First published: Fri Oct 23 2009(Updated: )
mutt_ssl.c in mutt 1.5.19 and 1.5.20, when OpenSSL is used, does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mutt | =1.5.19 | |
Mutt | =1.5.20 | |
OpenSSL |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-3765 has a medium severity rating due to its potential to allow man-in-the-middle attacks.
To fix CVE-2009-3765, you should upgrade to Mutt version 1.5.21 or later, which addresses the vulnerability.
Mutt versions 1.5.19 and 1.5.20 are affected by CVE-2009-3765.
CVE-2009-3765 allows attackers to spoof arbitrary SSL servers by exploiting the improper handling of a '\0' character in the Common Name field of an X.509 certificate.
No, OpenSSL itself is not directly affected by CVE-2009-3765; the vulnerability specifically impacts Mutt when it uses OpenSSL.