A problem with the way mutt, a text editor for Linux, handles e-mail address headers could be used to execute arbitrary commands on the affected machine. Using specially crafted message headers, a malicious user could exploit a buffer overflow in the application to execute the code with the privileges of the logged-in user. For more, go to: ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-02:04.mutt.asc
- Business transforms when it comes together | Unite your IT , Ops, and Applications teams with shared solutions. Get Ready - Red Hat Cloud
- Upskill your Team. Transition your Career. Cyber Security Foundation & Practitioner™ instructor-led course, for anyone needing a solid understanding of Cyber Security.