First published: Mon Nov 11 2024(Updated: )
In neomutt and mutt, the To and Cc email headers are not validated by cryptographic signing which allows an attacker that intercepts a message to change their value and include himself as a one of the recipients to compromise message confidentiality.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mutt | ||
Mutt | ||
Red Hat Enterprise Linux | =8.0 | |
Red Hat Enterprise Linux | =9.0 | |
debian/mutt | <=2.0.5-4.1+deb11u3<=2.2.12-0.1~deb12u1<=2.2.9-1+deb12u1<=2.2.13-1 | |
debian/neomutt | <=20201127+dfsg.1-1.2<=20220429+dfsg1-4.1 | 20250404+dfsg-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-49393 is rated as a medium severity vulnerability affecting neomutt and mutt.
To mitigate CVE-2024-49393, update neomutt to version 20250113+dfsg-1 or later version, and for mutt, ensure you're using a patched release.
CVE-2024-49393 affects neomutt and mutt email clients where the To and Cc email headers are not cryptographically validated.
CVE-2024-49393 enables an attacker to intercept and modify email headers, potentially compromising message confidentiality.
Yes, if exploited, CVE-2024-49393 could allow unauthorized recipients to be added to emails, weakening overall email security.