First published: Mon Jun 22 2020(Updated: )
It was discovered that Mutt incorrectly handled certain requests. An attacker could possibly use this issue to enable MITM attacks. (CVE-2020-14093) It was discovered that Mutt incorrectly handled certain requests. An attacker could possibly use this issue to proceeds with a connection even if the user rejects an expired intermediate certificate. (CVE-2020-14154)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/mutt | <1.13.2-1ubuntu0.1 | 1.13.2-1ubuntu0.1 |
Ubuntu Ubuntu | =20.04 | |
All of | ||
ubuntu/mutt | <1.10.1-2.1ubuntu0.1 | 1.10.1-2.1ubuntu0.1 |
Ubuntu Ubuntu | =19.10 | |
All of | ||
ubuntu/mutt | <1.9.4-3ubuntu0.2 | 1.9.4-3ubuntu0.2 |
Ubuntu Ubuntu | =18.04 | |
All of | ||
ubuntu/mutt | <1.5.24-1ubuntu0.3 | 1.5.24-1ubuntu0.3 |
Ubuntu Ubuntu | =16.04 | |
All of | ||
ubuntu/mutt | <1.5.21-5ubuntu2.4 | 1.5.21-5ubuntu2.4 |
Ubuntu Ubuntu | =12.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this advisory is CVE-2020-14093.
The severity of CVE-2020-14093 is not specified in the advisory.
The Mutt vulnerability enables MITM attacks by mishandling certain requests.
The vulnerability affects Mutt versions 1.13.2-1ubuntu0.1, 1.10.1-2.1ubuntu0.1, 1.9.4-3ubuntu0.2, 1.5.24-1ubuntu0.3, and 1.5.21-5ubuntu2.4.
To fix the Mutt vulnerability, update to versions 1.13.2-1ubuntu0.1, 1.10.1-2.1ubuntu0.1, 1.9.4-3ubuntu0.2, 1.5.24-1ubuntu0.3, or 1.5.21-5ubuntu2.4.