Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
CVE-2006-5297
CVE information
Published
Last Modified
CVSSv2.0 Severity
Impact Analysis
Description
Race condition in the safe_open function in the Mutt mail client 1.5.12 and earlier, when creating temporary files in an NFS filesystem, allows local users to overwrite arbitrary files due to limitations of the use of the O_EXCL flag on NFS filesystems..
CVSSv2.0 Score
- Severity
- Low
- Base Score
- 1.2/10
- Exploit Score
- 1.9/10
- Access Vector
- Local
- Access Complexity
- High
- Authentication Required
- None
- Impact Score
- 2.9/10
- Confidentiality Impact
- None
- Availability Impact
- None
- Integrity Impact
- Partial
Products Affected
CPE | Affected | Vulnerable | Excluding | Edit |
---|---|---|---|---|
cpe:2.3:a:mutt:mutt:1.3.12.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:mutt:mutt:1.2.5.5:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:mutt:mutt:0.95.6:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:mutt:mutt:1.3.27:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:mutt:mutt:1.4.2.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:mutt:mutt:1.3.16:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:mutt:mutt:1.2.5:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:mutt:mutt:1.3.25:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:mutt:mutt:1.4.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:mutt:mutt:*:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:mutt:mutt:1.3.22:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:mutt:mutt:1.2.5.12:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:mutt:mutt:1.2.5.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:mutt:mutt:1.2.5.4:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:mutt:mutt:1.3.28:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:mutt:mutt:1.3.24:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:mutt:mutt:1.4.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:mutt:mutt:1.2.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:mutt:mutt:1.4.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:mutt:mutt:1.3.17:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:mutt:mutt:1.5.3:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:mutt:mutt:1.2.5.12_ol:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:mutt:mutt:1.3.12:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:mutt:mutt:1.5.10:*:*:*:*:*:*:* |
Yes
|
- | - |
References
- http://www.securityfocus.com/bid/20733
- http://secunia.com/advisories/22613
- http://secunia.com/advisories/22640
- http://www.ubuntu.com/usn/usn-373-1
- http://secunia.com/advisories/22686
- http://www.trustix.org/errata/2006/0061/
- http://secunia.com/advisories/22685
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:190
- http://www.redhat.com/support/errata/RHSA-2007-0386.html
- http://secunia.com/advisories/25529
- http://www.vupen.com/english/advisories/2006/4176
- http://marc.info/?l=mutt-dev&m=115999486426292&w=2
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1