CVE-2006-5298

N/A Unknown
Published: October 16, 2006 Modified: April 23, 2026
View on NVD

Description

The mutt_adv_mktemp function in the Mutt mail client 1.5.12 and earlier does not properly verify that temporary files have been created with restricted permissions, which might allow local users to create files with weak permissions via a race condition between the mktemp and safe_fopen function calls.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://marc.info/?l=mutt-dev&m=115999486426292&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/22613
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/22640
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/22685
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/22686
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDKSA-2006:190
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.trustix.org/errata/2006/0061/
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.ubuntu.com/usn/usn-373-1
Source: af854a3a-2127-422b-91ae-364da2661108

16 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
Exploitation Status
Not in CISA KEV

Affected Vendors

mutt