First published: Fri Oct 23 2009(Updated: )
mutt_ssl.c in mutt 1.5.16 and other versions before 1.5.19, when OpenSSL is used, does not verify the domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mutt | >=1.5.16<1.5.19 | |
OpenSSL |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-3766 is classified as a moderate severity vulnerability due to its potential to allow man-in-the-middle attacks.
CVE-2009-3766 affects Mutt users by not verifying the domain name in the Common Name field of X.509 certificates, making them vulnerable to spoofing attacks.
CVE-2009-3766 impacts Mutt versions from 1.5.16 to earlier than 1.5.19.
To fix CVE-2009-3766, upgrade Mutt to version 1.5.19 or later, which includes the necessary domain name verification fixes.
Exploiting CVE-2009-3766, attackers can perform man-in-the-middle attacks by spoofing SSL servers using valid but arbitrary certificates.