First published: Mon Nov 11 2024(Updated: )
In mutt and neomutt the In-Reply-To email header field is not protected by cryptographic signing which allows an attacker to reuse an unencrypted but signed email message to impersonate the original sender.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/mutt | <=2.0.5-4.1+deb11u3<=2.2.12-0.1~deb12u1<=2.2.9-1+deb12u1<=2.2.13-1 | |
debian/neomutt | <=20201127+dfsg.1-1.2<=20220429+dfsg1-4.1 | 20250113+dfsg-1 |
Mutt Mutt | ||
NeoMutt | ||
Red Hat Enterprise Linux | =8.0 | |
Red Hat Enterprise Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-49394 is classified as a low severity vulnerability.
CVE-2024-49394 allows an attacker to impersonate the original sender by reusing an unencrypted but signed email message due to lack of cryptographic protection on the In-Reply-To email header.
To mitigate CVE-2024-49394, you should upgrade to the fixed versions of neomutt which are 20250113+dfsg-1 or later.
CVE-2024-49394 affects mutt and neomutt versions prior to their respective secure updates.
Yes, a patch is available in the latest versions of neomutt and users are advised to update their installations to ensure security.