First published: Tue Jun 16 2009(Updated: )
Mutt 1.5.19, when linked against (1) OpenSSL (mutt_ssl.c) or (2) GnuTLS (mutt_ssl_gnutls.c), allows connections when only one TLS certificate in the chain is accepted instead of verifying the entire chain, which allows remote attackers to spoof trusted servers via a man-in-the-middle attack.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mutt Mutt | =1.5.19 | |
OpenSSL libcrypto | ||
GNU GnuTLS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-1390 is considered a high severity vulnerability due to the risk of man-in-the-middle attacks.
To fix CVE-2009-1390, upgrade to the latest version of Mutt where the TLS certificate verification issue has been resolved.
CVE-2009-1390 affects Mutt version 1.5.19 when linked against OpenSSL or GnuTLS.
CVE-2009-1390 facilitates man-in-the-middle attacks by allowing the acceptance of an incomplete TLS certificate chain.
The potential consequences of CVE-2009-1390 include the ability of remote attackers to spoof trusted servers.