulnerability

Securityfocus reports:

Mutt is prone to a local buffer-overflow vulnerability because it fails to properly bounds-check user-supplied input before using it in a memory copy operation. An attacker can exploit this issue to execute arbitrary code with the with the privileges of the victim. Failed exploit attempts will result in a denial of service.


Discovery 2007-05-28
Entry 2007-07-29
mutt
mutt-lite
ja-mutt
zh-mutt
lt 1.4.2.3

24192
CVE-2007-2683
http://www.redhat.com/support/errata/RHSA-2007-0386.html
d2a43243-087b-11db-bc36-0008743bf21amutt -- Remote Buffer Overflow Vulnerability

SecurityFocus reports:

Mutt is prone to a remote buffer-overflow vulnerability. This issue is due to the application's failure to properly bounds-check user-supplied input before copying it to an insufficiently sized memory buffer.

This issue may allow remote attackers to execute arbitrary machine code in the context of the affected application. Failed exploit attempts will likely crash the application, denying further service to legitimate users.


Discovery 2006-06-26
Entry 2006-06-30
mutt
mutt-lite
le 1.4.2.1_2

mutt-devel
mutt-devel-lite
le 1.5.11_2

ja-mutt
le 1.4.2.1.j1

zh-mutt-devel
le 1.5.11_20040617

ja-mutt-devel
le 1.5.6.j1_2

mutt-ng
le 20060501

18642
http://dev.mutt.org/cgi-bin/gitweb.cgi?p=mutt/.git;a=commit;h=dc0272b749f0e2b102973b7ac43dbd3908507540
67c05283-5d62-11d8-80e3-0020ed76ef5aBuffer overflow in Mutt 1.4

Mutt 1.4 contains a buffer overflow that could be exploited with a specially formed message, causing Mutt to crash or possibly execute arbitrary code.


Discovery 2004-02-11
Entry 2004-02-12
mutt
ja-mutt
ge 1.4 lt 1.4.2

CVE-2004-0078
http://www.mutt.org/news.html