mutt seems to be vulnerable to a buffer overflow in the attachment/encoding/ decoding functions see http://www.derkeiler.com/Mailing-Lists/Full-Disclosure/2005-08/0594.html http://www.securityfocus.com/bid/14596 Reproducible: Always Steps to Reproduce:
It only affects openbsd as bug #103050 says :P
I'm sorry to opened a new bug.. I did only a search for open bugs.. anyway, the advisory says that: Since this and other such experiments cause the propolice canary to get damaged (being right next to the return address), it seems very likely for this to be exploitable, except on system such as OpenBSD that include ProPolice by default. so it looks to me that OpenBSD is not vulnerable, but it does not definitly say linux is not vulnerable?
definite just openbsd, the bug is in openbsd libc rather than mutt :) *** This bug has been marked as a duplicate of 103050 ***