First published: Sun Jun 21 2020(Updated: )
Mutt before 1.14.4 and NeoMutt before 2020-06-19 have a STARTTLS buffering issue that affects IMAP, SMTP, and POP3. When a server sends a "begin TLS" response, the client reads additional data (e.g., from a man-in-the-middle attacker) and evaluates it in a TLS context, aka "response injection."
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mutt Mutt | <1.14.4 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Neomutt Neomutt | <20200619 | |
Fedoraproject Fedora | =31 | |
Fedoraproject Fedora | =32 | |
Debian Debian Linux | =8.0 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =19.10 | |
Canonical Ubuntu Linux | =20.04 | |
openSUSE Leap | =15.1 | |
openSUSE Leap | =15.2 | |
ubuntu/mutt | <1.9.4-3ubuntu0.3 | 1.9.4-3ubuntu0.3 |
ubuntu/mutt | <1.10.1-2.1ubuntu0.2 | 1.10.1-2.1ubuntu0.2 |
ubuntu/mutt | <1.13.2-1ubuntu0.2 | 1.13.2-1ubuntu0.2 |
ubuntu/mutt | <1.14.4-1 | 1.14.4-1 |
ubuntu/mutt | <1.5.24-1ubuntu0.4 | 1.5.24-1ubuntu0.4 |
ubuntu/neomutt | <20200619+dfsg.1-1 | 20200619+dfsg.1-1 |
debian/mutt | 2.0.5-4.1+deb11u3 2.2.12-0.1~deb12u1 2.2.9-1+deb12u1 2.2.13-1 | |
debian/neomutt | 20201127+dfsg.1-1.2 20220429+dfsg1-4.1 20240425+dfsg-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2020-14954.
The severity of CVE-2020-14954 is medium, with a severity value of 5.9.
Mutt before 1.14.4 and NeoMutt before 2020-06-19 are affected by CVE-2020-14954.
The remedy for CVE-2020-14954 is to update to the patched versions: Mutt 1.14.4 or later, and NeoMutt 2020-06-19 or later.
More information about CVE-2020-14954 can be found at the following references: [http://lists.mutt.org/pipermail/mutt-announce/Week-of-Mon-20200615/000023.html](http://lists.mutt.org/pipermail/mutt-announce/Week-of-Mon-20200615/000023.html), [http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00064.html](http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00064.html), [http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00070.html](http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00070.html)