First published: Wed Jun 24 2020(Updated: )
It was discovered that Mutt incorrectly handled certain requests. An attacker could possibly use this issue to enable MITM attacks. (CVE-2020-14954) This update also address a regression caused in the last update USN-4401-1. It only affected Ubuntu 12.04 ESM, Ubuntu 16.04 LTS, Ubuntu 18.04 LTS and Ubuntu 19.10.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/mutt | <1.13.2-1ubuntu0.2 | 1.13.2-1ubuntu0.2 |
Ubuntu Ubuntu | =20.04 | |
All of | ||
ubuntu/mutt | <1.10.1-2.1ubuntu0.2 | 1.10.1-2.1ubuntu0.2 |
Ubuntu Ubuntu | =19.10 | |
All of | ||
ubuntu/mutt | <1.9.4-3ubuntu0.3 | 1.9.4-3ubuntu0.3 |
Ubuntu Ubuntu | =18.04 | |
All of | ||
ubuntu/mutt | <1.5.24-1ubuntu0.4 | 1.5.24-1ubuntu0.4 |
Ubuntu Ubuntu | =16.04 | |
All of | ||
ubuntu/mutt | <1.5.21-5ubuntu2.5 | 1.5.21-5ubuntu2.5 |
Ubuntu Ubuntu | =12.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Mutt vulnerability is CVE-2020-14954.
The vulnerability could enable MITM attacks and the regression caused issues in the previous update.
Ubuntu 12.04 ESM, Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 19.10, and Ubuntu 20.04 are affected by this vulnerability.
The recommended remedy is to update Mutt to version 1.13.2-1ubuntu0.2 for Ubuntu 12.04 ESM, Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 19.10, and Ubuntu 20.04.
You can find more information about this Mutt vulnerability at the following references: [CVE-2020-14954](https://ubuntu.com/security/CVE-2020-14954) and [Launchpad](https://launchpad.net/bugs/1884588).