Michael P. Soulier wrote:
> 
> Such things are harmless, if inappropriate to this list. Lets not
> forget however, that Mutt recently was found to be susceptible to a
> buffer overflow that could be spread through an email, no? Thankfully
> it was quickly patched, and thanks to Debian, I had it upgraded before
> I knew about the exploit.  Was that exploit as dangerous as recent MS
> Lookout! virii? Just curious.

the buffer overflow IIRC was something that was VERY unlikely to result
in an actual exploit (read me's email to the list on the subject in the
archives); not only that, but it would only result in the privileges of
the user running mutt (hint... don't read email as root!).

i think there's a big difference between a gaping security hole, and a
vulnerability which most likely would be difficult to exploit in actual
practice.

w

Reply via email to