First published: Mon Jun 15 2020(Updated: )
Mutt before 1.14.3 proceeds with a connection even if, in response to a GnuTLS certificate prompt, the user rejects an expired intermediate certificate.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mutt Mutt | <1.14.3 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =19.10 | |
Canonical Ubuntu Linux | =20.04 | |
ubuntu/mutt | <1.9.4-3ubuntu0.2 | 1.9.4-3ubuntu0.2 |
ubuntu/mutt | <1.10.1-2.1ubuntu0.1 | 1.10.1-2.1ubuntu0.1 |
ubuntu/mutt | <1.13.2-1ubuntu0.1 | 1.13.2-1ubuntu0.1 |
ubuntu/mutt | <1.5.24-1ubuntu0.3 | 1.5.24-1ubuntu0.3 |
debian/mutt | 2.0.5-4.1+deb11u3 2.2.12-0.1~deb12u1 2.2.9-1+deb12u1 2.2.13-1 | |
debian/neomutt | 20201127+dfsg.1-1.2 20220429+dfsg1-4.1 20240425+dfsg-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-14154 is a vulnerability in Mutt before version 1.14.3 that allows a connection to proceed even if the user rejects an expired intermediate certificate.
CVE-2020-14154 has a severity rating of 4.8, which is considered medium severity.
CVE-2020-14154 affects Mutt versions before 1.14.3 and neomutt versions before 20220429+dfsg1-4.1.
To mitigate the impact of CVE-2020-14154, update Mutt to version 1.14.3 or neomutt to version 20220429+dfsg1-4.1.
You can find more information about CVE-2020-14154 in the Mutt-announce mailing list, the Mutt website, and the Gentoo bug report linked in the references.