Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Fedora Local Security Checks >> Fedora Core 5 2006-760: mutt


Vulnerability Assessment Details

Fedora Core 5 2006-760: mutt

Vulnerability Assessment Summary
Check for the version of the mutt package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory FEDORA-2006-760 (mutt).

Mutt is a text-mode mail user agent. Mutt supports color, threading,
arbitrary key remapping, and a lot of customization.

You should install mutt if you have used it in the past and you prefer
it, or if you are new to mail programs and have not decided which one
you are going to use.



Update information :

* Thu Jun 29 2006 Miroslav Lichvar 5:1.4.2.1-6.3.fc5
- fix a buffer overflow when processing IMAP namespace (#197152, CVE-2006-3242)



Solution : Get the newest Fedora Updates
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2007 Tenable Network Security

Cables, Connectors

OEM SAMSUNG GALAXY Tab PRO 12.2IN SM-T900 ORIGINAL 16GB LOGIC BOARD MOTHERBOARD
$162.95
OEM SAMSUNG GALAXY Tab PRO 12.2IN SM-T900 ORIGINAL 16GB LOGIC BOARD MOTHERBOARD pictureDell Latitude E6410 Laptop Motherboard Intel 8885V n1 Base palm rest WIFI
$35.99
Dell Latitude E6410 Laptop Motherboard Intel   8885V  n1  Base palm rest  WIFI pictureMacBook Pro 15" A1226 2.4GHz Logic Board 820-2101-A n7 PARTS REPAIR AS IS
$30.0
MacBook Pro 15ASUS P9X79 LE LGA 2011 Intel X79 ATX SLI Motherboard DDR3
$200.0
ASUS P9X79 LE LGA 2011 Intel X79 ATX SLI Motherboard DDR3 picture


Discussions

No Discussions have been posted on this vulnerability.