First published: Mon Nov 23 2020(Updated: )
Last updated 16 January 2025
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/mutt | 2.0.5-4.1+deb11u3 2.2.12-0.1~deb12u1 2.2.9-1+deb12u1 2.2.13-1 | |
debian/neomutt | 20201127+dfsg.1-1.2 20220429+dfsg1-4.1 20250113+dfsg-1 | |
Mutt | <2.0.2 | |
NeoMutt | <2020-11-20 | |
Debian | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-28896 is a vulnerability in Mutt and NeoMutt that allowed an IMAP server's initial server response to be processed even if $ssl_force_tls was invalid, potentially allowing authentication credentials to be exposed.
CVE-2020-28896 has a severity score of 5.3, which is considered medium.
Mutt versions before 2.0.2 and NeoMutt versions before 2020-11-20 are affected by CVE-2020-28896.
To fix CVE-2020-28896, you should update to Mutt 2.0.2 or later versions, or NeoMutt 2020-11-20 or later versions.
The references for CVE-2020-28896 are: [Reference 1](https://github.com/neomutt/neomutt/commit/9c36717a3e2af1f2c1b7242035455ec8112b4b06), [Reference 2](https://github.com/neomutt/neomutt/releases/tag/20201120), [Reference 3](https://gitlab.com/muttmua/mutt/-/commit/04b06aaa3e0cc0022b9b01dbca2863756ebbf59a).